newsAndroxgh0st botnet integrates Mozi payloads to target IoT devicesThe malware has added exploits for more web applications and devices to its arsenal and some of them seem to be inherited from an older botnet called Mozi.By Lucian Constantin08 Nov 20245 minsBotnetsThreat and Vulnerability ManagementVulnerabilities news Cisco IoT wireless access points hit by severe command injection flawBy John E. Dunn07 Nov 20241 minWireless SecurityNetwork SecurityVulnerabilitiesnews Infostealers are using BYOVD to steal critical system dataBy Shweta Sharma07 Nov 20243 minsVulnerabilitiesSecurity opinionKicking dependency: Why cybersecurity needs a better model for handling OSS vulnerabilitiesBy Chris Hughes 06 Nov 202411 minsThreat and Vulnerability ManagementSupply ChainSecurity Software newsOkta’s ‘secure by design’ pledge suffers a buggy setbackBy Shweta Sharma 05 Nov 20244 minsAuthenticationVulnerabilitiesSecurity newsA new SharePoint vulnerability is already being exploitedBy Daniel Olszewski 04 Nov 20243 minsWindows SecurityVulnerabilitiesSecurity newsCritical SolarWinds flaw finds exploitations in the wild despite available fixesBy Shweta Sharma 17 Oct 20243 minsVulnerabilitiesSecurity news analysis10 most critical LLM vulnerabilitiesBy Maria Korolov and Michael Hill 15 Oct 202414 minsGenerative AIVulnerabilities newsOpen source package entry points could be used for command jackingBy Howard Solomon 14 Oct 20247 minsVulnerabilitiesOpen SourceSecurity ArticlesnewsIranian hackers use Windows holes to attack critical Gulf and Emirates systemsThe group deployed sophisticated backdoors to exfiltrate sensitive data from compromised Exchange servers.By Shweta Sharma 14 Oct 2024 3 minsCyberattacksWindows SecurityVulnerabilitiesnewsMozilla reveals critical vulnerability in FirefoxBrowser needs to be updated to fix a zero-day bug that’s already being exploited.By Howard Solomon 10 Oct 2024 3 minsBrowser SecurityZero-day vulnerabilityVulnerabilitiesnewsAdmins warned to update Palo Alto Networks Expedition tool immediatelySix holes in the configuration migration tool could allow theft of cleartext passwords and more.By Howard Solomon 10 Oct 2024 3 minsNetwork SecurityVulnerabilitiesfeatureWhat’s old is new again: AI is bringing XSS vulnerabilities back to the spotlightCross-site scripting vulnerabilities (XSS) have vexed cybersecurity professionals for 30 years. Following a CISA and FBI alert, experts say unless these flaws are fixed soon, AI models may ingest and perpetuate them.By Cynthia Brumfield 10 Oct 2024 10 minsCSO and CISOSecurity PracticesSecurity SoftwarenewsMicrosoft October update patches two zero-day vulnerabilities it says are being actively exploited Patch Tuesday update addresses five zero days, with eight other vulnerabilities likely to be exploited within weeks. By John E. Dunn 09 Oct 2024 4 minsWindows SecurityZero-day vulnerabilityVulnerabilitiesnewsHackers steal sensitive customer data from thousands of online stores that use Adobe toolsDespite layers of protection rolled out by Adobe, active CosmicSting exploits plague Adobe Commerce customers.By Shweta Sharma 04 Oct 2024 3 minsVulnerabilitiesSecuritynewsCritical Ivanti flaw exploited despite available patchesThe SQL injection flaw allowing RCE is confirmed to have in-the-wild exploits despite Ivanti fixing it in May.By Shweta Sharma 03 Oct 2024 3 minsVulnerabilitiesnews analysisRemote code execution exploit for CUPS printing service puts Linux desktops at riskSeveral vulnerabilities can be chained together to remotely register rogue printers and execute commands as root on many Linux systems.By Lucian Constantin 27 Sep 2024 8 minsHackingThreat and Vulnerability ManagementVulnerabilitiesnewsMicrosoft privilege escalation issue forces the debate: ‘When is something a security hole?’Fortra has announced what it dubs a Microsoft security hole. There is no dispute that the privilege escalation issue exists, but there is much argument over whether it’s a flaw.By Evan Schuman 27 Sep 2024 5 minsWindows SecurityAccess ControlVulnerabilitiesnewsA critical Nvidia Container Toolkit bug can allow a complete host takeoverThe flaw allows a rogue user to escape their container and access entire file systems of the underlying host to perform code execution, and denial of service. By Shweta Sharma 27 Sep 2024 4 minsVulnerabilitiesnewsChinese hackers allegedly hacked US ISPs for cyber espionageChinese APT group, Salt Typhoon, hacked into ISP networks to steal sensitive US data and establish persistence.By Shweta Sharma 26 Sep 2024 3 minsAdvanced Persistent ThreatsVulnerabilitiesnews analysisThousands of internet-exposed fuel gauges could be hacked and dangerously exploitedDespite a decade of warnings, devices used to monitor fuel tanks have critical vulnerabilities and poor code quality that could allow attackers to disable systems, steal fuel or even cause dangerous leaks.By Lucian Constantin 25 Sep 2024 7 minsMining, Oil, and GasEnergy IndustryUtilities Industry Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 08 Nov 2024Business OperationsCybercrimeData and Information Security whitepaper Global Cyber Resilience Report 2024 By Cohesity Inc. 08 Nov 2024Business OperationsData and Information SecurityRansomware whitepaper Global Data Insights Survey By Digital Realty Trust, L.P. 25 Oct 2024Artificial IntelligenceBusiness OperationsEnterprise View all Video on demand videoPrinters: The overlooked security threat in your enterprise | TECHtalkPrinters, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network. 07 Nov 2019 20 minsHackingPrintersVulnerabilities Don’t ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecurityVulnerabilitiesSecurity The Dyn cyberattack, one year later | Salted Hash Ep 11 11 Dec 2017 22 minsCybercrimeInternet of ThingsVulnerabilities See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Generative AI Show me morePopularArticlesPodcastsVideos news US consumer protection agency bans employee mobile calls amid Chinese hack fears By Gyana Swain 08 Nov 20244 mins Hacking opinion Choosing AI: the 7 categories cybersecurity decision-makers need to understand By Christopher Whyte 08 Nov 202410 mins CSO and CISOSecurity PracticesSecurity Software news The US Department of Defense has finalized cyber rules for its suppliers By John P. Mello Jr. 08 Nov 20245 mins RegulationAerospace and Defense IndustryGovernment podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Supply ChainCritical InfrastructureSecurity video CSO Executive Sessions: Standard Chartered’s Alvaro Garrido on cybersecurity in the financial services industry 23 Oct 202410 mins Financial Services IndustrySecurity video CSO Executive Sessions: New World Development’s Dicky Wong on securing critical infrastructure 16 Oct 202412 mins Critical InfrastructureSecurity