Security vulnerabilities stories - Page 16
Claroty discovers vulnerabilities in Ovarro TBox RTUs
Tue, 30th Mar 2021
#
it in manufacturing
#
cybersecurity
#
security vulnerabilities
Widespread vulnerabilities have been found in Ovarro's TBox remote terminal units, posing a threat to industrial facilities.
Latest Tenable launch provides holistic approach to vulnerability management
Wed, 24th Feb 2021
#
security vulnerabilities
#
tenable network security
Tenable launches risk-based vulnerability management platform Tenable.ep, combining its products into a single solution.
.
Research reveals increase in critical, low complexity vulnerabilities
Fri, 19th Feb 2021
#
iot security
#
cybersecurity
#
security vulnerabilities
Critical and low complexity vulnerabilities are on the rise, with over 10,000 logged in 2020, according to a new study by Redscan.
Vulnerability disclosures back to expected rates despite COVID-19 disruption
Tue, 16th Feb 2021
#
security vulnerabilities
#
risk based security
#
covid-19
Vulnerability disclosures are returning to normal levels, with 2020 on track to surpass 2019, according to a report by Risk Based Security.
AppDynamics launches Cisco Secure Application to protect against vulnerabilities
Thu, 11th Feb 2021
#
devops
#
application security
#
multi-cloud
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management.
Datadog & Snyk integrate vulnerability management into GitHub
Tue, 15th Dec 2020
#
devops
#
siem
#
martech
Datadog and Snyk integrate with GitHub, allowing developers to use Datadog's CI/CD capabilities in their workflows.
New edge vulnerability revealed by Forescout
Wed, 9th Dec 2020
#
iot security
#
iot
#
industrial iot
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Claroty finds four vulnerabilities in Schneider Electric OT device
Thu, 19th Nov 2020
#
datacentre infrastructure
#
encryption
#
power / energy
Unmitigated vulnerabilities could give an attacker access to the device, enabling the attacker to break encryption, modify code, and run certain commands.
Secure Code Warrior launches offering to help developers adopt a security mindset
Fri, 13th Nov 2020
#
cybersecurity
#
developers
#
security vulnerabilities
Secure Code Warrior launches Missions, an interactive platform that allows developers to practice coding skills and tackle real-world security vulnerabilities.
Companies exploited by high-risk vulnerabilities, new research shows
Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.
GitHub's code vulnerability scanning tool now generally available
Fri, 16th Oct 2020
#
martech
#
application security
#
apm
GitHub has recently rolled out code scanning to help developers detect and prevent vulnerabilities from popping up in their open source and enterprise code.
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Tue, 22nd Sep 2020
#
robots
#
uc
#
casb
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
OT networks warned of vulnerabilities in CodeMeter software
Wed, 16th Sep 2020
#
iot
#
industrial iot
#
security vulnerabilities
Manufacturers using Wibu-Systems CodeMeter are urged to update to version 7.10 due to vulnerabilities that could allow attackers to take control of OT networks.
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
Tue, 15th Sep 2020
#
advanced persistent threat protection
#
ndr
#
healthtech
One in three IT environments vulnerable to Ripple20 cyber threat, says ExtraHop. Attackers can exploit 19 vulnerabilities in the Treck networking stack.
Ripple20 threat could affect 35% of all IT environments – ExtraHop
Mon, 14th Sep 2020
#
advanced persistent threat protection
#
healthtech
#
extrahop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.
VPN vulnerabilities pose serious risk to OT Networks
Thu, 30th Jul 2020
#
ddos
#
vpns
#
security vulnerabilities
Vulnerable VPN servers and clients used in critical industries have been discovered by cybersecurity firm Claroty, potentially leading to security breaches.
Gallagher fortifies cybersecurity reporting as NZ's first CVE Numbering Authority
Wed, 29th Jul 2020
#
cybersecurity
#
security vulnerabilities
#
mitre
New Zealand-based Gallagher has become an authorised CVE Numbering Authority, allowing it to assign and communicate security vulnerabilities in its products.
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
Fri, 24th Jul 2020
#
sap
#
security vulnerabilities
#
redshield
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Prevasio unveils threat analysis sandbox for containers
Mon, 13th Jul 2020
#
virtualisation
#
devops
#
application security
Prevasio launches industry's first dynamic threat and vulnerability analysis system for Docker containers. @PrevasioAnalyzer #Cybersecurity.
C-DATA OLT firmware has intentional backdoors, allege researchers
Mon, 13th Jul 2020
#
encryption
#
cybersecurity
#
security vulnerabilities
A range of optical line termination (OLT) devices made by China-based manufacturer and vendor C-DATA may be riddled with vulnerabilities and backdoors.