

Lucian Constantin
CSO Senior Writer
Lucian Constantin writes about information security, privacy, and data protection for CSO.

New Intel CPU-level threat detection capabilities target ransomware
The new capabilities in the Intel mobile processors will make it harder for ransomware to avoid detection.

Hashing explained: Why it's your best bet to protect stored passwords
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.

33 hardware and firmware vulnerabilities: A guide to the threats
Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

SolarWinds attack explained: And why it was so hard to detect
A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

FireEye breach explained: How worried should you be?
The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organizations. The real lesson: Anyone can be hacked.

TrickBot explained: A multi-purpose crimeware tool that haunted businesses for years
TrickBot is one of the longest-lived botnets on the internet and represents a major threat to businesses and other organizations because it serves as a distribution platform for the infamous Ryuk ransomware and other threat actors.

Russian state-sponsored hackers exploit vulnerability in VMware Workspace ONE
The exploit requires the attacker to have valid credentials, but experts advise patching regardless.

Publicly known support credentials expose GE Healthcare imaging devices to hacking
The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.

TrickBot gets new UEFI attack capability that makes recovery incredibly hard
Researchers discover a new TrickBot module that allows malware to persist even after reformatting or replacing a hard drive.

Half of all Docker Hub images have at least one critical vulnerability
New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images.
