IT Brief UK - Technology news for CIOs & IT decision-makers

Common Vulnerabilities and Exposures (CVE) stories - Page 18

Patch

Meltdown and Spectre fallout: patching problems persist

Fri, 12th Jan 2018
#
intel
#
amd
#
spectre
Patching difficulties persist as the tech industry grapples with the fallout from Meltdown and Spectre, highlighting flaws in nearly all modern processors.
Security breach

Intel processor vulnerabilities: What you need to know about Meltdown and Spectre

Mon, 8th Jan 2018
#
semiconductors
#
microsoft
#
google
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Macos

Apple confirms that macOS and iOS are vulnerable to Meltdown bugs

Mon, 8th Jan 2018
#
ios
#
apple
#
meltdown
Security issues known as Meltdown and Spectre affect all modern processors, including Apple's Mac systems and iOS devices. No known exploits at this time.
Thinkstockphotos 637770524

Check Point & LG plug security vulnerabilities in smart appliances

Tue, 7th Nov 2017
#
breach prevention
#
cybersecurity
#
security breaches
Check Point researchers recently worked with LG to plug vulnerabilities in a number of home appliances, including robot vacuum cleaners & dishwashers.
Thinkstockphotos 653929998

Monero cryptocurrency miner enslaves Windows Server 2003 systems in botnet

Mon, 2nd Oct 2017
#
malware
#
datacentre infrastructure
#
crypto
A malicious cryptocurrency miner is infecting vulnerable Windows web servers worldwide, creating a botnet and mining Monero cryptocurrency.
Thinkstockphotos 817486036

State-sponsored election hacks are acts of cyber warfare - survey

Mon, 11th Sep 2017
#
elections
#
venafi
#
security vulnerabilities
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country's election.
Thinkstockphotos 475253187

Foxit acknowledges zero-days in its PDF software, but no patches yet

Mon, 21st Aug 2017
#
pdf
#
zero day malware
#
foxit
Two zero-day vulnerabilities in Foxit Reader and PhantomPDF can allow attackers to execute malicious code on startup. Safe Reading Mode is recommended.
Hero 01

Tesla owners beware! Security researchers find major holes - firmware updates critical

Tue, 1st Aug 2017
#
cartech
#
tencent
#
tesla
Researchers at Tencent's Keen Security Lab discovered major security holes in Tesla's firmware, which attackers could use to control vehicles.
Thinkstockphotos 613550610

iOS gets another round of critical security updates to block major security holes

Thu, 27th Jul 2017
#
cybersecurity
#
ios
#
software updates
Apple's iOS 10.3.3 has undergone an urgent update after massive security holes were discovered in many of the system's functions.
Thinkstockphotos 815477652

New version of SambaCry spotted in the wild: Linux users urged to update OS

Fri, 21st Jul 2017
#
malware
#
open source
#
cybersecurity
Linux users face fresh cyber threat as new SambaCry variant emerges; experts urge immediate system updates to thwart attacks.
Thinkstockphotos 680737980

Big changes in the infosec landscape: Time to take note and take action

Mon, 15th May 2017
#
malware
#
breach prevention
#
cybersecurity
Do you like RDP? Good. So do attackers. Wait? What?! Yes, attackers love your weakly-defended RDP port as the payoff can be huge.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 534165429

Trustwave uncovers major vulnerabilities in NETGEAR routers

Tue, 31st Jan 2017
#
netgear
#
router
#
trustwave
Trustwave researchers have discovered vulnerability in 31 models of NETGEAR routers, potentially affecting millions of devices.
Thinkstockphotos 533440399

Siemens-branded CCTV webcams require urgent firmware patch

Thu, 1st Dec 2016
#
ddos
#
surveillance
#
healthtech
Siemens-branded IP-based CCTV cameras are the latest internet-connected devices to be found vulnerable to hacking attacks.
Thinkstockphotos 518625036

Secure your router: How to help prevent the next internet takedown

Wed, 16th Nov 2016
#
ddos
#
cybersecurity
#
router
Someone recently asked me if we shouldn't adopt a new name for the Internet of Things (IoT) because the existing term is too vague.
Thinkstockphotos 537248284

How a Microsoft Edge hole spread 'malvertising' & stayed off the radar

Thu, 15th Sep 2016
#
microsoft
#
trend micro
#
microsoft edge
Proofpoint and Trend Micro have discovered a large-scale 'malvertising' campaign through Microsoft Edge, enacted by threat actors known as AdGholas.
Thinkstockphotos 525318499

Check Point says beware of the Trident Exploits on iOS

Tue, 30th Aug 2016
#
malware
#
cybersecurity
#
apple
UAE activist targeted by 'Trident' - a trio of zero-day iOS exploits enabling total device control, discovered by Toronto researchers.
Trojan attack

New Sofacy attacks against US government agency

Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Thinkstockphotos 522476560a

Adobe warns of Flash zero-day vulnerability, being actively exploited by online criminals

Tue, 17th May 2016
#
cybersecurity
#
opinion
#
flash player
As I write this, if you're running Adobe Flash on your Windows, Mac, Linux or Chrome OS computer you're potentially at risk.
Vul

Vulnerable system the root cause of security issues, experts say

Thu, 17th Mar 2016
#
flexera
#
enterprise security
#
cve
The breadth of the problem illustrates the challenge faced by IT teams trying to protect their environment against security breaches.