ChannelLife US - Industry insider news for technology resellers

Common Vulnerabilities and Exposures (CVE) stories - Page 5

Cyber hack

Zero-day Internet Explorer vulnerability exploited in the wild

Wed, 25th Sep 2019
#
microsoft
#
security vulnerabilities
#
patching
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.
Malware6

Check Point names February's most disruptive malware

Tue, 12th Mar 2019
#
security vulnerabilities
#
coinhive
#
cryptomining
Coinhive tops Check Point's Global Threat Index for February 2019, marking its 15th month as the most disruptive malware despite its impending shutdown.
Thinkstockphotos 846251202

Attackers exploit macro-less Office documents to create havoc

Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
Thinkstockphotos 862290790

China cyberespionage group targets US maritime & engineering sectors

Mon, 19th Mar 2018
#
malware
#
breach prevention
#
cybersecurity
A China-based cyberespionage group may be targeting United States engineering and maritime industries tied up in activities about the South China Sea.
Thinkstockphotos 835872374

Australia a hot target for BEC scams, malicious URLs and malware

Tue, 12th Sep 2017
#
malware
#
cybersecurity
#
trend micro
More than a quarter of all business email compromise (BEC) scams around the world target Australia, new research says.
Thinkstockphotos 817486036

State-sponsored election hacks are acts of cyber warfare - survey

Mon, 11th Sep 2017
#
elections
#
venafi
#
security vulnerabilities
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country's election.
Trojan attack

New Sofacy attacks against US government agency

Wed, 15th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Cyber hack pattern

The surprisingly scary patterns revealed in hack attacks

Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.