Cyber Security

Articles on SystemTek’s website that relate to cyber security.

Tech TipsCyber SecurityInternet

The Most Dangerous Cyber Threats You Need to Protect Your Business Against Today

Cyber threats are evolving faster than ever, and businesses must stay vigilant to avoid becoming the next victim. With cybercrime on the rise, companies of all sizes face the constant challenge of securing their networks and data from malicious actors.

Read More
NewsSecurity Vulnerabilities

Apple macOS MOV File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability (CVE-2025-24124)

CVE-2025-24124 – This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS.

Read More
NewsSecurity Vulnerabilities

IROAD Dash Cam X5 critical vulnerability (CVE-2025-2345)

CVE-2025-2345 – The IROAD X5 dashcam allows unauthorized users to modify critical system settings once connected to its network.

Read More
Tech TipsBusinessComputer

Cloud Databases vs On-Premise: The Security Debate Continues

When evaluating database solutions, security considerations often take precedence over cost factors, with the choice between cloud and on-premise systems representing fundamentally different approaches to data protection.

Read More
NewsCyber Security

Lloyds Banking Group secures patent for cybersecurity tool

Lloyds Banking Group has secured a patent for it’s new cybersecurity tool Global Correlation Engine (GCE) , this tool uses algorithms to sport genuine threats rather than false positives.

Read More
NewsSecurity Vulnerabilities

Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability (CVE-2025-20209)

CVE-2025-20209 – A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.

Read More
NewsSecurity Vulnerabilities

Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability (CVE-2025-2233)

CVE-2025-2233 allows attackers to bypass authentication on Samsung SmartThings due to improper signature verification.

Read More
NewsSecurity Vulnerabilities

Veritas Arctera InfoScale Critical Vulnerability (CVE-2025-27816)

CVE-2025-27816 is a critical vulnerability that was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages.

Read More
NewsCyber Security

Research reveals NHS cyber security perceptions

94% of NHS staff understand their role in protecting the organisation from cyber-attacks, yet only 36% believe current measures are sufficient, new online research from BT has found.

Read More
NewsSecurity Vulnerabilities

Trimble SketchUp SKP File Parsing Uninitialized Variable Remote Code Execution Vulnerability (CVE-2025-2024)

CVE-2025-2024 – This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp.

Read More