IT Brief UK - Technology news for CIOs & IT decision-makers

Vulnerability stories

Story image
APIs become the leading attack vector, cybersecurity research shows
Yesterday
#
cybersecurity
#
api security
#
research
Cybersecurity firm Imperva has found that 71% of last year's web traffic was linked to APIs, acting as a major attack vector due to organisations' insufficient visibility, leading to a sharp rise in targeted attacks.
Story image
Trend Micro dismantles major ransomware group LockBit
Yesterday
#
malware
#
advanced persistent threat protection
#
fbi
Trend Micro collaborates with global law enforcement agents to disrupt major ransomware group, LockBit, responsible for a quarter of 2023's ransomware leaks amounting to billions of dollars.
Story image
Take a closer look at your company's software supply chain
Last week
#
malware
#
paas
#
saas
Amid the rise of remote work and cloud technology, firms face increased cyber security risks from poorly managed software supply chains, warns industry expert.
Story image
New Barracuda threat report reveals web apps exploitation methods
Last week
#
firewall
#
ddos
#
microsoft
The Threat Spotlight report by Barracuda Networks reveals a surge in cyberattacks exploiting web application security gaps, with over 18 billion attacks mitigated in 2023.
Story image
Armis acquires CTCI, forms AI-powered cybersecurity powerhouse
This month
#
ml
#
dark web
#
ai
Armis acquires AI threat intelligence firm, CTCI, boosting its forecast abilities and creating a powerful new Global Threat Intelligence Service.
Story image
Retail theft at self-checkouts doubles, AI poses possible solution
Last month
#
physical security
#
retail
#
cios
Surging retail theft via self-checkouts sees cart-based losses doubling in a year, costing the average store over $102k annually, reveals an Everseen report.
Story image
Guardio Labs exposes critical vulnerability in Opera browser
Last month
#
dark web
#
opera
#
cios
Guardio Labs uncovers a significant zero-day vulnerability in Opera's browser, threatening its 350 million active users; Opera's 'My-Flow' feature enables act of exploitation.
Story image
Google Cloud launches tool to detect plaintext credentials for free
Last month
#
cloud services
#
encryption
#
public cloud
Google Cloud launches a secret discovery tool aimed at boosting organisation's security by detecting and monitoring plaintext credentials, part of its no-cost Sensitive Data Protection offering.
Story image
iPhone hardware feature exploited in Operation Triangulation
Last month
#
apple
#
it training
#
advanced persistent threat protection
Kaspersky reveals hackers have utilised a previously unknown iPhone hardware feature to bypass Apple's memory protections.
Story image
Netsafe reveals growing online harm for New Zealanders
Fri, 29th Dec 2023
#
cyberbullying
#
netsafe
#
nz
Netsafe's 2023 research reveals a sharp rise in harmful digital communications experienced by New Zealanders, with almost half of the Māori population and many under 30 falling victim.
Story image
NEC unveils AI strategy, aims to revolutionise industries with generative AI
Thu, 28th Dec 2023
#
partner programmes
#
ai
#
business strategy
NEC launches a tailored AI solution to revolutionise operations across industries, building on its enhanced large language model.
Story image
CybeReady celebrates standout year in security awareness training
Wed, 20th Dec 2023
#
emea
#
analyst report
#
cios
CybeReady has seen exceptional growth over the course of 2023, with significant strides in security awareness training solutions.
Story image
Zoom introduces VISS, an innovative approach to vulnerability assessment
Mon, 18th Dec 2023
#
open source
#
digital assessment
#
zoom
Zoom unveils Vulnerability Impact Scoring System (VISS), an open-source method set to revolutionise online security. .
Story image
Check Point: Protecting ICS from cyber threats
Tue, 2nd Jun 2015
#
advanced persistent threat protection
#
patching
#
cios
Check Point Software introduces new security gateway for Industrial Control Systems; aims to prevent cyber attacks on critical infrastructure.
Story image
UPDATE: Stalled EQC policy review leaves global reinsurers uncertain over NZ market
Wed, 4th Feb 2015
#
nz
#
earthquake commission
#
funding
The government review of the Earthquake Commission's funding and policy structures is leaving global reinsurers uncertain as they try to assess the.
Story image
High Court makes declarations on EQC flooding risk policy
Wed, 10th Dec 2014
#
wellington
#
christchurch
#
earthquakes
The High Court in Wellington has made a number of declarations outlining how the Earthquake Commission can deal with claims stemming from loss of l.
Story image
99% of Android mobile phones susceptible to newly found takeover attack
Sat, 6th Jul 2013
#
smartphones
#
cloud services
#
malware
Recent vulnerability means that 99% of all android phones could be exploited to the point where they could be completely overidden.
Story image
Internet security: You’re still the weakest link
Thu, 23rd Aug 2012
#
malware
#
avg technologies
#
software
Bad news for careless internet users: all the software in the world probably can’t protect you if you don’t use your head.
Story image
Microsoft to drop 'Autorun'
Fri, 11th Feb 2011
#
microsoft
#
cloud services
#
malware
Software giant aims to reduce the number of ways in which malware can infect PCs by turning off the Autorun and Autoplay functions.
Story image
The perils of VoIP
Wed, 1st Dec 2010
#
cloud services
#
apps
#
hackers
You may be confident that your computer system is secure from intruders, but have you ever thought about your phones?.
Story image
Wired for unified comms
Thu, 1st Jul 2010
#
smartphones
#
uc
#
firewall
Unifi ed communications requires a well-planned network platform to be successful.
Story image
Facebook bug exposes private chats
Fri, 7th May 2010
#
bi
#
big data
#
cdp
The latest in a long line of privacy issues has hit Facebook users.
Story image
New IE exploit detected
Tue, 2nd Mar 2010
#
microsoft
#
internet explorer
#
cios
Microsoft is hurrying to deal with a new vulnerability<br />detected in the Internet Explorer browser that could allow a hacker to take<br />control of a computer.
Story image
Google attack an inside job?
Wed, 20th Jan 2010
#
microsoft
#
cloud services
#
casb
Google is investigating reports that someone at its China headquarters may have – willingly or unwittingly – assisted in what is believed to have been infiltration of its networks by Chinese officials.