Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

Cisco sign

Cisco’s high-security Smart Software Manager has a critical flaw

Cisco has disclosed a critical flaw in a product called Cisco Smart Software Manager (SSM) On-Prem, a special version of its SSM software licensing management product aimed at organizations with organizations high security...

spooky halloween raven

The sinister world of shadow IT

Much like an episode of Stranger Things, IT has a dark side.


Many keys, one lock  >  Brute-force credential stuffing.

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable.

CSO > global security

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP).

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Unsigned firmware exposes millions of Lenovo, Dell and HP PCs to attacks

Security researchers have found multiple PC and laptop components that don’t require cryptographically signed updates are putting millions of Linux and Windows machines to attacks.   

AustCyber release

New AustCyber-funded projects target key cybersecurity industry pain points

Second round Projects Fund allocations will split $8.5m among 17 industry projects

A firmware message appears on a circuit board.

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.

RSA 2020's hot new startups

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

CSO  >  security threats / laptop bombarded by attacks

Malware detections dropped more last year in Australia than anywhere else

Australia and New Zealand users bucked global trends in 2019 as the volume of cybersecurity threats dropped 14 percent last year, according to new analysis that also found Mac threats outpacing Windows threats for the first time...


intel cybersecurity bg 1920

The week in security: Lifting the bushel on cybersecurity’s light

Cybersecurity is of the shadows, surfacing quiet discussions that used to be held in out-of-the-way meetings.

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.

CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.