CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Malicious Code
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Malicious Code

Wordpress.org homepage showing Wordpress plugins with malicious code
Cyber SecurityNews

Over 47,000 Malicious WordPress Plugins Are Active on Nearly 25,000 Websites

September 9, 2022
Nearly 25,000 active websites have over 47,000 malicious WordPress plugins installed, putting them at risk of attacks, including complete takeover by cybercriminals.
Read More
Website of GitHub showing malicious code in code repositories
Cyber SecurityNews

Tens of Thousands of GitHub Code Repositories Cloned With Malicious Code Added; Hacker Claims Campaign Was Elaborate Bug Bounty Effort

August 10, 2022
Security researchers have found over 35,000 code repositories with malicious forks or clones leading back to a single source. Malware in the tainted code repositories is designed to steal environment variables, stored elements that serve as authentication for various online services.
Read More
Graphics card with a row of fans showing malicious code
Cyber SecurityNews

Toolkit To Hide and Execute Malicious Code on Nvidia, AMD and Intel Graphics Cards Sold by a Hacker Online

September 10, 2021
A threat actor sold for an undisclosed amount a toolkit to conceal and execute malicious code without detection on most graphics cards, including AMD, Nvidia, and Intel.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results