Advertisement

cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

Safe Security debuts two free risk assessment tools for businesses

Organizations can gauge their cybersecurity risk factors by using Safe Security’s new online calculators.


water infrastructure / wastewater treatment facility / sewage treatment plant

Exposed VNC instances threatens critical infrastructure as attacks spike

Threats surrounding Virtual Network Computing laid bare as attacks targeting critical infrastructure increase.


Developers work together to review lines of code in an office workspace.

Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable

VEX adds context to software vulnerabilities to better inform risk assessment decisions.


Advertisement

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The 12 biggest data breach fines, penalties, and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $4.2 billion and counting.


A binary map of china.

3 ways China's access to TikTok data is a security risk

The security community weighs in on real-world scenarios in which China or other nations could operationalize data collected by online platforms and how to mitigate the risk.


5g cellular tower

Top 5 security risks of Open RAN

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.


adding processor to circuit board computer hardware

New exploits can bypass Secure Boot and modern UEFI security protections

Two research groups demonstrate PC firmware vulnerabilities that are difficult to mitigate and likely to be exploited in the wild.


Conceptual image of a network of executives / silhouettes of executives in motion.

New US CISO appointments, August 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


Top cybersecurity products unveiled at Black Hat 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.


Advertisement

Close-up shot of an eye and eyewear with binary streams in the foreground.

FTC begins sweeping commercial surveillance and lax data security rulemaking process

While some praise the FTC's efforts, some in Congress worry that it overlaps with and possibly jeopardizes the passing of the American Data Privacy and Protection Act.


secure system / network security policy management

Network mistakes, misconfigurations cost companies millions

Titania research pegs losses from misconfigurations at average of 9% of annual revenue.


An anonymous hooded figure consisting of binary code stands in a virtual corridor of circuits.

What happened to the Lapsus$ hackers?

Despite using methods that are "bold, illogical, and poorly thought out, Lapsus$ has successfully breached companies like Microsoft, Vodafone and Nvidia.


cso security hack breach identity infiltrate gettyimages 653137674 by solarseven 2400x1600px

Cisco admits hack on IT network, links attacker to LAPSUS$ threat group

Cisco says an employee’s credentials were compromised after an attacker gained control of a personal Google account.


lies that people tell themselves pinocchio liar lying by malerapaso getty

How a Venezuelan disinformation campaign swayed voters in Colombia

A Black Hat presentation explains how Russia-aligned Venezuela influenced the presidential election in Columbia to its political benefit.