Advertisement

eliminate insider threats 1

Recent cases highlight need for insider threat awareness and action

Insider threats can have a devastating impact even if the harm is unintentional. Here's advice to identify and mitigate insider threat risk.


international flags / global business discussion

22 notable government cybersecurity initiatives in 2022

Countries across the globe are taking on cybersecurity threats. Here are the most notable initiatives they've introduced in 2022.


post 3 image how hardened vms can help with cloud security 1

Cryptojacking, DDoS attacks increase in container-based cloud systems

Victims lose $53 for every $1 cryptojackers gain, according to a new report from Sysdig.


Advertisement

abstract collage of money with wall street finance

16 Wall Street firms fined $1.8B for using private text apps, lying about it

The banks and brokerages were fined because employees were messaging and texting with clients without recording the communications, as required. And some of the firms' execs lied about it and deleted messages.


Networking cables viewed through a magnifying lens reveal a data breach.

Swachhata municipal engagement platform breached, researchers say

Personally identifiable information of 16 million users of the swachh.city citizen participation site has been dumped on dark web forums, according to cybersecurity firm CloudSek


Cyber warfare  >  Russian missile launcher / Russian flag / binary code

UK organizations, Ukraine's allies warned of potential "massive" cyberattacks by Russia

UK National Cyber Security Centre CEO Lindy Cameron reflects on Russia’s recent cyber activity as Ukraine warns its allies to prepare for cyberattacks targeting critical infrastructure.


hacker linkedin scam romance scam on social media phishing heart

How cybercriminals use public online and offline data to target employees

A LinkedIn post about getting a new job turned into a potential phishing scam. Similar incidents are more common than you might think.


windows 11 logo bloom

What are the new Windows 11 22H2 security features?

The September Windows 11 update add protections against malicious applications and drivers, phishing, credential misuse, and more.


security audit - risk assessment - network analysis

Zoho ManageEngine flaw is actively exploited, CISA warns

Threat actors are exploiting unpatched ManageEngine instances. CISA adds the vulnerability to its catalog and Zoho urges customers to check their deployments.


Cybersecurity  >  locked binary code
Apple Holic

Jamf buys ZecOps to bring high-end security to Apple enterprise

ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.


Advertisement

VPN on iPhone

97% of enterprises say VPNs are prone to cyberattacks: Study

Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler.


A binary mask.

The deepfake danger: When it wasn’t you on that Zoom call

Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.


Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.


A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


optus store provided by optus media centre

A third of Australian population likely affected in Optus cyberattack

Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.