Millie
your market intelligence analyst
Search Results
Edit Save
2,243 results
Global Security 10/16/2019 10:02
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Linux. Severity: 1/4. Consequences: denial of service on server, denial of service on service. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 01/10/2019. DESCRIPTION OF THE VULNERABILITY An attacker can create a memory leak via hsr_dev_finalize() of the Linux kernel, in order to trigger a denial (...). -
Global Security 10/16/2019 08:48
ARBOR Technology releases the latest digital signage player IEC-3900 to level up the multimedia display experience. The IEC-3900's compact rugged design is built for high quality computing and multi-functional digital signage applications in harsh environments. 2 x 4K HDMI Video Outputs for Graphic Performance ARBOR's new multiple display terminal IEC-3900 is powered by the 7TH generation Intel Core i7 or Kaby Lake processor that supports both Windows 10 IoT and Linux operating systems. It (...). -
Global Security 10/16/2019 08:46
Advanced persistent threat (APT) activity in the third quarter of 2019 has indicated an increase in the usage and number of new and previously unknown malicious toolsets. This is a sign of a consistent trend of the threat actor exodus into deeper waters, to evade detection. These and other APT trends across the world are covered in Kaspersky's latest quarterly threat intelligence summary. A three-month APT trends summary for the last quarter came from Kaspersky's private threat intelligence (...). -
Global Security 10/16/2019 04:29
ZIVVER announced that it is making its unique outbound email and file transfer security solution available to the UK market for the first time. ZIVVER helps organisations to prevent data leaks, improve compliance and save costs from ineffective communication via fax, snail mail and courier, by securing outgoing emails and file transfers throughout the whole communications process, i.e. before, during and after sending. ZIVVER calls this ‘triple safe' technology. Research shows that (...). -
Global Security 10/16/2019 04:27
Earlier this year, the US credit card provider Capital One suffered one of the most jarring data leaks of the last decade. Sensitive financial data from over 106 million customers had been stolen and made freely accessible on the web for weeks. Now, recent analyses are showing how the massive corporate structures of third-party contractor Amazon may have caused problems with shared data infrastructure, risk assessment and awareness of potential threats, as well as security upgrades. “The (...). -
Global Security 10/16/2019 04:23
Cyber security provider F-Secure has successfully completed its first-round of the MITRE ATT&CK™ evaluation. The test assesses vendors' endpoint detection and response (EDR) solutions against techniques used by advanced persistent threat (APT) groups. It confirms that F-Secure's capabilities to detect advanced threats are among the best in the industry. Round one of the evaluation involved a scenario that pitted F-Secure's EDR capabilities against an entire intrusion by APT3, a China-based (...). -
Global Security 10/15/2019 15:09
“BriansClub,” one of the largest underground stores for buying stolen credit card data, has itself been hacked. The data stolen from "BriansClub" encompasses more than 26 million credit and debit card records taken from hacked online and brick-and-mortar retailers over the past four years, including almost eight million records uploaded to the shop in 2019 alone. More on the story here: https://krebsonsecurity.com/2019/10... Ilia Kolochenko, founder and CEO of web security company (...). -
Global Security 10/15/2019 10:15
Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. This figure is seven times more than the number found in H1 2018, when only around 12 million attacks were spotted originating from 69,000 IP addresses. Capitalising on weak security of IoT products, cybercriminals are intensifying their attempts to create and (...). -
Global Security 10/15/2019 10:10
SIMalliance, the non-profit association which represents the global SIM industry, has published a specification which will support remote firmware loading across removeable, embedded and integrated SIMs. Standardisation in this area is necessary because the emergence of new SIM form factors, implemented in different types of Secure Element (SE), has led to variations in how service providers maintain and evolve SIM cards once deployed in the field. SIMalliance's new specification –Image (...). -
Global Security 10/15/2019 09:49
