ChannelLife Australia logo
Industry insider news for Australia's technology resellers

Security vulnerabilities news stories - Page 2

Story image
API
API vulnerabilities are a huge target for cyber criminals, report finds
"From broken authentication and injection flaws, to simple misconfigurations, there are numerous API security concerns for anyone building an internet-connected application."
Story image
Positive Technologies
ATM vulnerabilities open door for attacks - report
Vulnerabilities have been discovered in Wincor Cineo ATMs allowing illegal cash withdrawals
Story image
Invicti
Interview: Invicti's Mark Ralls on the new defining age for web application security
Ralls chats about web application security, vulnerability management, false positives, and why businesses need to think about vulnerability scanning in an entirely new way.
Story image
Security vulnerabilities
Apple urgently patches exploits across several operating systems
"Apple is aware of a report that this issue may have been actively exploited," the company states.
Story image
Application Security
Severe vulnerabilities in appsec environments taking longer to fix - NTT Security
The average time to remediate the most severe vulnerabilities in an organisation’s IT infrastructure has now reached 256 days.
Story image
Ivanti
Ivanti tackles today's biggest security threats with RiskSense acquisition
"Together, Ivanti and RiskSense will enable customers to take the right action at the right time and effectively defend against ransomware, which is the biggest security threat today.”
Story image
SonicWall
SonicWall vulnerability allows attackers to obtain full control of device and underlying OS
Tampering with this system may negatively impact a company's ability to work, to the point of full disruption of its protection system and stopping of business processes.
Story image
Microsoft
A look at the MS Exchange zero-days and how to protect your business
Every organisationusing Microsoft Exchange must patch their on-premise servers immediately and scan their networks for signs of malicious activity.
Story image
Cybersecurity
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.
Story image
Innovation
Latest Tenable launch provides holistic approach to vulnerability management
Tenable.ep is reportedly the industry’s first, all-in-one, risk-based vulnerability management platform designed to scale as dynamic compute requirements change.
Story image
IoT security
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.
Story image
Security vulnerabilities
Vulnerability disclosures back to expected rates despite COVID disruption
The total number of vulnerabilities in 2020 is on track to exceed 2019.
Story image
Application Security
AppDynamics launches Cisco Secure Application to protect against vulnerabilities
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management, defend against cyber attacks and protect applications.
Story image
Application Performance Monitoring / APM
Datadog & Snyk integrate vulnerability management into GitHub
GitHub’s vice president of product management, Jeremy Epling, says that IT is increasingly relying on developers for security, testing, and responsibility for production operations.
Story image
Edge Security
New edge vulnerability revealed by Forescout
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open-source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Story image
Encryption
Claroty finds four vulnerabilities in Schneider Electric OT device
Unmitigated vulnerabilities could give an attacker access to the device, enabling the attacker to break encryption, modify code, and run certain commands.
Story image
Cybersecurity
Secure Code Warrior launches offering to help developers adopt a security mindset
Secure Code Warrior, the secure coding company, has launched a new educational offering that simulates realistic situations to help developers extend their coding skills and preparedness.
Story image
Security vulnerabilities
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Story image
Open source
GitHub's code vulnerability scanning tool now generally available
GitHub has recently rolled out code scanning to help developers detect and prevent vulnerabilities from popping up in their open source and enterprise code.
Story image
Video conference
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
Story image
Industrial IoT
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.
Story image
ExtraHop
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider.
Story image
ExtraHop
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.
Story image
VPN
VPN vulnerabilities pose serious risk to OT Networks
The vulnerabilities affect three industrial VPN servers and clients.