CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Vulnerabilities
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Vulnerabilities

Hooded computer hacker showing cybersecurity vulnerability Log4j scanners
Cyber SecurityNews

CISA and Other Third Parties Publish Log4j Scanners To Detect Log4Shell Vulnerabilities but Most Fail To Identify All Instances

December 30, 2021
CISA released its customized Log4Shell scanning solution and a list of other third-party scanners. However, all the Log4j scanners tested by Rezilion failed to detect all file formats.
Read More
Microsoft store in New York showing authentication bypass vulnerability for Microsoft Exchange Servers
Cyber SecurityNews

ProxyToken Authentication Bypass Flaw Allows Hackers To Copy Victims’ Emails on Vulnerable Microsoft Exchange Servers

September 8, 2021
Hackers could exploit ProxyToken authentication bypass vulnerability to steal victims’ emails and personally identifiable information from vulnerable Microsoft Exchange servers.
Read More
Close up of woman hand using laptop with email icons showing ProxyLogin vulnerabilities affecting Microsoft Exchange
Cyber SecurityInsights

Understanding ProxyLogon Vulnerabilities and How to Secure Them

June 4, 2021
ProxyLogon vulnerabilities can cause significant issues for affected companies. Fortunately, Microsoft offered several solutions for fixing these problems, even providing one for people lacking on-site security assistance.
Read More
Bug on a chip showing vulnerabilities in open source libraries used by smart devices
Cyber SecurityNews

Millions of Smart Devices Affected by Vulnerabilities in the Firmware’s Networking Open-Source Libraries

December 21, 2020
Security researchers discovered 33 vulnerabilities in millions of devices using four popular open-source libraries. The bugs allow attacks, including remote code execution and DDoS.
Read More

Latest

Cyber attack on smartphone showing Android spyware for surveillance

Android Spyware Discovered in Kazakhstan in Wake of Protests Against National Government

Automobile production line showing OT devices vulnerabilities for industrial control systems

Warning for Industrial Control Systems: Research Discovers 56 “Insecure by Design” Vulnerabilities in Two Dozen OT Devices

User typing password on screen showing portable digital identity

Are Portable Digital Identities Swiftly Replacing Conventional Passwords?

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results