Advertisement

Security threat [illustration]  >  A hacker with black hat, mask, and crowbar breaks into a laptop.

Critical flaw in WooCommerce can be used to compromise WordPress websites

The vulnerability could allow unauthenticated administrative takeover of websites. WooCommerce has released an update.


cybersecurity eye with binary face recognition abstract eye

Cyberpion rebrands as Ionix, offering new EASM visibility improvements

Ionix is adding a suite of new features to help extend the visibility of interconnected assets and deliver risk-based prioritization.


Android-based banking Trojan Nexus now available as malware-as-a-service

The recently evolved version of Nexus has targeted more than 450 banks and cryptocurrency services. Multiple threat actors are already found to be using Nexus to conduct fraudulent campaigns.


Advertisement

configuring virtual machine laptop

Critical flaw in AI testing framework MLflow can lead to server and data compromise

The now-patched vulnerability in the popular MLflow platform could expose AI and machine-learning models stored in the cloud and allow for lateral movement.


UK | United Kingdom  >  England  >  London  >  cityscape / Big Ben / Parliament

UK parliament follows government by banning TikTok over cybersecurity concerns

TikTok calls the UK ban “misguided” while its chief executive faced tough questioning by the US House of Representatives over whether the popular app is a “tool” of the Chinese Communist Party.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


07 hacktivist anonymous

Russian hacktivists deploy new AresLoader malware via decoy installers

The new malware loader can give attackers remote access and the ability to deliver other payloads.


intel 13th generation processor core

Security at the core of Intel’s new vPro platform

In what the chipmaker claims is an industry first, the latest processor line from Intel will incorporate threat detection right into the hardware, bolstering EDR and other cybersecurity platforms.


Industrial plant

New vulnerabilities found in industrial control systems of major vendors

The US Cybersecurity and Infrastructure Security has revealed new vulnerabilities in the industrial systems from leading vendors including Siemens, Delta Electronics, Hitachi and Rockwell.


Closeup on stressed business woman with eyeglasses -- tension headache burnout

How training and recognition can reduce cybersecurity stress and burnout

Cybersecurity professionals suffering from stress and burnout can be less productive, more prone to mistakes, and increasingly likely to quit. With the right training and recognition, CISOs can reduce stress and burnout in their teams....


Advertisement

programming / coding elements / lines of code / development / developers / teamwork

Splunk adds new security and observability features

New security and observability features will be added to Splunk Mission Control and its Observability Cloud to identify threats and incidents more efficiently, the company said.


a hooded figure targets a coding vulnerability

55 zero-day flaws exploited last year show the importance of security risk management

Cybercriminals are now exploiting zero-day vulnerabilities for higher profits, which might require a reassessment of your risk.


innovation co innovation startup venn overlapping partnering iot by pettycon via pixabay

Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats

The 2030 Roadmap for Israel-UK Bilateral Relations promises ongoing cooperation in tackling cyberthreats, governing global cyberspace, developing cybersecurity skills, and investing in the cybersecurity ecosystem.


An IT technician works on laptop in data center, with other IT staff in the background.

Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks

State of Storage and Backup Security Report 2023 reveals significant gap in the state of enterprise storage and backup security compared to other layers of IT and network security.


certification woman on laptop programmer devops data scientist by picjumbo

Backslash AppSec solution targets toxic code flows, threat model automation

New cloud-native solution aims to address time-consuming, manual methods for discovering and mapping application code security risks.