newsGoogle ups bug bounties for ‘high quality’ Chrome huntersSecurity researchers can now earn a quarter million dollars reporting high-impact memory corruption vulnerabilities in Chrome.By CSO Staff and Mikael Markander29 Aug 20243 minsVulnerabilities news Critical plugin flaw opens over a million WordPress sites to RCE attacksBy Shweta Sharma28 Aug 20243 minsVulnerabilitiesfeature Is the vulnerability disclosure process glitched? How CISOs are being left in the darkBy Cynthia Brumfield26 Aug 202410 minsCSO and CISOThreat and Vulnerability ManagementData and Information Security newsWordPress users not on Windows urged to update due to critical LiteSpeed Cache flawBy Lynn Greiner 23 Aug 20243 minsThreat and Vulnerability ManagementIdentity and Access ManagementVulnerabilities news analysisChinese APT group Velvet Ant deployed custom backdoor on Cisco Nexus switchesBy Lucian Constantin 23 Aug 20244 minsAdvanced Persistent ThreatsNetwork SecurityVulnerabilities newsGitHub fixes critical Enterprise Server bug granting admin privilegesBy Shweta Sharma 23 Aug 20243 minsVulnerabilities newsSolarWinds fixes critical developer oversightBy Shweta Sharma 23 Aug 2024Vulnerabilities feature11 top bug bounty programs launched in 2024By John Leyden 16 Aug 20249 minsHackingSecurity PracticesVulnerabilities newsMajor GitHub repos leak access tokens putting code and clouds at riskBy Lucian Constantin 15 Aug 20246 minsGitHubVulnerabilities Articlesnews analysisThousands of NetSuite stores leak sensitive data due to access control misconfigurationCustomers of Oracle subsidiary NetSuite’s ERP offering may be unaware that their custom record types grant unauthenticated access to sensitive data readily consumable via NetSuite’s APIs.By Lucian Constantin 15 Aug 2024 7 minsAccess ControlVulnerabilitiesnews analysisMicrosoft Outlook security hole lets attackers in without opening a tainted messageThe zero-click hole, which was patched by Microsoft Tuesday, could point to far more vulnerabilities in the form-based architecture of Outlook.By Evan Schuman 14 Aug 2024 4 minsEmail SecurityCyberattacksVulnerabilitiesnewsSAP patches critical bugs allowing full system compromiseBoth the vulnerabilities score above 9 on CVSS and can allow access to sensitive data if not patched immediately.By Shweta Sharma 14 Aug 2024 3 minsVulnerabilitiesnews analysisMicrosoft patches six actively exploited vulnerabilitiesMicrosoft’s August Patch Tuesday covered 10 zero-day flaws, of which six are being exploited in the wild and four are publicly disclosed.By Lucian Constantin 13 Aug 2024 6 minsZero-day vulnerabilityVulnerabilitiesnewsMitre, Microsoft differ on how severe MS Office flaw really isSecurity analyst sides with Mitre, describes flaw as ‘fantastic win for phishing campaigns.’By Paul Barker 13 Aug 2024 4 minsVulnerabilitiesnewsAMD addresses Sinkclose vulnerability but older processors left unattendedThe company has decided not to extend these updates to its Ryzen 1000, 2000, and 3000 series processors or its Threadripper 1000 and 2000 models.By Gyana Swain 12 Aug 2024 4 minsVulnerabilitiesnewsAMD CPUs impacted by 18-year-old SMM flaw that enables firmware implantsSecurity reseachers estimate the ‘Sinkclose’ vulnerability affects ‘hundreds of millions of laptops, desktops, and servers,’ allowing attackers to execute malicious code on the most privileged execution mode on a computer.By Lucian Constantin 09 Aug 2024 4 minsVulnerabilitiesnewsS3 shadow buckets leave AWS accounts open to compromiseAttackers can gain access to AWS accounts or sensitive data by creating in advance S3 storage buckets with predictable names that will be automatically used by various services and tools.By Lucian Constantin 08 Aug 2024 7 minsCloud SecurityVulnerabilitiesnewsBlack Hat: Latest news and insightsThe Black Hat series of international cybersecurity conferences brings together top IT security pros, researchers, and thought leaders to discuss the latest cyber techniques, vulnerabilities, threats, and more. Here’s the latest to know.By CSO Staff 08 Aug 2024 4 minsAdvanced Persistent ThreatsWindows SecurityThreat and Vulnerability ManagementnewsBack to the future: Windows Update is now a trojan horse for hackersA newly discovered vulnerability can make a fully patched Windows machine susceptible to thousands of past vulnerabilities.By Gyana Swain 08 Aug 2024 5 minsWindows SecurityVulnerabilitiesnewsBlack Hat preview: AI and cloud security take center stageThis year’s Black Hat USA sees LLMs in the crosshairs, rising attacks against hyperscale cloud vendors, and CISOs in need of advice for legal liabilities.By John Leyden 06 Aug 2024 5 minsWindows SecurityCloud SecurityData and Information SecuritynewsNew critical Apache OFBiz vulnerability patched as older flaw is actively exploitedResearchers discovered a new RCE flaw while analyzing the patch for a different flaw currently targeted by attackers. As the fifth critical flaw this year for the ERP framework, users are urged to update ASAP. By Lucian Constantin 05 Aug 2024 3 minsOpen SourceVulnerabilities Show more Show less View all Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Video on demand videoPrinters: The overlooked security threat in your enterprise | TECHtalkPrinters, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network. 07 Nov 2019 20 minsHackingPrintersVulnerabilities Don’t ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecurityVulnerabilitiesSecurity The Dyn cyberattack, one year later | Salted Hash Ep 11 11 Dec 2017 22 minsCybercrimeInternet of ThingsVulnerabilities See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO