CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Security Vulnerability
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security Vulnerability

Dark background of silhouettes of computer motherboard showing security vulnerability affecting software supply chain
Cyber SecurityNews

Blackberry Buried Security Vulnerability in OS Until Forced To Disclose by Feds; Was Discovered in April

August 23, 2021
Security vulnerability that impacts an older form of a BlackBerry industrial systems OS, still in use in both industrial settings and hospital equipment, was discovered by Microsoft researchers in April of this year. Many are only now learning about it.
Read More
Screen shot of Qualcomm logo on the smarphone showing security vulnerability on Qualcomm chips affecting Android phones
Cyber SecurityNews

Security Vulnerability in Qualcomm Chips Affects Nearly 40 Percent of Smartphones; Compromises Flagship Android Phones

May 13, 2021
Check Point discovered another security vulnerability in Qualcomm chips affecting 40% of smartphones, allowing hackers to inject code in Android phones, including Google, Samsung, LG, Xiaomi, and One Plus brands.
Read More
Hacker stealing data from laptop at night showing Iranian hackers exploiting vulnerability
Cyber SecurityNews

Iranian Hacking Group on a Tear Targeting F5 Networks Devices; Believed to be Government-Sponsored

August 21, 2020
A new FBI security alert indicates that a group of Iranian hackers are on a spree of compromising the BIG-IP products manufactured by F5 Networks.
Read More
New Amazon Echo with Alexa bug
Cyber SecurityNews

Alexa Bug Gives Hackers Access to Voice History, Personal, and Bank Account Information, Check Point Reveals

August 21, 2020
Alexa bug allows hackers to access users' voice history, personal, and banking information. The vulnerability also allows hackers to install or uninstall Alexa skills on compromised accounts.
Read More
Finger on keyboard showing SAP bug
Cyber SecurityNews

Recently Discovered SAP Bug Allows Anybody Without Technical Knowledge to Hack Business Applications

July 23, 2020
SAP bug allows a remote unauthenticated attacker to gain unrestricted access to SAP systems without a username or password to create new privileged users or shut down the entire system.
Read More
Programming code on screen showing the surge last year in exploited security vulnerabilities for open source projects
Cyber SecurityNews

Last Year’s Surge in Exploited Security Vulnerabilities for Open Source Projects Could Be Surpassed in 2020

June 25, 2020
With the doubling of security vulnerabilities found in popular open source projects between 2018 and 2019, many are concerned on the record being broken again in 2020.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results