Vulnerabilities

Fake e-shops on the prowl for banking credentials using android malware

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks The popularity of online shopping has been growing during the past few years, a trend accelerated by the pandemic. To make this already convenient way of never having to leave the couch to buy new things even more convenient, people are increasingly using […]

Fake e-shops on the prowl for banking credentials using android malware Read More »

The State of Developer-Driven Security Survey

The Secure Code Warrior ‘State of Developer-Driven Security’ survey was conducted by Evans Data Corp in December of 2021. Questions about software coding, security awareness, training, support, motivations, and other issues were asked of 1,200 active software developers working in the Asia-Pacific region, Europe and North America. The survey was given in English and translated

The State of Developer-Driven Security Survey Read More »

Access:7

Executive Summary Vedere Labs and CyberMDX have identified 7 vulnerabilities affecting the PTC Axeda agent, which we are collectively calling Access:7. Exploiting these vulnerabilities, attackers with network access to a target device could remotely execute code, access its file system or alter system configurations. The Axeda solution enables device manufacturers to remotely access and manage

Access:7 Read More »

2022 State of the Phish

Last year, we titled our introduction “A Year Like No Other.” We could easily have repeated that heading to describe 2021. The year has left many organizations contemplating what “normal” will mean for their workforces going forward. Along with hybrid and remote work options, organizations are mulling the best ways to keep employees connected and

2022 State of the Phish Read More »

Ransomware: Through the Lens of Threat and Vulnerability Management

Since we published our 2021 Spotlight Report and index updates (1, 2, and 3) that highlighted key metrics, we have been tracking ransomware threats. We have been able to warn organizations and product vendors about ransomware threats and the specific vulnerabilities these threats are targeting through these reports. This report brings you trends that we

Ransomware: Through the Lens of Threat and Vulnerability Management Read More »

Cyber Security Report 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically

Cyber Security Report 2022 Read More »

ENQUIRE NOW

PLEASE COMPLETE