IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises

Security vulnerabilities news stories - Page 2

Story image
SonicWall
Vulnerabilities pose danger to SonicWall SMA 100 remote access appliances
SonicWall and Australia’s ACSC are urging all businesses using SonicWall SMA 100 Series appliances to patch the devices as soon as possible.
Story image
Phishing
Hundreds of Australian corporations identified with email security vulnerabilities
A security researcher from CanIPhish.com has discovered over 200 well-known Australian corporations with email security vulnerabilities.
Story image
Malware
Gartner explains what security leaders need to know, and do, about Log4j
Jonathan Care explains some risks the vulnerability poses for organisations and the steps security leaders should take to secure their enterprise systems against potential associated threats.
Story image
Cybersecurity
A new tool to help the MSP community combat Log4j
Datto is encouraging all MSPs to download a free script developed and made available on GitHub for any Remote Monitoring and Management solution. 
Story image
Cybersecurity
1 in 10 servers and web apps vulnerable to Log4Shell
According to telemetry data from cybersecurity company Tenable, as of the 21st of December 2021, only 70% of organisations have even scanned for the Log4Shell vulnerability. 
Story image
Cybersecurity
What is Log4J and how does it affect you?
Norton Labs answers some common questions about the widespread software bug Log4J.
Story image
Ransomware
New threat intelligence from Sophos following the Apache Log4Shell vulnerability
Sophos has provided new threat intelligence following the reporting of the Apache Log4Shell vulnerability.
Story image
Firewall
Log4j actively exploited, serious complications can occur according to CERT NZ
The widely-used java logging library, log4j, has been actively exploited, according to an update from CERT NZ and Catalyst.
Story image
Open source
Claroty and JFrog discover 14 vulnerabilities in Busybox
Team82 and JFrog have announced the discovery of 14 vulnerabilities affecting the latest version of BusyBox.
Story image
Microsoft
New Microsoft Defender vulnerability should concern every enterprise - expert
A vulnerability found in Microsoft Defender released under Patch Tuesday is the most concerning.
Story image
Cloud
API vulnerabilities are a huge target for cyber criminals, report finds
"From broken authentication and injection flaws, to simple misconfigurations, there are numerous API security concerns for anyone building an internet-connected application."
Story image
Positive Technologies
ATM vulnerabilities open door for attacks - report
Vulnerabilities have been discovered in Wincor Cineo ATMs allowing illegal cash withdrawals
Story image
Invicti
Interview: Invicti's Mark Ralls on the new defining age for web application security
Ralls chats about web application security, vulnerability management, false positives, and why businesses need to think about vulnerability scanning in an entirely new way.
Story image
Security vulnerabilities
Apple urgently patches exploits across several operating systems
"Apple is aware of a report that this issue may have been actively exploited," the company states.
Story image
Application Security
Severe vulnerabilities in appsec environments taking longer to fix - NTT Security
The average time to remediate the most severe vulnerabilities in an organisation’s IT infrastructure has now reached 256 days.
Story image
Cloud
Ivanti tackles today's biggest security threats with RiskSense acquisition
"Together, Ivanti and RiskSense will enable customers to take the right action at the right time and effectively defend against ransomware, which is the biggest security threat today.”
Story image
Cloud
SonicWall vulnerability allows attackers to obtain full control of device and underlying OS
Tampering with this system may negatively impact a company's ability to work, to the point of full disruption of its protection system and stopping of business processes.
Story image
Microsoft
A look at the MS Exchange zero-days and how to protect your business
Every organisationusing Microsoft Exchange must patch their on-premise servers immediately and scan their networks for signs of malicious activity.
Story image
Cybersecurity
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.
Story image
Innovation
Latest Tenable launch provides holistic approach to vulnerability management
Tenable.ep is reportedly the industry’s first, all-in-one, risk-based vulnerability management platform designed to scale as dynamic compute requirements change.
Story image
IoT security
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.
Story image
Security vulnerabilities
Vulnerability disclosures back to expected rates despite COVID-19 disruption
The total number of vulnerabilities in 2020 is on track to exceed 2019.
Story image
Application Security
AppDynamics launches Cisco Secure Application to protect against vulnerabilities
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management, defend against cyber attacks and protect applications.
Story image
Application Performance Monitoring / APM
Datadog & Snyk integrate vulnerability management into GitHub
GitHub’s vice president of product management, Jeremy Epling, says that IT is increasingly relying on developers for security, testing, and responsibility for production operations.