CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Critical Vulnerabilities
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Critical Vulnerabilities

Fleet of commercial lorry trucks in row showing vehicle GPS tracker with hard-coded password vulnerabilities
Cyber SecurityNews

Hard-coded Password in Popular Vehicle GPS Tracker Allows for User Impersonation, Remote Execution of Commands

July 26, 2022
MiCODUS MV720 vehicle GPS tracker has sold some 1.5 million units across 169 countries and used in military vehicles, government cars, etc. Of the six serious vulnerabilities, one is a hard-coded password that allows anyone to send commands to the GPS units.
Read More
Screen with smart home apps on wall in modern living room showing critical vulnerabilities affecting IoT security
Cyber SecurityNews

Microsoft Discovers 25 Critical Vulnerabilities in IoT Security Affecting Google, Amazon, Samsung, and Other Devices, SDKs and Libraries

May 7, 2021
Microsoft says many IoT and operational technology devices suffer from 25 IoT security critical vulnerabilities originating from vulnerable SDKs, RTOS, and the C standard library.
Read More
Hacker hands in black gloves using laptop showing cyber attacks targeting critical vulnerabilities
Cyber SecurityNews

Massive Cyber Attacks Target F5 BIG-IP Critical Vulnerabilities After Firm Releases Updates

March 31, 2021
NCC Group and Bad Packets detected cyber attacks targeting F5 critical vulnerabilities after proof-of-concept code and patches were released. CISA advised users to prioritize the installation of updates.
Read More

Latest

Shield Icon against data and network showing zero trust and attack surface

Gartner: Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

Data Privacy’s Tipping Point: Where We Go From Here

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results