Advertisement

security audit - risk assessment - network analysis

Zoho ManageEngine flaw is actively exploited, CISA warns

Threat actors are exploiting unpatched ManageEngine instances. CISA adds the vulnerability to its catalog and Zoho urges customers to check their deployments.


Industry 4.0 / Industrial IoT / Smart Factory / automation

US CISA/NSA release new OT/ICS security guidance, reveal 5 steps threat actors take to compromise assets

Advisory from the Cybersecurity and Infrastructure Security Agency and the National Security Agency outlines steps to protect operational technology and industrial control systems.


Cybersecurity  >  locked binary code
Apple Holic

Jamf buys ZecOps to bring high-end security to Apple enterprise

ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.


Advertisement

VPN on iPhone

97% of enterprises say VPNs are prone to cyberattacks: Study

Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler.


A binary mask.

The deepfake danger: When it wasn’t you on that Zoom call

Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.


Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.


A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


optus store provided by optus media centre

A third of Australian population likely affected in Optus cyberattack

Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.


ransomware attack

Ransomware operators might be dropping file encryption in favor of corrupting files

Corrupting files is faster, cheaper, and less likely to be stopped by endpoint protection tools than encrypting them.


A man with an umbrella appears waist-deep in water against a city skyline. [multiple-exposure]

D&O insurance not yet a priority despite criminal trial of Uber’s former CISO

The cost is too high and the risk too low to offer CISOs directors-and-officers insurance at many companies. Protective governance policies might make more sense.


Advertisement

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.


prisoner jail crime

Former Broadcom engineer gets eight months in prison for trade secrets theft

Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup.


cso security access granted breach hack identity theft gettyimages 1191670668 by reklamlar 2400x160

Report: The state of secure identity 2022

New research from Okta’s Auth0 access management platform found that credential stuffing and fraudulent registration attacks are on the rise.


A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

Top 5 attack surface challenges related to security operations

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.


ransomware attack

Ransomware is (slightly) on the decline, cyberinsurance company says

While ransomware attacks remain highly dangerous, data from a prominent insurer suggests that their frequency and severity is beginning to decline.