Security vulnerabilities stories
Hackuity achieves SOC 2 Type II compliance for data security
Hackuity, the RBVM company, attains SOC 2 Type II compliance, showcasing strong data security and compliance that uphold rigorous American standards, providing customers with enterprise-grade security assurance.
Australian & NZ workers fear businesses are ill-equipped for cyber threats
Nearly half of Australian and New Zealand workers do not feel ready to combat cyberattack threats, with 43% fearing becoming scam or phishing victims at work, ELMO Software research reveals.
Absolute Software offers 90-day free support amid Ivanti vulnerabilities
Absolute Software steps up amid Ivanti vulnerabilities, offering 90 days of free product licenses and support to potentially affected organisations for cyber resilience.
Investment Association alerts UK investors of AI trading risks
UK's Investment Association cautions investors on relying solely on AI and trading bots for investments, noting the potential financial risks and cybersecurity vulnerabilities.
UK businesses embrace multi-cloud environments, says OVHcloud report
Amid growing usage, OVHcloud research reveals 62% of large UK organisations are implementing multi-cloud environments, with 64% predicting an increase over the next two years.
Sternum & ChargePoint secure Home Flex against IoT vulnerabilities
In a bid to combat IoT vulnerabilities, security firm Sternum collaborates with ChargePoint to enhance the protection of ChargePoint Home Flex, following the uncovering of significant security flaws.
SecurityBridge rated a top source for SAP vulnerability discoveries
SecurityBridge's Research Lab is lauded by SAP's Security Response Team as a leading source for detecting software issues. This recognises a key role in fortifying international SAP security infrastructure.
Less than 1% vulnerabilities pose highest risk in 2023, finds Qualys
Less than 1% of security vulnerabilities created the highest risks to businesses in 2023, with 97 high-risk vulnerabilities exploited undetected, says Qualys Threat Research Unit report.
Australia's cybersecurity plans overlooked smart home devices, expert warns
Cybersecurity expert Leon Poggioli believes Australia's proposed cybersecurity law reforms need to pay more heed to smart home devices like solar inverters, crucial for grid stability.
Report highlights growing cyber vulnerabilities, CISO Darren Humphries comments
Critical cyber vulnerabilities are soaring, with 74% of firms struggling to swiftly patch holes, warns Darren Humphries, CISO at technology services provider, Acora.
Semgrep and HackerOne unite to improve code security reviews
In response to rising cyber threats, Semgrep and HackerOne's PullRequest aim to streamline early vulnerability detection and testing in software development through a new collaborative initiative.
Software security strains under supply chain complexity, Slim.AI reveals
Over 40% of firms struggle to tackle vulnerabilities in the rising complexity of software supply chains, despite sizeable resource allocation, says Slim.AI's recent Container Report.
Beware the lasting legacy of the Log4j vulnerability
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Australian firms boost AI investments for business operations, survey finds
Australian companies are significantly increasing AI investments to ramp up productivity and outpace competitors, a Dynatrace survey reveals.
DerScanner introduces Supply Chain Security to protect third-party code elements
DerScanner adds Supply Chain Security feature to verify third-party code, combating rising threats amid increasing open-source software cyberattacks.
The pressing need for self-healing apps and network resilience
Alarming new data reveals significant vulnerabilities that, if ignored, could lead to catastrophic consequences for enterprises.
Exclusive: Qualys' risk-based approach to cybersecurity
Qualys, a provider of cloud-based security and compliance solutions, has been pivotal in aiding companies through their digital transformation.
UK employees jeopardise workplace cybersecurity with unauthorised downloads
Two-thirds of UK employees are endangering business cybersecurity by unauthorised app downloads, often unbeknown to IT departments, Armis research reveals.
Cloud native security threats concern 75% of IT & security leaders
New research shows that IT and security leaders believe Kubernetes will play a major role in app development, but are concerned about security.
GitHub's AI revolution: Transforming code language & developer experience
GitHub announces an AI-driven platform that integrates AI into every phase of development, introducing natural language as a universal programming language.
Updating Apple devices in the era of rapid security responses
Every organisation employing Apple devices must develop and follow a clear strategy to handle Apple’s new RSR approach to OS upgrades.
In today’s data-driven world, compromising on cybersecurity is not an option
As the global financial ecosystem expands, it's getting harder for organisations to navigate the maze of cyber risks alone.
BeyondTrust experts forecast key cybersecurity threats for 2024
BeyondTrust’s cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.
Winter Vivern exploits webmail server vulnerability targets European governments
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.