article thumbnail

Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima

The Security Ledger

Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. Caleb Sima is the CSO at Robinhood.

CSO 52
article thumbnail

PHP backdoor attempt shows need for better code authenticity verification

CSO Magazine

Unknown attackers managed to break into the central code repository of the PHP project and add malicious code with the intention to insert a backdoor into the runtime that powers most websites on the internet. Get the latest from CSO by signing up for our newsletters. ]. Learn how to track and secure open source in your enterprise. |

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical flaw in AI testing framework MLflow can lead to server and data compromise

CSO Magazine

The attacks can be executed remotely without authentication because MLflow doesn't implement authentication by default and an increasing number of MLflow deployments are directly exposed to the internet. It's pretty brutal." To read this article in full, please click here

CSO 111
article thumbnail

Thousands of publicly accessible VMware vCenter Servers vulnerable to critical flaws

CSO Magazine

Three weeks after releasing patches for a critical vulnerability in VMware vCenter, thousands of servers that are reachable from the internet remain vulnerable to attacks. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. Remote code execution and authentication bypass.

CSO 127
article thumbnail

CISA warns of attacks against internet-connected UPS devices

CSO Magazine

Hackers have begun to attack internet-connected universal power supply devices, targeting their control interfaces via multiple remote code execution vulnerabilities and, in some cases, unchanged default usernames and passwords, according to an advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued on Tuesday.

article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. The post Episode 250: Window Snyder of Thistle on.

IoT 98
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

As an enterprise security team, you could restrict internet access at your egress points, but this doesn’t do much when the workforce is remote. Enable multi-factor authentication (MFA) to access your applications and services, especially for admin access to platforms and backend systems. Food for thought, eh!