CFOtech India - Technology news for CFOs & financial decision-makers

Patching stories - Page 2

Enterprise it ops room linux infrastructure cloud dashboards

CIQ launches RLC Pro to back Rocky Linux for enterprises

Last month
#
devops
#
hybrid cloud
#
hyperscale
CIQ unveils RLC Pro, a paid Rocky Linux subscription promising long-term support, FIPS-ready security and vendor-backed bug fixes.
Mark

Splashtop links endpoint management with CrowdStrike

Last month
#
ai security
#
edr
#
security operations
Splashtop has integrated its Autonomous Endpoint Management with CrowdStrike Falcon, unifying Windows endpoint status for IT and security teams.
Moody legacy code wall crumbling with bugs and stressed engineers

Security debt surges as legacy vulnerabilities pile up

Last month
#
data protection
#
devops
#
application security
Security debt hits 82% of organisations as legacy flaws linger over a year, with third-party code driving most critical vulnerabilities.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Last month
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.
Ciso in dark ops room facing cloud ai chasm moody us scene

Tenable warns AI outpacing security, widening risk gap

Last month
#
pam
#
cloud security
#
application security
Tenable warns cloud and AI adoption is creating a widening 'zero‑margin' security gap as exposure grows faster than defenders can respond.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Last month
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Last month
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Last month
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Dim server room windows rack red warning remote access breach

Active exploitation seen in BeyondTrust access flaw

Last month
#
firewalls
#
network security
#
pam
Arctic Wolf says attackers are actively exploiting a critical BeyondTrust vulnerability in self-hosted remote access systems.
Moody data center linux servers botnet ssh attacks asian city skyline

SSHStalker botnet preys on legacy Linux & cloud hosts

Last month
#
malware
#
firewalls
#
hyperscale
A newly uncovered SSHStalker botnet uses old-school IRC and legacy Linux exploits to hijack outdated corporate and cloud hosts at scale.
Smart home living room night family devices secure wifi router

Most homes never change router passwords, guide warns

Last month
#
malware
#
firewalls
#
data protection
Most households leave router admin passwords unchanged, prompting insurer Everywhen to issue a 10‑step guide to secure home Wi‑Fi.
Modern windows desktop security patch shield zero day fix

Microsoft patches zero-day flaws in latest Windows update

Last month
#
iam
#
cybersecurity
#
microsoft
Microsoft rolls out fixes for 55 Windows flaws, including six exploited zero-days hitting Shell, MSHTML, Word and key desktop services.
Looming wave digital vulnerabilities cracked software cubes

Cybersecurity teams brace for surge in global CVEs in 2026

Last month
#
siem
#
cloud security
#
supply chain
Cyber group FIRST warns CVE disclosures could smash records in 2026, topping 50,000 and potentially surging towards six figures.
Moody windows server room red rack cracked email lock binary

SmarterMail flaw exploited in China-linked ransomware push

Last month
#
firewalls
#
vpns
#
ransomware
China-linked Warlock ransomware group exploits SmarterMail flaw for admin takeovers, chaining features to gain full Windows control.
Yuvraj

Exclusive: Yuvraj Pradhan warns legacy VPNs are now a security risk

Last month
#
malware
#
firewalls
#
vpns
Legacy VPNs are emerging as a prime security liability as hybrid work, identity‑based attacks and cloud apps expose their design flaws.
Moody corporate cloud analytics server room cracked shield leak

Tenable reveals 'LookOut' flaws that endanger Google Looker

Last month
#
firewalls
#
data analytics
#
network security
Tenable warns 'LookOut' flaws in Google Looker could hand attackers server control, expose secrets and enable cross-tenant cloud access.
Dark server room red glowing rack critical data leak cinematic

Tenable finds critical flaws in Google Looker platform

Last month
#
private cloud
#
hybrid cloud
#
data analytics
Tenable warns critical Google Looker flaws could enable server takeover and data theft, leaving unpatched self-hosted deployments exposed.
Moody server room data leak shadowy figures cross tenant breach

Tenable reveals Looker flaws risking cross-tenant attacks

Last month
#
data analytics
#
cloud security
#
application security
Tenable warns unpatched self-hosted Google Looker systems face remote takeover, data theft and cross-tenant cloud attack risks.
Cloud shield of secure containers with locks gears investment

RapidFort raises USD $42m for automated vuln fixes

Last month
#
cloud security
#
application security
#
devsecops
RapidFort secures USD $42m Series A to scale automated software supply chain security and continuous vulnerability remediation.
Moody smart home night wifi router dark web online fraud net

Global router hijack uses rogue DNS to monetise web

Last month
#
firewalls
#
network security
#
iot security
Hackers are hijacking ageing home routers worldwide, covertly rewiring DNS to quietly cash in on everyday web browsing traffic.