Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

US Treasury Department ban on ransomware payments puts victims in tough position

Financial crime group FIN11 pivots to ransomware and stolen data extortion

Financial crime group FIN11 pivots to ransomware and stolen data extortion

FIN11, believed to be Russia-based, follows a trend of cybercriminal groups expanding their operations beyond financial crime.

Half of all virtual appliances have outdated software and serious vulnerabilities

Half of all virtual appliances have outdated software and serious vulnerabilities

New study shows that even security vendors can use outdated and vulnerable virtual appliances. Top advice: Make sure your vulnerability management processes include virtual appliances.

Elusive hacker-for-hire group Bahamut linked to historical attack campaigns

Elusive hacker-for-hire group Bahamut linked to historical attack campaigns

The Bahamut group targets high-value victims and takes meticulous care with its own operational security.

Alien malware a rising threat to mobile banking users

Alien malware a rising threat to mobile banking users

The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

IPStorm's ability to infect Android, macOS and Windows devices as well as those that are Linux-based makes it much more dangerous.

SAP ASE leaves sensitive credentials in installation logs

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Zerologon explained: Why you should patch this critical Windows Server flaw now

Zerologon explained: Why you should patch this critical Windows Server flaw now

Attackers have learned how to exploit the Zerologon vulnerability in Windows Server, potentially gaining domain admin control.

WastedLocker explained: How this targeted ransomware extorts millions from victims

WastedLocker explained: How this targeted ransomware extorts millions from victims

WastedLocker is sophisticated ransomware created by Evil Corp, a notorious cyber criminal group.

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale...

Evilnum group targets FinTech firms with new Python-based RAT

Evilnum group targets FinTech firms with new Python-based RAT

The attack hides in Windows systems by impersonating several legitimate programs.

APT-style mercenary groups challenge the threat models of many organizations

APT-style mercenary groups challenge the threat models of many organizations

APT-for-hire services will broaden the scope of who is vulnerable to that type of attack. Small- and medium-sized companies in particular need to rethink their threat models.

Load More