TechDay Asia - Asia's technology news network
Asia
Search

Common Vulnerability Scoring System stories

Story image
Revenera unveils OSS Inspector plugin for IntelliJ IDEA users
3 days ago
#
open source
#
risk & compliance
#
cybersecurity
Revenera launches OSS Inspector for IntelliJ IDEA, helping developers identify open source software risks directly in their IDE, ensuring secure, compliant code.
Story image
Tenable Nessus introduces new risk prioritisation features
4 days ago
#
risk & compliance
#
cybersecurity
#
security vulnerabilities
Tenable unveils new features in Tenable Nessus, enhancing risk prioritisation with EPSS and CVSS v4 for improved vulnerability management and compliance.
Story image
38% of riskiest cyber-physical systems neglected, warns Claroty report
Wed, 8th May 2024
#
cybersecurity
#
physical security
#
claroty
A report from CPS protection company, Claroty, reveals that 38% of high-risk cyber-physical systems are overlooked by traditional security practices, increasing vulnerability to cyber attacks.
Story image
Zoom introduces VISS, an innovative approach to vulnerability assessment
Mon, 18th Dec 2023
#
open source
#
digital assessment
#
security vulnerabilities
Zoom unveils Vulnerability Impact Scoring System (VISS), an open-source method set to revolutionise online security. .
Story image
The IT industry is stalling on SBOMs when it should be working on best practice
Tue, 24th Oct 2023
#
open source
#
security vulnerabilities
#
it industry
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.
Story image
Trellix expands its threat intelligence portfolio
Fri, 28th Apr 2023
#
cybersecurity
#
ai security
#
threat intelligence
Trellix has expanded its Threat Intelligence portfolio, partnering with Intel 471 to provide underground malware insights to customers.
Story image
CISOs need to consider a risk-based cybersecurity strategy
Tue, 16th Aug 2022
#
risk & compliance
#
cybersecurity
#
qualys
Rather than talking in terms of attack vectors and vulnerabilities, CISOs and security decision-makers must look at actual business risk.
Story image
Elevation of Privilege the top 2021 Microsoft vulnerability
Thu, 26th May 2022
#
advanced persistent threat protection
#
cyber threats
#
security vulnerabilities
BeyondTrust's 2022 Microsoft Vulnerabilities Report reveals that Elevation of Privilege is the top vulnerability category for the second year running.
Story image
Alarming surge in Conti Ransomware Group activity - report
Fri, 20th May 2022
#
malware
#
ransomware
#
cybersecurity
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Attempts to exploit MS Exchange most frequent intrusion vector
Tue, 15th Feb 2022
#
cybersecurity
#
eset
#
cyber attacks
Exploits of MS Exchange and password guessing are the most common cyber intrusion methods, says ESET's T3 2021 Threat Report.
Story image
ESET Research releases T3 2021 Threat Report summarising key cybersecurity research
Wed, 9th Feb 2022
#
ransomware
#
cryptocurrency
#
malware
The latest ESET Threat Report reveals key insights into external attack vectors, email threats, and the impact of cryptocurrency exchange rates.
Story image
Dynatrace announces AI-powered addition to its Application Security Module
Fri, 18th Jun 2021
#
devsecops
#
application security
#
open source
Dynatrace announces a new AI-powered addition to its Application Security Module, identifying potentially risky software libraries and open source packages.
Story image
ICS vulnerabilities on the rise as gaps in remote work expand attack surfaces
Tue, 9th Feb 2021
#
hybrid & remote work
#
cybersecurity
#
wfh
The number of ICS vulnerabilities disclosed in 2020 increased by more than 30% compared to 2018 and nearly 25% compared to 2019.
Story image
Cyber threats on the rise for industrial control systems, new research finds
Tue, 25th Aug 2020
#
advanced persistent threat protection
#
claroty
#
cyber threats
Industrial control system (ICS) vulnerabilities are increasing due to remote access, says a report by The Claroty Research Team.
Story image
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Thu, 18th Apr 2019
#
martech
#
data analytics
#
planning
Faced with an overload of 'critical' vulnerabilities, Tenable turns to predictive solutions, launching a tool that targets the top 3% of likely exploits.
Story image
Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.