CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Vulnerability
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Vulnerability

Engineers working as a team showing vulnerabilities in developer tools
Cyber SecurityInsights

Protect Developer Tools Against Growing Vulnerability Threat

December 21, 2022
Developers have been increasingly targeted by attackers. Compromising a single developer enables attackers to embed malicious code into a company's products. If that product is then used by other companies, the malware can spread to their systems in a supply chain attack.
Read More
Microsoft building showing zero-day remote code execution
Cyber SecurityNews

Zero-Day Remote Code Execution Vulnerability Found in Microsoft Office; No Patch Yet, But Possible Fix Available

June 3, 2022
A zero-day remote code execution vulnerability in Microsoft Office has come to light, and is considered very serious due to potential for code execution if a victim opens a malicious document in Word.
Read More
Bug crawling on table showing privilege escalation vulnerability for Linux
Cyber SecurityNews

Microsoft Discovers Nimbuspwn Privilege Escalation Vulnerability on Linux Systems Granting Hackers Root Permissions

May 6, 2022
Microsoft 365 Defender researcher team discovered a privilege escalation vulnerability dubbed Nimbuspwn allowing an attacker to gain root privileges and deploy malicious payloads.
Read More
Server room with computer racks showing local privilege escalation in Linux
Cyber SecurityNews

All Linux Distributions Affected by 12 Year-Old PwnKit Local Privilege Escalation Bug Allowing an Attacker to Execute Commands as Root

February 4, 2022
Qualys researchers said the 12-year-old memory corruption local privilege escalation vulnerability on polkit's Set User ID program pkexec is easily exploitable by novice attackers and affects every major Linux distribution.
Read More
Tesla cars charging at Tesla super charger electric car charging station showing remote control vulnerability in third party software
Cyber SecurityNews

Digital Joyriding: Teenager Hacks Third Party Software in Tesla Cars, Enables Remote Control of Electrical and Security Systems

January 18, 2022
A 19-year-old "security specialist" has found a vulnerability in third party software used by certain Tesla vehicles, which allows the remote control of certain functions such as the engine and the security system.
Read More
Federal Trade Commission (FTC) seals in downtown showing legal action for Log4j
Cyber SecurityNews

FTC Warns Legal Action May Be Coming for Companies That Fail To Patch Log4j

January 10, 2022
Legal action may be forthcoming for organizations that do not patch Log4j. The FTC has issued an alert that references the Equifax breach (which ended in a settlement of $700 million) as a precedent.
Read More
Woman wearing glasses working on the laptop showing Proxyshell vulnerability and cyber risk
Cyber SecurityNews

Minimizing Cyber Risk: Lessons Learned From Proxyshell

November 29, 2021
The best way to deal with a vulnerability is doing what you can to prevent them from happening in the first place. Oftentimes, cyber risk can be managed even through simple and basic security hygiene practices.
Read More
Server racks in data center showing vulnerabilities in virtual appliances
Cyber SecurityInsights

Orca Security Research: Top Virtual Appliance Vendors Neglect the Security of their Products

November 27, 2020
There are significant gaps in virtual appliance security, and many products are distributed with known, exploitable, and fixable vulnerabilities and on outdated or unsupported operating systems.
Read More
Hacker using malicious code showing effect of Ripple20 and need for Zero Trust
Cyber SecurityInsights

How to Combat the Crippling Effect of Ripple20

October 22, 2020
Since patching is problematic and traditional perimeter security is ineffective for Ripple20 vulnerabilities, Zero Trust security may be the right answer.
Read More
Key on keyboard showing how the backdoors mandated by proposed encryption backdoor bill can potentially be exploited by hackers
Cyber SecurityInsights

Bill That Mandates Cyber Backdoors Will Leave Front Doors Wide Open

July 21, 2020
Proposed bill requires American tech companies to put encryption backdoors in their products for law enforcement access which can be potentially exploited by hackers.
Read More
Load More

Latest

Arrested hacker in handcuffs showing hacking forum operator charged with cybercrime

Hacking Forum “BreachForums” Alleged Owner Pompompurin Arrested and Charged With Cybercrime

Shopper using laptop showing ecommerce fraud for online brands

Online Brands: Keep Your Friends Close, and Fraud Even Closer

Pinduoduo logo on tablet showing Chinese shopping app with malware

Chinese Shopping App Pinduoduo Blocked by Google Over Signs of Malware in Its Code

hacker hand reaching out on laptop showing data breach of service providers

Latitude Financial Services Data Breach Leaked Customer Data From Two Service Providers

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results