vulnerabilities

DRAY:BREAK Breaking Into DrayTek Routers Before Threat Actors Do It Again

In 2024, routers are a primary target for cybercriminals and state-sponsored attackers – and are the riskiest device category on networks. With this knowledge, we investigated one vendor with a history of security flaws to help it address its issues and prevent new attacks. Our latest research discovered 14 new vulnerabilities in DrayTek routers: Given […]

DRAY:BREAK Breaking Into DrayTek Routers Before Threat Actors Do It Again Read More »

Perils in the Periphery: A 2024 H1 Threat Review

In the first half of 2024, Forescout Research – Vedere Labs published a diverse range of blog posts and reports analyzing prominent vulnerabilities, threat actors and ransomware. Our data shows state-sponsored actors are using hacktivist persona and are targeting VPN vulnerabilities as entry points. Attackers have shifted from managed endpoints to the unmanaged perimeter for

Perils in the Periphery: A 2024 H1 Threat Review Read More »

Cyber Revolution Summit

Cybersecurity Innovations: Leading the Future of Protection We TraiCon Events will be hosting Philippines’ premier cyber security event titled as “Cyber Revolution Summit” scheduled on 10th September 2024 in, Philippines.This summit will feature keynote presentations and panel discussions with top security experts from various industries covering a range of topics, including cybersecurity innovations, data privacy

Cyber Revolution Summit Read More »

State of CPS Security Report

We have been conditioned as an industry to equate healthcare cybersecurity with data privacy. The Health Insurance Portability and Accountability Act (HIPAA) has been the impetus for this approach for 27 years by zeroing in on the protection of personal patient information and enacting privacy and security rules aimed at keeping such data confidential. For

State of CPS Security Report Read More »

OTSEC SUMMIT SAUDI – 2024

With the steady adoption of IoT and personal connected devices, it’s reported an increase of over 4 fold in IoT malware attacks year-over-year in the Middle East region. The growth in cyber threats demonstrates cyber criminals’ persistence and ability to adapt to evolving conditions in launching IoT malware attacks. Cybercriminals are targeting legacy vulnerabilities, with

OTSEC SUMMIT SAUDI – 2024 Read More »

SIERRA:21 – Living on the Edge

Forescout Vedere Labs has discovered 21 new vulnerabilities within OT/IoT routers and open-source software components, highlighting new risk in your critical infrastructure. This new research confirms some of the trends that Forescout Vedere Labs has been tracking and analyzing: Vulnerabilities (and consequently attacks) on routers and network infrastructure are on the rise. State-sponsored actors have

SIERRA:21 – Living on the Edge Read More »

Global Threat Intelligence Report

Introduced back in January 2023, the BlackBerry® Global Threat Intelligence Report has become a key reference guide for cybersecurity professionals worldwide, including CISOs and other decision makers, to keep the security community informed of the latest cybersecurity threats and challenges globally affecting their industries and platforms. In this latest issue, the BlackBerry Threat Research and

Global Threat Intelligence Report Read More »

Ransomware Resilience 2023

Rising Ransomware Threat in Asia Pacific Ransomware attacks are on the rise in the Asia Pacific region, making them more prevalent now than ever before. While some organizations have suffered financially, others have suffered legal ramifications. According to the Global State of Industrial Cybersecurity: Resilience Amidst Disruption report, 65% of organizations in the APAC were

Ransomware Resilience 2023 Read More »

Recorded Future CVE Monthly August 2023

We identified 18 newly disclosed vulnerabilities with high risk scores for August 2023, 2 of which were zero-day vulnerabilities affecting Microsoft and Ivanti products. Exploitation activity this month demonstrated that multiple medium-severity vulnerabilities can be exploited together to achieve the effects of 1 high-severity vulnerability; the actively exploited vulnerabilities that attracted some of the highest

Recorded Future CVE Monthly August 2023 Read More »