Total Vulnerabilities for 2020 Exceed Official CVEs by 29%: Report

Total Vulnerabilities for 2020 Exceed Official CVEs by 29%: Report

Total vulnerability disclosures for 2020 are on track to exceed the previous year’s figures, with a large percentage not recorded in the official National Vulnerability Database (NVD), according to Risk Based Security. The security vendor’s 2020 Year End Vulnerability QuickView Report recorded 23,269 bugs last year, although there may still be some left to come in. “Organizations should be aware that … 1917 have a public exploit, are remotely exploitable, and do not have a…

Read More

Nearly Two-Thirds of CVEs Are Low Complexity

Nearly Two-Thirds of CVEs Are Low Complexity

Security experts have warned of an increase in published vulnerabilities which are relatively easy to exploit and require no user interaction. Managed security service provider Redscan’s latest report, NIST Security Vulnerability Trends in 2020: An Analysis, takes a look back at the 18,000+ CVEs recorded in NIST’s National Vulnerability Database (NVD). Aside from the fact that more CVEs were reported in 2020 than any year previously, a fact Infosecurity reported on in December, it raised…

Read More

Singtel Supply Chain Breach Traced to Unpatched Bug

Singtel Supply Chain Breach Traced to Unpatched Bug

One of APAC’s biggest telecoms companies has admitted that a supply chain attack may have led to the compromise of customer data. Singtel released a statement on Thursday revealing that it was running Accellion’s legacy file sharing system FTA to share information internally and with external stakeholders. Cyber-criminals appear to have exploited potentially multiple FTA vulnerabilities in attacks against various customers. Although Singtel said its core operations “remain unaffected and sound,” it admitted there may be…

Read More

Queen’s University Belfast Recognized for Role in Growing Cybersecurity Awareness

Queen’s University Belfast Recognized for Role in Growing Cybersecurity Awareness

Queen’s University Belfast in the UK has been recognized for its cybersecurity education program and work promoting cyber-skills in its local community. As a result of these efforts, the institution has been awarded silver recognition from its Academic Center of Excellence in Cyber Security (ACE-CSE) program by the National Cyber Security Center (NCSC). The ACE-CSE initiative was introduced by the NCSC and Department for Digital, Culture, Media and Sport with the purpose of developing a community of cybersecurity…

Read More

Maximizing security in repurposed spaces

Maximizing security in repurposed spaces

Maximizing security in repurposed spaces | 2021-02-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Securing business automation amidst remote work

Securing business automation amidst remote work

Securing business automation amidst remote work | 2021-02-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Working at a safe distance, safely: Remote work at industrial sites brings extra cyber risk

Working at a safe distance, safely: Remote work at industrial sites brings extra cyber risk

When workers need to get things done in a dangerous locale, sometimes they have to be distant. This opens up plenty of cybersecurity hazards. We spoke with one expert about how to achieve that security. Image: iStock/NanoStockk As a science fiction fan, I’ve always been fascinated with the concept of humans being able to safely get work done in dangerous or hard-to-reach areas. For instance, the film “Titanic” features a submersible that can retrieve or…

Read More

NUMBER:JACK: Nine Vulnerabilities Across Multiple Open Source TCP/IP Stacks

NUMBER:JACK: Nine Vulnerabilities Across Multiple Open Source TCP/IP Stacks

Nine new vulnerabilities have been identified across several TCP/IP stacks embedded in millions of OT, IoT and IT devices, spurring continued scrutiny of these already vulnerable asset types. Background On February 10, researchers at Forescout published a report called NUMBER:JACK, which details nine vulnerabilities discovered across nine open source TCP/IP stacks. The prevalence of these stacks across embedded devices is significant. NUMBER:JACK follows in the footsteps of AMNESIA:33, a previous report by the same researchers that…

Read More

NUMBER:JACK: Nine Vulnerabilities Across 11 Open Source TCP/IP Stacks

NUMBER:JACK: Nine Vulnerabilities Across Multiple Open Source TCP/IP Stacks

Nine new vulnerabilities have been identified across several TCP/IP stacks embedded in millions of OT, IoT and IT devices, spurring continued scrutiny of these already vulnerable asset types. Background On February 10, researchers at Forescout published a report called NUMBER:JACK, which details nine vulnerabilities discovered across 11 open source TCP/IP stacks. The prevalence of these stacks across embedded devices is significant. NUMBER:JACK follows in the footsteps of AMNESIA:33, a previous report by the same researchers…

Read More
1 2,404 2,405 2,406 2,407 2,408 2,551