iTWire TV 160x1200notfunny

iTWire TV 160x1200notfunny

×

Message

Failed loading XML... Document is empty

iTWire TV 705x108notfunny

GUEST RESEARCH:  Java software vendor Azul, has released its second annual Azul State of Java Survey & Report, offering insights into how organisations leverage Java in an evolving technology landscape.

GUEST RESEARCH :  Yet, 44% of consumers think purchasing via social media is a quick and easy way to keep up with trends.

Thoughtworks, a global technology consultancy integrating strategy, design and engineering to drive digital innovation, today released the fifth edition of Looking Glass, a report designed to help companies navigate industry shifts and identify new opportunities for growth. The report features five chapters, which the company calls ‘lenses’; each one is designed to help readers better analyse today’s most important technology trends.

GUEST RESEARCH: Trustwave, a leading cybersecurity and managed security services provider,  has released a series of reports detailing the threats facing the energy and utilities sector, which is increasingly targeted due to its critical role in supporting national and global infrastructures. 

Friday, 17 January 2025 13:24

Patch Tuesday Commentary from Tenable

GUEST RESEACH:  Microsoft patched a whopping 157 CVEs in its inaugural Patch Tuesday for 2025. Not only is this the largest number of CVEs patched in January, it is the largest number of CVEs patched across any Patch Tuesday release since 2017. Microsoft set a record in April 2024, patching 147 CVEs. Since 2017, the average number of CVEs patched in January was 60. Prior to 2025, the largest January Patch Tuesday release was 2023, which saw Microsoft patch 98 CVEs. In 2024, Microsoft opened the year with 48 CVEs patched. Please find below a comment from Satnam Narang, sr. staff research engineer at Tenable and a full analysis in this blog.

GUEST RESEARCH:  Infoblox Threat Intel researchers have discovered new insights into the use of spoofed domains in modern malicious spam (malspam) campaigns, sending unsolicited emails that contain harmful attachments or links designed to infect the recipient's computer with malware or to steal sensitive information. This reveals how threat actors exploit domain spoofing and how pervasive this technique is. The information was gathered through a collective effort following the initial Muddling Meerkat research, with various individuals sharing data showing Muddling Meerkat behavior with the researchers. This underscores the importance of collaborative efforts in cybersecurity, as sharing data and insights can lead to significant discoveries and improvements in threat detection and mitigation.

GUEST RESEARCH:  Dragos's Industrial Ransomware Analysis Report Q3 2024  revealed that the ransomware threat ecosystem remained highly active, driven by the emergence of new groups, rebranding of existing entities, the expansion of initial access broker (IAB) operations, and the proliferation of illicitly traded tools. Operators demonstrated a growing ability to adapt to disruptions, leveraging technological advancements and strategic realignments to sustain their operations.

GUEST RESEARCH:

Executive Summary

  • Team82 has researched devices manufactured by Ruijie Networks and discovered 10 vulnerabilities in its Reyee cloud management platform
  • These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices
  • The vulnerabilities, if exploited, could allow a malicious attacker to execute code on any cloud-enabled device, giving them the ability to control tens of thousands of devices
  • In addition, Team82 has devised an attack called Open Sesame, in which an attacker can pinpoint exploit a device in close physical proximity through the cloud, executing arbitrary code on it and gaining access to its internal network

Appian research reveals that data challenges remain in spite of digital initiatives, impacting efficiency, reporting, customer service, and compliance

Australian energy companies face data accessibility challenges, with 78% of them having adopted new digital tools in the past five years but “data silos remain a challenge”, according to new research.

GUEST RESEARCH: 81% of enterprises plan to increase investments in AI-powered IT operations to accelerate performance, resilience, and scalability

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments