IT Brief Asia - Technology news for CIOs & IT decision-makers

Exploits stories - Page 2

Story image
Dramatic uptick in threat activity with exploits growing nearly 150%
Thu, 11th Aug 2022
#
exploits
#
cyber attacks
#
log4j
Threat activity has spiked in Q2 2022, with malware events rising by 25%, botnets doubling, and exploit activity growing almost 150%, says Nuspire's report.
Story image
2021 the year cyber criminals got creative - Proofpoint
Wed, 8th Jun 2022
#
cybersecurity
#
proofpoint
#
exploits
One constant that remains as organisations approach a sense of normalcy after a disruptive year is that cyber criminals continue to target and exploit people.
Story image
New vulnerabilities found in Nuspire’s Q1 2022 Threat Report
Thu, 19th May 2022
#
ddos
#
malware
#
advanced persistent threat protection
Nuspire's Q1 2022 Threat Report reveals surge in threat actor activity as new vulnerabilities emerge. Mirai, STRRAT and Emotet see a resurgence.
Story image
Infoblox's State of Security Report spotlights Australian remote work hazards
Wed, 18th May 2022
#
casb
#
dlp
#
cybersecurity
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Use of malware, botnets and exploits expands in Q1 2022
Thu, 12th May 2022
#
malware
#
ddos
#
cybersecurity
Malware, botnet, and exploit activity increased in Q1 2022, according to a report by managed security services provider Nuspire.
Story image
WordPress vulnerabilities more than doubled in 2021
Thu, 13th Jan 2022
#
risk & compliance
#
cybersecurity
#
risk based security
WordPress vulnerabilities have more than doubled in 2021, with 77% of them being exploitable, according to Risk Based Security.
Story image
Log4j actively exploited, serious complications can occur according to CERT NZ
Mon, 13th Dec 2021
#
martech
#
breach prevention
#
cybersecurity
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Companies exploited by high-risk vulnerabilities, new research shows
Wed, 4th Nov 2020
#
security vulnerabilities
#
exploits
#
positive technologies
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.
Story image
Radiflow launches iRISK for greater visibility into risk and vulnerability
Tue, 11th Feb 2020
#
exploits
#
cyber risk
#
radiflow
Radiflow launches iRISK, a risk analytics service for industrial networks, enhancing visibility and mitigation of vulnerabilities with NIST-recommended actions.
Story image
US$250,000 up for grabs with Microsoft’s bug bounty
Mon, 19th Mar 2018
#
cybersecurity
#
microsoft
#
exploits
Microsoft has announced the Speculative Execution Side Channel Bounty Program that is offering up to USD$250,000 to people who reveal novel bugs.
Story image
Cisco ASA appliances at risk of denial of service exploit
Tue, 13th Feb 2018
#
cisco
#
exploits
#
acsc
The Australian Cyber Security Centre (ACSC) has issued an official alert to those who use Cisco’s Adaptive Security Appliance (ASA).
Story image
North Korean threat group suspected to be behind Adobe Flash exploit
Mon, 5th Feb 2018
#
martech
#
breach prevention
#
flash player
An exploit that targeted an Adobe Flash vulnerability looks to be the work of a North Korean group called TEMP.Reaper.
Story image
Fool me once... ransomware strikes firms twice on average, survey finds
Thu, 1st Feb 2018
#
malware
#
firewalls
#
network infrastructure
Ransomware hits firms twice on average, according to a Sophos survey. Despite the presence of endpoint security, 77% of attacks breach defences.
Story image
Cybersecurity firm Votiro joins VMware's TAP program
Tue, 31st Oct 2017
#
content creation
#
exploits
#
votiro
Israeli-based cybersecurity firm Votiro has joined VMware’s Technology Alliance Partner Program as an access level partner.
Story image
ShadowPad exploit ‘one of the biggest’ APAC supply chain attacks
Tue, 22nd Aug 2017
#
encryption
#
kaspersky
#
exploits
Malaysia's MyCERT warns of mass APAC supply chain breach after ShadowPad exploit hits NetSarang servers, stealing data.
Story image
WatchGuard report: 30% of all malware isn’t caught by legacy AV
Mon, 8th May 2017
#
firewalls
#
network infrastructure
#
malware
WatchGuard’s Quarterly Internet Security Report says that 30% of malware attacks are new or zero day exploits - and legacy AVs are missing threats.
Story image
March saw rise in web attacks; but email malware and spam drop back
Wed, 19th Apr 2017
#
malware
#
cybersecurity
#
symantec
Symantec reports back on the latest threat statistics for March - email malware dipped, but web attacks are the biggest since 2016.
Story image
Google’s hacking contest ‘Project Zero’ was a flop: What went wrong?
Tue, 11th Apr 2017
#
smartphones
#
google
#
exploits
Not a single person claimed Google’s Project Zero prizes, even after six months of being open to participants.
Story image
APAC is now a 'honeypot' for cyber attacks as most targeted region in the world
Thu, 16th Mar 2017
#
malware
#
ddos
#
ransomware
Trend Micro’s latest report says that Asia Pacific region was something of a giant honeypot for cyber attacks last year, beating all other regions.
Story image
With ever-shifting sands, knowledge is the ultimate power in cyber security
Tue, 7th Feb 2017
#
breach prevention
#
cybersecurity
#
security breaches
Hackers are like burglars targeting vulnerable homes: they look for easy access and attack the least protected targets first. #cybersecurity.