IT Brief Australia logo
Technology news for Australia's largest enterprises

Security vulnerabilities news stories - Page 3

Story image
VPN
VPN vulnerabilities pose serious risk to OT Networks
The vulnerabilities affect three industrial VPN servers and clients.
Story image
Cybersecurity
Gallagher fortifies cybersecurity reporting as NZ's first CVE Numbering Authority
"The CVE Program looks forward to partnering with Gallagher going forward as we collectively maintain our commitment to improving security."
Story image
SAP
RedShield develops 'virtual shield' to protect against SAP RECON vulnerability
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Story image
DevSecOps
Prevasio unveils threat analysis sandbox for containers
New SaaS solution aims to prevent breaches by automating dynamic threat analysis for docker containers.
Story image
Cybersecurity
C-DATA OLT firmware has intentional backdoors, allege researchers
A range of optical line termination (OLT) devices made by China-based manufacturer and vendor C-DATA may be riddled with vulnerabilities and backdoors.
Story image
Bandwidth
IOTDC extends data centre services in Port Melbourne and beyond
The new facility will be added to the IOTDC mesh, which is a network of geographically distributed facilities through IOTDC that offers communities integrated data centre services.
Story image
Firewall
Cisco ASA firewall users urged to patch systems now
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
Story image
Microsoft
Microsoft IE vulnerability to go unpatched until mid-Feb
A blog post from security vendor ESET has outlined the risk of the zero-day for those who are still using the relic browser of internet-past.
Story image
Microsoft
Zero-day Internet Explorer vulnerability exploited in the wild
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.
Story image
Cybersecurity
GitHub amps up vulnerability reporting capabilities
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
Story image
Apple
Apple issues clarification on extent of iOS malware infection
The attack affected fewer than a dozen websites that focus on content related to the Uighur community.
Story image
Phishing
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.
Story image
Apple
How the iPhone malware discovery affects Apple users – Malwarebytes
The malware implant has been patched, but iPhone users should ensure they’re running on the latest version of iOS (12.1.4) to leverage the security patches.
Story image
Cybersecurity
Puppet launches vulnerability remediation product
With vulnerabilities and security breaches on the rise, the latest Puppet product helps IT teams find, prioritise and remediate vulnerabilities.
Story image
Printers
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother. 
Story image
Malware
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.
Story image
F5 Networks
F5 Networks' BIG-IP load balancer product vulnerable to attack
Organisations that use F5 Networks BIG-IP load balancer should immediately check their configurations to ensure they are protected from potentially serious security issues.
Story image
Cybersecurity
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Story image
Cloud
Vulnerabilities in cloud containers soar, report finds
“Cloud technology and adoption has obviously skyrocketed, so it’s no surprise that vulnerabilities within cloud technology will increase."
Story image
Security vulnerabilities
Huawei working to patch critical security vulnerabilities
Huawei is proactively working with Swascan researchers to fix the vulnerabilities, which could affect three main areas: confidentiality, integrity, and availability.
Story image
Smart Home
UPDATED: Orvibo & Arlo smart home products patched to prevent attacks
The security of smart home devices is once again under the spotlight this week, as two different device manufacturers come under fire for major vulnerabilities.
Story image
Check Point
Major vulnerability found Electronic Arts gaming client
Once exploited, the vulnerabilities would have led to player account takeover and identity theft, Check Point and CyberInt found.
Story image
Security vulnerabilities
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Story image
Intel
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."