Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

REvil ransomware explained: A widespread extortion operation

Intel SGX users need CPU microcode patch to block PLATYPUS secrets-leaking attack

Intel SGX users need CPU microcode patch to block PLATYPUS secrets-leaking attack

Attackers could use the vulnerability to access encryption keys from the Linux kernel's memory or Intel SGX enclaves.

Mercenary APT group CostaRicto hits organizations worldwide

Mercenary APT group CostaRicto hits organizations worldwide

This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.

Inside Atlassian's zero trust implementation

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

14 controls for securing SAP systems in the cloud

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that.

US Treasury Department ban on ransomware payments puts victims in tough position

US Treasury Department ban on ransomware payments puts victims in tough position

The Treasury Department's advisory warns companies not to pay ransoms to sanctioned entities. The move complicates ransomware incident response and might encourage insurance carriers to drop ransomware coverage.

Financial crime group FIN11 pivots to ransomware and stolen data extortion

Financial crime group FIN11 pivots to ransomware and stolen data extortion

FIN11, believed to be Russia-based, follows a trend of cybercriminal groups expanding their operations beyond financial crime.

Half of all virtual appliances have outdated software and serious vulnerabilities

Half of all virtual appliances have outdated software and serious vulnerabilities

New study shows that even security vendors can use outdated and vulnerable virtual appliances. Top advice: Make sure your vulnerability management processes include virtual appliances.

Elusive hacker-for-hire group Bahamut linked to historical attack campaigns

Elusive hacker-for-hire group Bahamut linked to historical attack campaigns

The Bahamut group targets high-value victims and takes meticulous care with its own operational security.

Alien malware a rising threat to mobile banking users

Alien malware a rising threat to mobile banking users

The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

IPStorm's ability to infect Android, macOS and Windows devices as well as those that are Linux-based makes it much more dangerous.

SAP ASE leaves sensitive credentials in installation logs

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Load More