Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

SolarWinds attack explained: And why it was so hard to detect

SAP ASE leaves sensitive credentials in installation logs

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Critical flaw allows hackers to breach SAP systems with ease

Critical flaw allows hackers to breach SAP systems with ease

SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.

Install latest SAP Adaptive Server Enterprise patches, experts urge

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

Use of cloud collaboration tools surges and so do attacks

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

Waarom je je managed service provider niet moet vertrouwen

Het gevaar zit in een onverwachte hoek

Is er al ingebroken op jouw SAP-systeem?

Twee grote exploits uitgelekt.

Te koop: gegevens van 65 miljoen Tumblr-gebruikers

Aangeboden op TheRealDeal Market

Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Tip

5 Things You Need to Know About Cybersecurity Insurance

Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn’t do a good job of covering the reputation damage and business downturn that can be triggered by a security breach. 


Researchers Show Ways to Bypass Home and Office Security Systems

Many door sensors, motion detectors and security keypads can be bypassed using simple techniques, researchers from Bishop Fox said

Researcher: Face.com iOS flaw could have allowed Facebook, Twitter account hijacking

Face.com patched a vulnerability that could have allowed attackers to hijack the Facebook and Twitter accounts of its customers

Load More