CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Security Vulnerability
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security Vulnerability

Hacker stealing data from laptop at night showing Iranian hackers exploiting vulnerability
Cyber SecurityNews

Iranian Hacking Group on a Tear Targeting F5 Networks Devices; Believed to be Government-Sponsored

August 21, 2020
A new FBI security alert indicates that a group of Iranian hackers are on a spree of compromising the BIG-IP products manufactured by F5 Networks. Read More
New Amazon Echo with Alexa bug
Cyber SecurityNews

Alexa Bug Gives Hackers Access to Voice History, Personal, and Bank Account Information, Check Point Reveals

August 21, 2020
Alexa bug allows hackers to access users' voice history, personal, and banking information. The vulnerability also allows hackers to install or uninstall Alexa skills on compromised accounts. Read More
Finger on keyboard showing SAP bug
Cyber SecurityNews

Recently Discovered SAP Bug Allows Anybody Without Technical Knowledge to Hack Business Applications

July 23, 2020
SAP bug allows a remote unauthenticated attacker to gain unrestricted access to SAP systems without a username or password to create new privileged users or shut down the entire system. Read More
Programming code on screen showing the surge last year in exploited security vulnerabilities for open source projects
Cyber SecurityNews

Last Year’s Surge in Exploited Security Vulnerabilities for Open Source Projects Could Be Surpassed in 2020

June 25, 2020
With the doubling of security vulnerabilities found in popular open source projects between 2018 and 2019, many are concerned on the record being broken again in 2020. Read More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results