Advertisement

A broken link in a digital chaing / weakness / vulnerability

SQL injection, XSS vulnerabilities continue to plague organizations

Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.


ransomware breach hackers dark web

LockBit explained: How it has become the most popular ransomware

Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.


One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.


Advertisement

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Zero-day flaw in Atlassian Confluence exploited in the wild since May

Atlassian has issued emergency patches for the vulnerability, which could allow attackers to perform remote code execution.


CSO Event Paloalto

Hyde Hacienda, Sydney

Cyber attackers worldwide are displaying an increasing level of sophistication. This is a major issue for Australian CISOs and their teams who often lack the resources required to deal with more frequent and complex attacks by well-resourced cyber criminals. At the same time, legacy security operations centres (SOCs) are dealing with an unmanageable volume of alerts. This leads to ‘alert fatigue’ that slows key processes down and makes it easier to miss potentially significant issues that could be buried in the noise. Hiring an army of security engineers to deal with these challenges is also expensive and doesn’t scale. Join CSO Australia’s associate editor, Byron Connolly, and senior executives from Palo Alto Networks for this exclusive, invitation-only roundtable discussion, ‘No more weekend war rooms: Shift from reactive to proactive security.’

A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


abstract internet network cyber security concept picture id1072278762

Google Cloud previews advanced new API security features

Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.


CSO  >  danger / security threat / malware / grenade-shaped flash drive

How you handle independent contractors may determine your insider threat risk

Outside experts can be willing or accidental security threats. Reduce that risk by changing how you onboard, train and offboard them.


cloud security expert casb binary cloud computing cloud security by metamorworks getty

Key takeaways from CSA’s SaaS Governance Best Practices guide

Security and governance policies and practices are failing to keep up with the growth of SaaS usage. The Cloud Security Alliance's guidance aims to get that back on track.


programmer certification skills code devops glasses student by kevin unsplash

SolarWinds creates new software build system in wake of Sunburst attack

Lessons learned from software supply chain breach lead to innovative and secure development scheme.


Advertisement

Google Cloud

Google Cloud gets new built-in security features

MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.


security monitoring

Sysdig Secure update adds ability to stop container attacks at runtime

Sysdig's Drift Control detects and stops attempts to run packages or binary files that were added or modified at runtime.


zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Why more zero-day vulnerabilities are being found in the wild

With the number of zero-days spiking in the last 18 months, organizations need to increase their patching efforts. Software vendors can be more transparent, too.


a hooded figure targets a coding vulnerability

How and why threat actors target Microsoft Active Directory

New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.


DDOS attack

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.