IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises

Positive Technologies news stories

Story image
Cybersecurity
Vulnerabilities discovered in Veeam backup solutions
Among the possible consequences of the attacks are infection with ransomware, data theft, and denial of service.
Story image
Phishing
COVID-19 vax most popular topic for phishing attacks in 2021
While phishing attacks remain a consistent threat to online security, attackers are switching up the topics they use to bait unsuspecting victims.
Story image
Malware
End of 2021 marks drop in cyber attacks, and increase in remote access malware
In Q3 2021 there has been a decrease in the number of unique cyber attacks, however there’s been an increase in the share of attacks against individuals, and also a rise in attacks involving remote access malware.
Story image
Network Security
Cybercriminals hack 93% of company networks - report
"In order to build an effective protection system, it is necessary to understand what unacceptable events are relevant for a particular company."
Story image
Cybersecurity
Positive Technologies reveals updated cybersecurity platform
Positive Technologies has released a new version of its Network Attack Discovery solution, PT NAD.
Story image
Firewall
Vulnerability in Cisco security devices could cause firewalls to fail
A vulnerability in Cisco security devices is dangerous for business processes in large companies.
Story image
Apple Pay
Vulnerabilities in Apple Pay, Samsung Pay, and Google Pay open door for cyber attackers
Flaws in Apple Pay, Samsung Pay, and Google Pay are allowing attackers to make unlimited purchases.
Story image
Positive Technologies
ATM vulnerabilities open door for attacks - report
Vulnerabilities have been discovered in Wincor Cineo ATMs allowing illegal cash withdrawals
Story image
Cybersecurity
New cyber-criminal group discovered targeting government servers, fuel, energy and aviation companies
Researchers have identified a new, previously unknown group that has systematically attacked Russia's fuel and energy complex and its aviation industry. 
Story image
Ransomware
Ransomware attacks reach disturbing levels
Ransomware attacks have reached 'stratospheric levels', now accounting for 69% of all attacks involving malware. 
Story image
Cyber attacks
91% of industrial companies open to cyber attacks
"The level of cybersecurity at most industrial companies is too low for comfort."
Story image
Ransomware
Cyber incidents on the rise as ransomware accounts for two thirds of all malware attacks
More cybercriminals are customising malware for attacks on virtual infrastructure.
Story image
SonicWall
SonicWall vulnerability allows attackers to obtain full control of device and underlying OS
Tampering with this system may negatively impact a company's ability to work, to the point of full disruption of its protection system and stopping of business processes.
Story image
Cisco
Vulnerabilities discovered in Cisco IT infrastructure deployment solution
The flaw means attackers could disrupt the operation of enterprise IT systems by deleting backups.
Story image
Cybersecurity
Sharp increase in cyber attacks in last quarter of 2020 - report
There was an increase in the number of attacks aimed at the trade industry and medical institutions, as well in the number of social engineering attacks on individuals.
Story image
Malware
Sandbox evasion malware used for cyber espionage, new study shows
The company's findings show that 25% of that malware was active in 2019-2020, and that at least 23 APT groups around the world have used them in attacks.
Story image
Dark web
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."
Story image
Health
Cybercriminals target COVID-19 vaccine - report
Attackers did not spare clinics where COVID-19 patients were being treated or pharmaceutical sites where vaccine research was being conducted.
Story image
5G
5G flaws allow criminals to steal data, cut access to the web
"There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities."
Story image
Security vulnerabilities
Companies exploited by high-risk vulnerabilities, new research shows
"Our automated security assessment proved that all companies have network services available for connection on their network perimeter, allowing hackers to exploit software vulnerabilities and bruteforce credentials to these services."
Story image
Cybersecurity
Hackers difficult to distinguish from legitimate users - study
Almost half of all actions by attackers are identical to the usual activities of users and admins, a new report has found. 
Story image
Application Security
Banks failing customers when it comes to mobile app security
"Through these vulnerabilities, hackers can obtain usernames, account balances, transfer confirmations, card limits, and the phone number associated with a victim's card.”
Story image
Dark web
Dark web packed with offers to hack corporate networks
"The larger the hacked company is, and the higher the obtained privileges, the more profitable the attack becomes."
Story image
Firewall
Cisco ASA firewall users urged to patch systems now
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.