ChannelLife India - Industry insider news for technology resellers

Exploits stories

Soc analysts wall screens confirmed attack path low alert noise

Contrast links ADR with Datadog SIEM to cut alert noise

Wed, 17th Dec 2025
#
firewalls
#
ransomware
#
siem
Contrast plugs its ADR into Datadog Cloud SIEM, streaming verified runtime attack data to slash alert noise and speed SecOps response.
Techday f 6ff748a261669589bbaa

Picus launches tool for real-time validation of exploitable risks

Fri, 23rd May 2025
#
semiconductors
#
devops
#
advanced persistent threat protection
Picus Security launches Exposure Validation, a tool using real-time attack simulations to identify which vulnerabilities are truly exploitable in organisations.
Techday f 671d4abef807294a2d22

Mandiant report finds rise in financially motivated cyber attacks

Thu, 24th Apr 2025
#
mfa
#
cloud security
#
advanced persistent threat protection
Mandiant's 2024 report reveals a rise in financially motivated cyber attacks, with 55% of threat groups seeking profit, while detection remains a major challenge globally.
Techday f aa85b23f9f9166963a59

Manufacturing sector faces 24% rise in ransomware attacks

Fri, 14th Feb 2025
#
ransomware
#
manufacturing
#
advanced persistent threat protection
ReliaQuest's new report reveals a worrying 24% rise in ransomware attacks on the manufacturing sector, impacting 624 companies between August 2024 and January 2025.
Techday 3c6419f8ad23b1bff6ca

GitHub partners with Endor Labs to boost security features

Fri, 14th Feb 2025
#
cloud security
#
application security
#
devsecops
GitHub has partnered with Endor Labs, integrating advanced security software to help developers swiftly identify and manage critical vulnerabilities within the platform.
Techday d1935e86bfc527e2a477

Tenable unveils autonomous solution for patch management

Wed, 11th Dec 2024
#
cloud security
#
it automation
#
risk & compliance
Tenable has launched Tenable Patch Management, an autonomous solution designed to streamline vulnerability remediation amid increasing cyber threats.
Techday ca43607724538ffb20aa

Opus security unveils advanced AI-driven vulnerability engine

Wed, 11th Sep 2024
#
uc
#
risk & compliance
#
ai
Opus Security unveils its AI-powered Advanced Multi-Layered Prioritization Engine, revolutionising how organisations manage and address vulnerabilities.
Img 0mpqhbdv8iu6wm2dourvcejd

RedTail cryptomining malware exploits new Palo Alto flaw

Mon, 3rd Jun 2024
#
crypto
#
blockchain
#
cybersecurity
Hackers exploiting newly found vulnerability in Palo Alto's PAN-OS are using RedTail malware to enhance cryptomining operations, raising cybersecurity alarms.
Img z4tup2b9pnsx6ctfvdib5g85

Rapid7's 2024 report reveals surge in zero-day exploits

Wed, 22nd May 2024
#
mfa
#
advanced persistent threat protection
#
exploits
Rapid7's 2024 Attack Intelligence Report highlights a sharp rise in zero-day vulnerabilities causing mass breaches and underscores the necessity for faster patching and robust MFA protocols.
Img vhx2xwfill4zygjddx6ipdjf

Record rise in zero-day vulnerabilities exposed in Google-Mandiant report

Tue, 2nd Apr 2024
#
advanced persistent threat protection
#
microsoft
#
ios
Google and Mandiant's cybersecurity report reveals a 50% rise in exploited zero-day vulnerabilities in 2023, with China being the leading perpetrator.
Img eyh2orkequvfpaghfpdak9gu

New Relic releases interactive security testing with proof-of-exploit reports

Thu, 14th Mar 2024
#
application security
#
devsecops
#
apm
New Relic's observability platform now offers Interactive Application Security Testing (IAST) with a proof-of-exploit reporting feature, enabling real-time identification and fixing of application vulnerabilities before code deployment.
Img ixdct8wibxo7ontxikl9cvkl

Cybersecurity is your defensive strategy, cyber resilience is your business

Fri, 16th Feb 2024
#
ransomware
#
cybersecurity
#
disruption
In light of the massive cybersecurity breach impacting Ivanti solutions, firms are urged to embrace cyber resilience for business continuity, demonstrating greater fortitude against potential disruptions.
Img uzy3kgezdqtaejdydfrumtjn

Data Theorem sweeps 2023 CyberSecured Awards with cloud & mobile protections

Thu, 28th Dec 2023
#
application security
#
multi-cloud
#
supply chain
Data Theorem's Cloud Secure and Mobile Protect acclaimed for top cloud security and mobile API threat protection at 2023 CyberSecured Awards.
Java

First Azul State of Java survey reveals Java's crucial role in tech industry

Wed, 25th Oct 2023
#
private cloud
#
hybrid cloud
#
public cloud
Azul's inaugural State of Java survey highlights Java's vital role in global tech, with 98% of firms reporting usage.
Ameya talwalkar landscape

Cequence brings API protection to HPE GreenLake Marketplace

Wed, 18th Oct 2023
#
risk & compliance
#
hpe
#
fraud
Cequence Security offers first-ever API protection on the HPE GreenLake Marketplace, promoting visibility, reduced costs, and minimised business risks.
Gettyimages 817486068

Telegram, AWS, and Alibaba Cloud targeted in latest supply chain attack

Fri, 13th Oct 2023
#
hyperscale
#
public cloud
#
supply chain
An attacker attempted to exploit the open-source community by uploading a series of malicious packages to the PyPi package manager.
Gettyimages 1333874392

Recorded Future discloses new high-risk vulnerabilities

Tue, 19th Sep 2023
#
risk & compliance
#
microsoft
#
zero day malware
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
Gettyimages 1491848386

CyFox identifies critical hijacking vulnerability in popular streaming software

Thu, 3rd Aug 2023
#
physical security
#
digital entertainment
#
software development
Critical hijacking vulnerability in Stremio 4.4 puts 5 million users at risk; remote code execution and information theft possible.
Gettyimages 1156955640

Lookout finds predatory behaviour on 300 loan apps

Thu, 1st Dec 2022
#
application security
#
email security
#
casb
Almost 300 loan apps found in Africa, Southeast Asia, India, Colombia, and Mexico exhibit predatory behavior, says Lookout.
Gettyimages 1324017792

Cybersecurity loopholes prevalent in South East Asia

Tue, 27th Sep 2022
#
advanced persistent threat protection
#
cybersecurity
#
healthtech
In terms of the share of vulnerabilities with publicly available exploits, three countries out of top five are located in Southeast Asia.