Quantcast
Channel: Ivanti warns customers of new critical flaw exploited in the wild | CSO Online
Browsing all 1593 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Brauchen Sie einen vCISO?

In komplexen Bedrohungslandschaften sicher bleiben, ohne das (Personal-)Budget zu sprengen? Das vCISO-Konzept stellt das in Aussicht.TippaPatt | shutterstock.com In der heutigen Digitallandschaft, die...

View Article


Image may be NSFW.
Clik here to view.

Third Party Risk Management: So vermeiden Sie Compliance-Unheil

Third Party Risk Management hilft Unternehmen, das Risiko von Compliance-Verstößen zu vermeiden. Foto: Diyajyoti – shutterstock.comIn Zeiten der Digitalisierung ist es für Unternehmen unerlässlich,...

View Article


Blown the cybersecurity budget? Here are 7 ways cyber pros can save money

It’s hard to find a CISO or cybersecurity leader who has the money they need to pay for all the work they want to do. A majority of CISOs (57%) said they expect to see an increase in their...

View Article

Image may be NSFW.
Clik here to view.

Vielen CISOs droht der Burnout

loading="lazy" width="400px">Wer seinen CISO verheizt, dem drohen noch mehr Cyberrisiken.Kaspars Grinvalds – shutterstock.com Mit der zunehmend komplexer werdenden Cyber-Bedrohungslage wächst der...

View Article

Top 12 ways hackers broke into your systems in 2024

In 2024, hackers had a field day finding sneaky ways into systems — from convincing phishing scams that played on human curiosity to brutal software flaws that exposed gaps in tech upkeep. It was a...

View Article


The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...

View Article

US Treasury Department workstations breached in attack attributed to China

The US Department of the Treasury revealed on Monday that an attacker was able to bypass security, access an undisclosed number of Treasury workstations, and steal “certain unclassified documents,” in...

View Article

Image may be NSFW.
Clik here to view.

6 Mittel gegen Security-Tool-Wildwuchs

Viel hilft nicht immer viel. Foto: Roman Samborskyi | shutterstock.comAuf der Suche nach Möglichkeiten, sich vor ständig wachsenden Cyberbedrohungen zu schützen, erliegen nicht wenige Unternehmen...

View Article


Image may be NSFW.
Clik here to view.

CISO – Traumjob oder eher Albtraum

loading="lazy" width="400px">Der CISO-Job kann auch zu einem Albtraum werden – gerade wenn die Unterstützung und das Budget fehlt.Toma Stepunina – shutterstock.com „Die Rolle des CISO (Chief...

View Article


Image may be NSFW.
Clik here to view.

SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before...

SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension...

View Article

12 best entry-level cybersecurity certifications

A UC Berkeley professor recently made headlines when he stated that even his computer science graduates with a perfect 4.0 grade point average were failing to land jobs. Such is the labor market in...

View Article

Download our security orchestration, automation, and remediation (SOAR) tools...

From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR can do for their organizations and how to choose the right solution.

View Article

Download the Hot IT Certifications Enterprise Spotlight

Download the January 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

View Article


US soldier linked to Trump call log hack arrested in Texas

Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, charged with two counts of selling or attempting to sell confidential phone records...

View Article

Microsoft Sentinel: A cloud-native SIEM with integrated GenAI

In a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing...

View Article


Volkswagen massive data leak caused by a failure to secure AWS credentials

A failure to properly protect access to its AWS environment is one of the root causes of the recent massive Volkswagen data leak, according to a presentation on the incident at the Chaos Computer Club...

View Article

Secure by design vs by default – which software development concept is better?

As cybersecurity professionals, we need to know that the software products we acquire are safe and able to support or accommodate the procedures and tools we use to keep attackers at bay while...

View Article


US government sanctions Chinese cybersecurity company linked to APT group

The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a Beijing cybersecurity company for its role in attacks attributed to a Chinese cyberespionage...

View Article

Critical Windows LDAP flaw could lead to crashed servers, RCE attacks

Researchers have published a proof-of-concept exploit for a pair of Windows Lightweight Directory Access Protocol (LDAP) flaws that could lead to server crashes or remote code execution (RCE) on...

View Article

Download our security orchestration, automation, and remediation (SOAR) tools...

From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR can do for their organizations and how to choose the right solution.

View Article
Browsing all 1593 articles
Browse latest View live