Learn how to achieve compliance, enhanced security and visibility in your OT risk management strategy with lessons learnt from CS Hub’s All Access Cyber Security Global
Posts tagged "Risk"
Kill Cloud Risk: Get Everybody to Stop Fighting Over App Security – Podcast
When it comes to ensuring safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling.
Threatpost
PHP Everywhere Bugs Put 30K+ WordPress Sites at Risk of RCE
The plug-in’s default settings spawned flaws that could allow for full site takeover but have since been fixed in an update that users should immediately install, Wordfence researchers said.
Linux Servers at Risk of RCE Due to Critical CWP Bugs
The two flaws in Control Web Panel – a popular web hosting management software used by 200K+ servers – allow code execution as root on Linux servers.
Three Plugins with Same Bug Put 84K WordPress Sites at Risk
Researchers discovered vulnerabilities that can allow for full site takeover in login and e-commerce add-ons for the popular website-building platform.
IOTW: Is your company at risk from this mysterious hacker group?
A series of hacks targeting 13 telecoms organizations across the globe by malicious group LightBasin is uncovered after five years of undetected activity
5 Tips for Achieving Better Cybersecurity Risk Management
Casey Ellis, founder, CTO and chairman of Bugcrowd, discusses a roadmap for lowering risk from cyberattacks most effectively.
Threatpost
The State of Incident Response: Measuring Risk and Evaluating Your Preparedness
Grant Oviatt, director of incident-response engagements at Red Canary, provides advice and best practices on how to get there faster.
Threatpost
Mitigate Threats with Data Risk Assessments
Before an organization can re-engineer its approach to data privacy, it must first understand its current state. Similar to cybersecurity risk assessments, a data risk assessment (DRA) is a systemized…
Utilities ‘Concerningly’ at Risk from Active Exploits
Utilities’ vulnerability to application exploits goes from bad to worse in just weeks.
Threatpost