news analysisAttackers breach US government agencies through ColdFusion flawBoth incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability.By Lucian Constantin06 Dec 20235 minsAdvanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilitiesBy Susan Bradley06 Dec 20236 minsPatch Management SoftwareThreat and Vulnerability ManagementWindows Securitynews analysis Russia's Fancy Bear launches mass credential collection campaigns By Lucian Constantin05 Dec 20235 minsAdvanced Persistent ThreatsCritical InfrastructureVulnerabilities feature3 ways to fix old, unsafe code that lingers from open-source and legacy programsBy Maria Korolov 29 Nov 20239 minsSecurity PracticesVulnerabilitiesSecurity newsFlaw in Citrix software led to the recent cyberattack on Boeing: ReportBy Gagandeep Kaur 22 Nov 20233 minsVulnerabilities newsMOVEit carnage continues with over 2600 organizations and 77M people impacted so farBy Gagandeep Kaur 21 Nov 20233 minsData BreachVulnerabilities news analysisIntel patches high-severity CPU privilege escalation flawBy Lucian Constantin 15 Nov 20234 minsVulnerabilities news analysisCisco patches serious flaws in Firepower and Identity Services EngineBy Lucian Constantin 06 Nov 20234 minsNetwork SecurityVulnerabilities feature12 notable bug bounty programs launched in 2023By Michael Hill 06 Nov 202312 minsHackingSecurity PracticesVulnerabilities ArticlesnewsArm patches bugs in Mali GPUs that affect Android phones and ChromebooksThe vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma 03 Oct 2023 3 minsAndroid SecurityVulnerabilitiesnewsCybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirementsOpen letter claims current provisions will create new threats that undermine the security of digital products and individuals.By Michael Hill 03 Oct 2023 4 minsRegulationComplianceVulnerabilitiesnewsNew Trojan ZenRAT masquerades as Bitwarden password managerA report by Proofpoint identifies the new Trojan as undocumented and possessing information-stealing capabilities.By Lucian Constantin 28 Sep 2023 4 minsCyberattacksHackingData and Information SecuritynewsGitlab fixes bug that exploited internal policies to trigger hostile pipelinesIt was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies.By Shweta Sharma 21 Sep 2023 3 minsVulnerabilitiesfeatureKey findings from the CISA 2022 Top Routinely Exploited Vulnerabilities reportCISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem.By Chris Hughes 21 Sep 2023 8 minsZero TrustThreat and Vulnerability ManagementSecurity PracticesnewsMicrosoft reveals memory corruption bugs in ‘ncurses’ libraryThe research reveals that the vulnerabilities can allow attackers to gain unauthorized access to systems and data by modifying a program’s memory.By Shweta Sharma 18 Sep 2023 3 minsVulnerabilitiesnews analysisAutomotive supply chain vulnerable to attack as cybersecurity regulation loomsAlmost two-thirds of automotive industry leaders believe their supply chain is vulnerable to cyberattacks, with many behind the curve on upcoming international regulation.By Michael Hill 14 Sep 2023 5 minsRegulationAutomotive IndustrySupply Chainnews analysisNew Kubernetes vulnerability allows privilege escalation in WindowsAttackers can abuse YAML configuration files to execute malicious commands in Windows hosts.By Lucian Constantin 13 Sep 2023 4 minsDevSecOpsDevSecOpsDevSecOpsnews analysisSevere Azure HDInsight flaws highlight dangers of cross-site scripting Microsoft flagged the now-patched vulnerabilities as important, and they serve as a reminder to implement proper XSS defenses.By Lucian Constantin 13 Sep 2023 5 minsInternet SecurityVulnerabilitiesfeatureEmerging cyber threats in 2023 from AI to quantum to data poisoningIn cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.By Mary K. Pratt 07 Sep 2023 10 minsAdvanced Persistent ThreatsHackingThreat and Vulnerability ManagementnewsNew research reveals most-attacked, most-vulnerable assetsWhile medical devices are the most susceptible to unpatched CVEs, operational technology assets are the most attacked.By Michael Hill 05 Sep 2023 4 minsCritical InfrastructureNetwork SecurityVulnerabilitiesnewsExpect SQL Server failures as Microsoft disables old TLS in WindowsMicrosoft has decided to pull back support for Transport Layer Security versions 1.0 and 1.1 in upcoming Windows rollouts. By Shweta Sharma 05 Sep 2023 3 minsWindows SecurityVulnerabilities Show more Show less View all Resources whitepaper Magic Quadrant for Distributed File Systems and Object Storage This Gartner Magic Quadrant research assesses the vision and execution of vendors in this market, and Dell Technologies, for the 7th consecutively year is ranked as a leader in the Magic Quadrant. The post Magic Quadrant for Distributed File Systems and Object Storage appeared first on Whitepaper Repository. By Dell Technologies and Intel(R) 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel(R) 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development View all Video on demand videoPrinters: The overlooked security threat in your enterprise | TECHtalkPrinters, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online's J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network. 07 Nov 2019 20 minsHackingPrintersVulnerabilities Don't ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecurityVulnerabilitiesSecurity The Dyn cyberattack, one year later | Salted Hash Ep 11 11 Dec 2017 22 minsCybercrimeInternet of ThingsVulnerabilities See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Generative AI Show me morePopularArticlesPodcastsVideos news BSIMM 14 finds rapid growth in automated security technology By John P. Mello Jr. 06 Dec 20234 mins Application SecurityNetwork Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur 06 Dec 20234 mins IT JobsSecurity Practices feature What should be in a company-wide policy on low-code/no-code development By Ericka Chickowski 06 Dec 202315 mins Application SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO