Cyber Security

Articles on SystemTek’s website that relate to cyber security.

NewsSecurity Vulnerabilities

Four vulnerabilities found in Devolutions Remote Desktop Manager

Four vulnerabilities have been reported in Devolutions Remote Desktop Manager software.

Read More
NewsSecurity Vulnerabilities

70mai A510 Use of Default Password Authentication Bypass Vulnerability (CVE-2025-2766)

CVE number = CVE-2025-2766 – This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510.

Read More
NewsSecurity Vulnerabilities

OpenSlides Improper Neutralization of Input During Web Page Generation (CVE-2025-30345)

CVE number – CVE-2025-30345 An issue was discovered in OpenSlides before 4.2.5. When creating new chats via the chat_group.create action,

Read More
NewsCyber Security

Plans to boost skills and diversity in UK cyber backed by tech giant IBM

Technology giant IBM have backed plans to diversify the UK’s cyber sector and encourage young people into cyber careers, as the government safeguards online services which deliver economic growth – central to the Plan for Change. 

Read More
Tech TipsCyber SecurityInternet

The Most Dangerous Cyber Threats You Need to Protect Your Business Against Today

Cyber threats are evolving faster than ever, and businesses must stay vigilant to avoid becoming the next victim. With cybercrime on the rise, companies of all sizes face the constant challenge of securing their networks and data from malicious actors.

Read More
NewsSecurity Vulnerabilities

Apple macOS MOV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability (CVE-2025-24124)

CVE-2025-24124 – This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS.

Read More
NewsSecurity Vulnerabilities

IROAD Dash Cam X5 critical vulnerability (CVE-2025-2345)

CVE-2025-2345 – The IROAD X5 dashcam allows unauthorized users to modify critical system settings once connected to its network.

Read More
Tech TipsBusinessComputer

Cloud Databases vs On-Premise: The Security Debate Continues

When evaluating database solutions, security considerations often take precedence over cost factors, with the choice between cloud and on-premise systems representing fundamentally different approaches to data protection.

Read More
NewsCyber Security

Lloyds Banking Group secures patent for cybersecurity tool

Lloyds Banking Group has secured a patent for it’s new cybersecurity tool Global Correlation Engine (GCE) , this tool uses algorithms to sport genuine threats rather than false positives.

Read More
NewsSecurity Vulnerabilities

Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability (CVE-2025-20209)

CVE-2025-20209 – A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.

Read More