Security vulnerabilities stories
DerScanner introduces Supply Chain Security to protect third-party code elements
DerScanner adds Supply Chain Security feature to verify third-party code, combating rising threats amid increasing open-source software cyberattacks.
The pressing need for self-healing apps and network resilience
Alarming new data reveals significant vulnerabilities that, if ignored, could lead to catastrophic consequences for enterprises.
Exclusive: Qualys' risk-based approach to cybersecurity
Qualys, a provider of cloud-based security and compliance solutions, has been pivotal in aiding companies through their digital transformation.
UK employees jeopardise workplace cybersecurity with unauthorised downloads
Two-thirds of UK employees are endangering business cybersecurity by unauthorised app downloads, often unbeknown to IT departments, Armis research reveals.
Cloud native security threats concern 75% of IT & security leaders
New research shows that IT and security leaders believe Kubernetes will play a major role in app development, but are concerned about security.
GitHub's AI revolution: Transforming code language & developer experience
GitHub announces an AI-driven platform that integrates AI into every phase of development, introducing natural language as a universal programming language.
Updating Apple devices in the era of rapid security responses
Every organisation employing Apple devices must develop and follow a clear strategy to handle Apple’s new RSR approach to OS upgrades.
In today’s data-driven world, compromising on cybersecurity is not an option
As the global financial ecosystem expands, it's getting harder for organisations to navigate the maze of cyber risks alone.
BeyondTrust experts forecast key cybersecurity threats for 2024
BeyondTrust’s cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.
Winter Vivern exploits webmail server vulnerability targets European governments
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.
Generative AI: A disruptive force at the hands of cyber attackers
Generative AI tools in the wrong hands are a serious threat, which is why their use must be regulated properly.
The IT industry is stalling on SBOMs when it should be working on best practice
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.
Microsoft research highlights vulnerabilities in ChatGPT models
Researchers have discovered vulnerabilities in the trustworthiness of GPT models, raising concerns about toxic and biased outputs.
Zyxel Networks launches game-changing WiFi 7 access point for business use
Zyxel Networks unveils its first WiFi 7 access point, promising to revolutionise high-density business connectivity.
Vitrana reduces software security vulnerabilities by 66% using CAST
Global platform provider Vitrana leverages CAST technology to slash its software security vulnerabilities by 66%.
Organisations fail to see benefit of ethical hacking - report
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.
Hackuity launches Version 2.0 of next gen vulnerability management
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.
Ordr announces integration with ServiceNow vulnerability response
Joint solution closes visibility gaps, optimizing vulnerability management for all managed and unmanaged devices, including IoT, IoMT and OT.
Interactive announces partnership with CrowdStrike
The partnership expands Interactive's cybersecurity offering and strengthens its position as a leader in the technology industry.
78% of organisations under-report cyberattacks: ISACA
Interestingly, only 42% of respondents in Oceania say their organisation conducts a cyber-risk assessment at least annually, compared to 43% in 2022.
Severe 'Looney Tunables' security flaw found in some Linux editions
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.
Keysight and Synopsys partner for IoT device cybersecurity
Synopsys Defensics fuzz testing software is now embedded into Keysight’s IoT Security Assessment solution, which reduces costs while speeding up time-to-market.
GOLD MELODY acts as initial access broker, says Secureworks report
GOLD MELODY identified as cyber threat group selling access to compromised organisations to other criminals. Active since 2017.
No dedicated hardware security for 66% IoT modules: IoT Analytics
The report reveals that 29% of IoT modules had no security features, exposing them to potential risks and vulnerabilities.