Flexera announces the findings of the Flexera 2020 State of Tech Spend Report. The first annual Flexera 2020 State of Tech Spend Report provides insight into current and future technology spend from the perspective of enterprise CIOs and IT executives. The report highlights how companies are shifting spending to support their critical IT initiatives, how they're tracking and managing IT spend, and the challenges they face in optimising spend. Survey respondents are IT executives working in (...). -
Global Security 10/15/2019 06:08
F-Secure and Zyxel are taking their cooperation to the next level by offering F-Secure SENSE connected home security to deliver fast, secure Wi-Fi that protects against the growing number of threats targeting connected home devices. In 2018, F-Secure and Zyxel signed an agreement to bring F-Secure Connected Home Security – an offering for service providers that combines gateway security and endpoint protection – to people and families throughout the globe. Now Zyxel will roll out F-Secure's (...). -
Global Security 10/15/2019 05:00
Crossword Cybersecurity Plc announces that it has signed a Memorandum of Understanding (MoU) with Leonardo MW Ltd (“Leonardo”), a global high-tech Aerospace Defence and Security company. The cooperation between Crossword and Leonardo will enable Leonardo's National Cyber Security Centre's certified cyber consultancy to use Rizikon Assurance to enhance its risk assessment and risk management practice for customers. Leonardo targets its cyber security offerings at Government, Defence and (...). -
Global Security 10/15/2019 03:47
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: iOS by Apple, iPhone. Severity: 1/4. Consequences: administrator access/rights, privileged access/rights, user access/rights. Provenance: internet server. Confidence: confirmed by the editor (5/5). Creation date: 30/09/2019. DESCRIPTION OF THE VULNERABILITY An attacker can bypass restrictions via extensions of Apple iOS, in order to (...). -
Global Security 10/14/2019 08:55
Proact IT Group AB announces the acquisition of PeopleWare ICT Solutions BV, an IT managed service provider based in the Netherlands and Belgium. Acquisitions are a key part of Proact's updated growth target with the ambition to broaden the portfolio of offerings and expand the presence in key markets. Founded in 2003, PeopleWare is a privately held company with over 220 employees and more than 170 active customers. The acquisition will greatly enhance Proact's presence and ability to serve (...). -
Global Security 10/14/2019 05:09
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can act as a Man-in-the-Middle on Open Build Service osc, in order to read or write data in the session. Impacted products: openSUSE Leap. Severity: 2/4. Consequences: data reading, data creation/edition. Provenance: internet server. Confidence: confirmed by the editor (5/5). Creation date: 13/08/2019. DESCRIPTION OF THE VULNERABILITY The Open (...). -
Global Security 10/14/2019 04:50
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting via setup test page of Ignite Openfire, in order to run JavaScript code in the context of the web site. Impacted products: Openfire. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 13/08/2019. DESCRIPTION OF THE VULNERABILITY (...). -
Global Security 10/14/2019 04:47
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can use a SQL injection of Joomla JS Support Ticket, in order to read or alter data. Impacted products: Joomla Extensions not comprehensive. Severity: 2/4. Consequences: data reading, data creation/edition, data deletion. Provenance: internet client. Confidence: confirmed by the editor (5/5). Creation date: 13/08/2019. DESCRIPTION OF THE (...). -
Global Security 10/13/2019 10:28
Tenable®, Inc., announced an extension of the Tenable platform to bring Tenable Lumin™ to Tenable.sc™, for vulnerability management on-premises. . For the first time, all Tenable platform customers will be able to leverage the power of the cloud and machine learning to accurately score, trend and benchmark their organization's cyber exposure. Tenable Lumin includes the following core innovations: Cyber Exposure Score: The Cyber Exposure score is an objective measure of cyber risk, derived (...). -
Global Security 10/13/2019 10:27
Aruba, a Hewlett Packard Enterprise company announced that in Gartner Inc.'s latest "Magic Quadrant for Wired and Wireless LAN Infrastructure" report, HPE (Aruba) has been positioned in the Leaders quadrant for the fourteenth year and has received the highest score in five out of six use cases within the Gartner Critical Capabilities for Wired and Wireless LAN Infrastructure, a companion report to the Magic Quadrant.

Chemicals - Agricultural

Chemicals - Industrial

Business Issues

Companies - Public

Companies - Venture Funded

Commodity Prices

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications