TechDay India - India's technology news network
India
Search

Security vulnerabilities stories - Page 2

Story image
SentinelOne unveils AI-driven innovations for Singularity Platform
Last month
#
advanced persistent threat protection
#
security vulnerabilities
#
enterprise security
SentinelOne unveils advanced generative AI features for its Singularity Platform, enhancing threat prevention and response, with innovations like the AI-powered Purple AI analyst.
Story image
Picus report reveals flaws in threat exposure management
Last month
#
advanced persistent threat protection
#
ransomware
#
linux
Almost 40% of systems tested by Picus Security are vulnerable to complete takeover, with macOS being notably weaker in stopping cyber-attacks.
Story image
Armis achieves Australian IRAP Protected level certification
Thu, 18th Jul 2024
#
cybersecurity
#
australian government
#
public sector
Armis achieves Protected classification through IRAP assessment, bolstering cybersecurity offerings for Australian public sector entities amidst rising foreign threats.
Story image
AttackIQ launches Mission Control to simplify BAS management
Thu, 11th Jul 2024
#
devops
#
apm
#
cybersecurity
AttackIQ launches Mission Control, enhancing Enterprise Breach and Attack Simulation for distributed teams. The new feature aims to streamline security testing and improve ROI.
Story image
New data breaches spark cybersecurity fears as Twilio confirms attack
Thu, 11th Jul 2024
#
breach prevention
#
security vulnerabilities
#
mfa
ShinyHunters claimed responsibility for compromising 33 million Twilio users' phone numbers via the Authy 2FA app, sparking major security concerns.
Story image
Patch Tuesday has revealed 139 vulnerabilities
Wed, 10th Jul 2024
#
cybersecurity
#
sql server
#
sharepoint
Microsoft's July 2024 Patch Tuesday reveals 139 vulnerabilities, including two zero-days under active exploitation: Hyper-V's EoP and MSHTML Spoofing.
Story image
Endor Labs warns of critical vulnerabilities in CocoaPods
Wed, 10th Jul 2024
#
malware
#
cybersecurity
#
uber
Endor Labs reveals major security flaws in CocoaPods, threatening apps like Instagram and Uber. Critical CVEs could impact Swift and Objective-C supply chains.
Story image
Experts urge tech firms to prioritise secure-by-design principles
Wed, 19th Jun 2024
#
advanced persistent threat protection
#
ai
#
cybersecurity
With tech giants grappling with data breaches and security flaws, experts stress the urgent need for multifactor authentication and stronger identity security to protect against rising cyber threats.
Story image
Outdated tech obstructing innovation, says NTT DATA report
Wed, 19th Jun 2024
#
cleantech
#
business continuity
#
sustainability
NTT DATA’s 2024 Infrastructure Lifecycle Management Report finds 80% of global firms hindered by outdated tech. ANZ leads with 100% of executives reporting impaired business agility due to legacy systems.
Story image
Ricoh partners with Rimini Street for Oracle system support
Wed, 12th Jun 2024
#
ricoh
#
oracle
#
printing
Ricoh partners with Rimini Street to support and protect its Oracle systems, aiming to optimise current systems while exploring a next-gen ERP strategy.
Story image
Mindgard wins UK's Most Innovative Cyber SME award for 2024
Thu, 6th Jun 2024
#
devops
#
apm
#
ai
Mindgard, an AI-focused cyber security startup, wins UK's Most Innovative Cyber SME 2024 at Infosecurity Europe for its groundbreaking AI Security Labs platform.
Story image
Appdome launches SDKProtect to secure mobile development
Wed, 5th Jun 2024
#
endpoint protection
#
surveillance
#
application security
Appdome launches SDKProtect to enhance mobile SDK security. This service aims to counteract threats like root detection evasion and data tampering, ensuring safer applications.
Story image
Three-quarters of UK software supply chains hit by cyber attacks
Wed, 5th Jun 2024
#
smartphones
#
encryption
#
risk & compliance
BlackBerry's research unveiled at Infosecurity Europe shows 74% of UK software supply chains faced cyber attacks in the past year, exposing critical vulnerabilities.
Story image
Bitdefender report finds Discord rife with malware & scams
Mon, 3rd Jun 2024
#
malware
#
email security
#
cybersecurity
Bitdefender's report uncovers Discord as a hotbed for malware, phishing, and scams, with 50,000 dangerous links detected in six months, targeting Australia and Indonesia among others.
Story image
Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem
Thu, 23rd May 2024
#
cybersecurity
#
iot
#
security vulnerabilities
ThroughTek Kalay's platform vulnerabilities affect over 100 million IoT devices, exposing them to potential attacks. Vendors race to patch issues.
Story image
Study reveals major vulnerabilities in operational technology
Wed, 22nd May 2024
#
pam
#
physical security
#
claroty
A Claroty study reveals that 13% of operational technology assets have insecure internet connections and 36% have known exploited vulnerabilities, posing severe cybersecurity risks.
Story image
GitLab reveals AI-driven updates for enhanced DevSecOps platform
Mon, 20th May 2024
#
devsecops
#
application security
#
ai
GitLab has announced cutting-edge AI-driven updates to its DevSecOps platform, including Duo Enterprise and CI/CD catalog, promising enhanced security and efficiency.
Story image
Is cloud complexity the biggest security threat of our time?
Tue, 14th May 2024
#
cloud security
#
iaas
#
cnapp
Australian businesses grapple with security vulnerabilities due to rising cloud complexity, leading to increased cyber threats and corporate survival issues.
Story image
Radware lauded as Leader in GigaOm's 2024 AAS Security Report
Thu, 9th May 2024
#
ai
#
cybersecurity
#
gigaom
Radware excels in GigaOm's 2024 AAS Security Report, gaining recognition as the only vendor to score top marks for AI-based vulnerability detection and bot management.
Story image
Semperis intensifies efforts with Veritas on ransomware defence
Thu, 9th May 2024
#
dr
#
ransomware
#
encryption
Semperis bolsters partnership with Veritas Technologies, enhancing cyber resilience against ransomware threats by using advanced attack-path analysis methods, streamlining data protection methods.