Technology news for New Zealand's largest enterprises
Positive Technologies stories
These search results are from across the Techday network of sites
Sharp increase in cyber attacks in last quarter of 2020 - report
There was an increase in the number of attacks aimed at the trade industry and medical institutions, as well in the number of social engineering attacks on individuals.
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."
Cybercriminals target COVID-19 vaccine - report
Attackers did not spare clinics where COVID-19 patients were being treated or pharmaceutical sites where vaccine research was being conducted.
5G flaws allow criminals to steal data, cut access to the web
"There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities."
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Hackers difficult to distinguish from legitimate users - study
Almost half of all actions by attackers are identical to the usual activities of users and admins, a new report has found.
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
Dark web packed with offers to hack corporate networks
"The larger the hacked company is, and the higher the obtained privileges, the more profitable the attack becomes."
Cisco ASA firewall users urged to patch systems now
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
Data is more valuable to cyber attackers than cash - report
Data theft was the goal of more than half of all attacks in 2019, according to PT. This is a 20 percentage point increase compared to 2018 when data theft was the goal of only 30% of incidents.
Unfixable vulnerability found in Intel chipsets 'impossible' to detect
Positive Technologies says it is ‘impossible’ to detect this kind of key breach, and no firmware updates can fix the vulnerability.
2G and 3G networks are 'open doors' for cyber attacks
Security researchers have warned about SS7 for decades, however, the vulnerabilities have become more severe in recent years.
15,000 companies still critically vulnerable from Citrix security flaws - report
Positive Technologies reports 1 in 5 companies affected have not taken any action to address the threat.
Citrix flaw puts 80,000 companies at risk
"Considering the high risk brought by the discovered vulnerability, and how widespread Citrix software is in the business community, we recommend information security professionals take immediate steps to mitigate the threat."
Cyberattacks becoming increasingly targeted in nature, research finds
The number of unique cyber incidents have increase for third quarter of 2019, according to a new report on the cybersecurity threatscape.
Financial institutions' websites most frequently attacked – report
Positive Technologies found that the majority of all web attacks in 2018 targeted sites of financial institutions, transportation companies, hospitality and entertainment companies.
Cryptolocker malware and ransomware threats on the rise
Cryptolocker malware and ransomware is increasing at a rapid rate, with these threats rising 167% over the previous quarter.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.