Advertisement

international flags / global business discussion

White House international ransomware initiative outlines hopes and challenges

More than 30 nations discussed tactics for collaborating in the fight against ransomware, but it competes with a Russian-led UN initiative.


Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft's very bad year for security: A timeline

Microsoft has had a horrible 2021, with vulnerabilities impacting its biggest services.


CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.


Advertisement

australian dollars

Cybersecurity breach of Australian banks is ‘inevitable’, Reserve Bank warns

Australia’s financial system is high on the bucket lists of cybercriminals and nation-state actors.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.


vulnerable breach cyberattack hacker

How shape-shifting threat actors complicate attack attribution

Researchers explain how they identified—or failed to identify—the threat actors behind three high-profile incidents and why attribution is so difficult.


ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.


A laptop displays binary code and the flag of China.

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

The attackers used the exploit to deploy a new remote shell Trojan called MysterySnail.


australia military shutterstock 1519594076

Australia’s Ransomware Action Plan latest salvo in war on cybercriminals

The federal government is ready to name hostile nation-states as it criminalises cyberextortion, mandates ransomware reporting, and tracks cryptocurrency ransoms.


Team members with laptop and mobile phone are superimposed with abstract statistics, data and charts

Google forms Cybersecurity Action Team to support customer security transformation

Google’s initiative will offer security and compliance services to guide governments, critical infrastructure, enterprises, and small businesses through digital transformation.


Advertisement

network security / network traffic scanning

AT&T launches managed XDR suite to provide endpoint-to-cloud security

AT&T is combining security tools including its threat intelligence and detection platform USM Anywhere with endpoint and network security services from partners to roll out a cloud-based, managed XDR platform for end-to-end detection...


broken binary code matrix / breached / failed / hacked

Twitch breach highlights dangers of choosing ease of access over security

Attackers essentially broke into the Twitch house and cleaned out everything. Following least-privilege access principles and encrypted datasets will help others avoid that scenario.


network security / secure connections / integrated system of locks

Time to check software and security settings for Windows network vulnerabilities

October is Cybersecurity Awareness Month, and that's a good excuse to review what's running on your network to identify security risks.


cso security hacker breach privacy ransomware malware attack gettyimages 1216075693 by towfiqu aham

Australia targets ransomware with new national plan

The federal plan brings together legal and policing for a coordinated response to surge of ransomware, but the proposed approach raises several questions.


vulnerable breach cyberattack hacker

October is high season for cyberattacks, Infosec Institute study shows

A study by Infosec Institute indicates that there has been an exponential increase in cyberattacks globally in the last five years, and a major part of it happened in the month of October each year as attackers apparently exploit...