Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

Privilege escalation explained: Why these flaws are so valuable to hackers

Vulnerable drivers can enable crippling attacks against ATMs and POS systems

Vulnerable drivers can enable crippling attacks against ATMs and POS systems

Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models of ATM and POS devices.

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

Enterprise internet attack surface is growing, report shows

Enterprise internet attack surface is growing, report shows

Attackers are taking advantage of the COVID-19 crisis to exploit pre-existing and newly introduced vulnerabilities across a wide range of attack points.

Local attackers can use Group Policy flaw to take over enterprise Windows systems

Local attackers can use Group Policy flaw to take over enterprise Windows systems

Microsoft issues a patch to fix a flaw that could allow compromised non-privileged user accounts to place malicious DLLs on a system.

Install latest SAP Adaptive Server Enterprise patches, experts urge

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

Cloud infrastructure operators should quickly patch VMware Cloud Director flaw

Cloud infrastructure operators should quickly patch VMware Cloud Director flaw

Left unpatched, this command injection flaw could allow attackers to take control of a virtualized cloud infrastructure.

Use of cloud collaboration tools surges and so do attacks

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

Cloud configuration drift leaves organizations open to attack, research finds

Cloud configuration drift leaves organizations open to attack, research finds

Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat.

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now.

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Load More