Latest from todaynewsCritical vulnerabilities expose network security risks in Keysight's infrastructureMultiple security flaws in network packet broker devices could lead to code execution and data compromise.By Gyana Swain05 Mar 20254 minsSecurityVulnerabilities news Critical Microsoft Partner Center vulnerability under attack, CISA warnsBy Gyana Swain27 Feb 20254 minsVulnerabilitiesnews Critical deserialization bugs in Adobe, Oracle software actively exploited, warns CISABy Shweta Sharma25 Feb 20253 minsVulnerabilities newsHackers gain root access to Palo Alto firewalls through chained bugsBy Shweta Sharma 19 Feb 20253 minsNetwork SecuritySecurityVulnerabilities news analysisOpenSSH fixes flaws that enable man-in-the-middle, DoS attacksBy Lucian Constantin 18 Feb 20255 minsData and Information SecurityHackingVulnerabilities newsPalo Alto Networks firewall bug being exploited by threat actors: ReportBy Howard Solomon 14 Feb 20251 minNetwork SecurityVulnerabilitiesZero-Day Vulnerabilities news analysisPostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacksBy Lucian Constantin 13 Feb 20255 minsData and Information SecurityVulnerabilitiesZero-Day Vulnerabilities newsRussian hacking group targets critical infrastructure in the US, the UK, and CanadaBy Gyana Swain 13 Feb 20254 minsCyberattacksSecurityVulnerabilities newsCISA, FBI call software with buffer overflow issues ‘unforgivable’By Shweta Sharma 13 Feb 20253 minsBugsSecurityVulnerabilities Articlesnews24% of vulnerabilities are abused before a patch is availableExploited CVEs increased by a fifth in 2024, according to analysis by VulnCheck, with increased transparency and improved monitoring playing a role. Still, proactive measures are vital.By John Leyden 13 Feb 2025 5 minsPatch Management SoftwareThreat and Vulnerability ManagementVulnerabilitiesnewsFebruary Patch Tuesday: CISOs should act now on two actively exploited Windows Server vulnerabilitiesAlso prioritize patches for vulnerabilities in LDAP and NTLM, as well as Hyper-V, experts say.By Howard Solomon 11 Feb 2025 5 minsThreat and Vulnerability ManagementVulnerabilitiesWindows SecuritynewsOver 12,000 KerioControl firewalls remain prone to RCE attacks amid active exploitsWhile unpatched instances were reduced to half within a month, a huge number of them remain vulnerable even as attackers exploit the flaw in the wild for critical RCE attacks.By Shweta Sharma 11 Feb 2025 3 minsSecurityVulnerabilitiesnewsApple issues emergency patches to contain an ‘extremely sophisticated attack’ on targeted individualsA critical USB restriction flaw was addressed in an emergency iOS and iPadOS update.By Gyana Swain 11 Feb 2025 6 minsSecurityVulnerabilitiesfeatureTop 5 ways attackers use generative AI to exploit your systemsCybercriminals are increasingly exploiting gen AI technologies to enhance the sophistication and efficiency of their attacks. By John Leyden 11 Feb 2025 8 minsMalwarePhishingThreat and Vulnerability ManagementnewsHackers breach Microsoft IIS services using Cityworks RCE bugThe deserialization flaw allows attackers to remotely execute arbitrary codes on customers’ IIS web servers.By Shweta Sharma 10 Feb 2025 3 minsSecurityVulnerabilitiesnewsCisco’s ISE bugs could allow root-level command executionThe insecure deserialization and authorization bypass flaws could enable attackers to escalate privileges and run arbitrary commands.By Shweta Sharma 07 Feb 2025 3 minsSecurityVulnerabilitiesnewsAMD patches microcode security holes after accidental early disclosureWhen AMD finally issued patches for its critical microcode security hole on Monday, it said that the glitch 'could lead to the loss of Secure Encrypted Virtualization protection.'By Evan Schuman 03 Feb 2025 1 minSecurityVulnerabilitiesnewsBackdoor in Chinese-made healthcare monitoring device leaks patient dataFunctionality in the device firmware sends patient data to a hardcoded IP address that also downloads and executes binary files without the owner’s knowledge.By Lucian Constantin 31 Jan 2025 5 minsHealthcare IndustryVulnerabilitiesnewsVMware offers fixes to severe vulnerabilities in VMware AriaBroadcom urges the application of patches that address pressing vulnerabilities in VMware’s cloud management tools.By Shweta Sharma 31 Jan 2025 3 minsSecurityVulnerabilitiesnewsCISA warns of critical, high-risk flaws in ICS products from four vendorsCISA released seven advisories for serious vulnerabilities in industrial control systems products from Schneider Electric, Rockwell Automation, B&R Industrial, and BD.By Lucian Constantin 28 Jan 2025 4 minsEnergy IndustryHealthcare IndustryManufacturing IndustrynewsiPhone users targeted in Apple’s first zero-day exploit in 2025The use-after-free flaw allows privilege escalation in affected media applications running on Apple’s Core Media framework.By Shweta Sharma 28 Jan 2025 3 minsMobile SecuritySecurityVulnerabilities Show more Show less View all Resources whitepaper Unlock Data Value: A Proven Framework To Implement Data Products This webinar explains critical data product concepts and guides your organization to effectively implement a data-products strategy and data-streaming platform that unifies your operational and analytical data for any use case. The post Unlock Data Value: A Proven Framework To Implement Data Products appeared first on Whitepaper Repository –. By CONFLUENT 24 Feb 2025Business OperationsData ArchitectureDigital Transformation whitepaper How to assess potential business value in 5 minutes – Human Capital Management By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Management whitepaper How to assess potential business value in 5 minutes – Finance and Human Resources By Workday Inc. 22 Nov 2024Business OperationsCloud ComputingIT Leadership View all Video on demand videoPrinters: The overlooked security threat in your enterprise | TECHtalkPrinters, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus how to secure them and protect your network. 07 Nov 2019 20 minsHackingPrintersVulnerabilities Don’t ignore application security | Salted Hash Ep 35 23 Jul 2018 18 minsApplication SecuritySecurityVulnerabilities The Dyn cyberattack, one year later | Salted Hash Ep 11 11 Dec 2017 22 minsCybercrimeInternet of ThingsVulnerabilitiesSee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity feature 8 obstacles women still face when seeking a leadership role in IT By Christina Wood 07 Mar 20258 mins CareersIT Leadership feature What is risk management? Quantifying and mitigating uncertainty By Josh Fruhlinger 07 Mar 202510 mins IT Governance FrameworksIT LeadershipRisk Management podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain