Quantcast
Channel: Greg Kushto | CSO Online
Browsing latest articles
Browse All 863 View Live

Image may be NSFW.
Clik here to view.

Teams, Slack & Co. absichern: So wird das Collaboration-Tool kein...

Collaboration Tools wie Microsoft Teams und Slack erleichtern die Zusammenarbeit mit internen und externen Partnern enorm, bergen jedoch auch Risiken. Foto: Ascannio – shutterstock.comSchnelle und...

View Article


Microsoft Authenticator passkey support to be native in January

Microsoft has positioned itself as a strong convert to passkeys, with a promise to deliver passkey support in its Microsoft Authenticator app in mid-January 2025. Even though all enterprises will have...

View Article

Image may be NSFW.
Clik here to view.

Kicking dependency: Why cybersecurity needs a better model for handling OSS...

Most cybersecurity professionals are accustomed by now to the widespread adoption of open-source software (OSS) and the ever-growing threat of software supply chain attacks that target the OSS...

View Article

Security associations CISOs should know about

Security organizations help CISOs gain valuable industry certifications, tap into peer insights, stay in touch with changing technology, and offer networking opportunities. Here are some CISOs can...

View Article

Image may be NSFW.
Clik here to view.

Nokia-Daten im Darknet aufgetaucht

In einem Hackerforum werden Quellcode und andere sensible Daten von Nokia zum Verkauf angeboten.JRdes – Shutterstock.com Der bekannte Bedrohungsakteur IntelBroker behauptet in einem Hackerforum, an...

View Article


Was your last DocuSign-ed bill legitimate? Check again

Threat actors are abusing the APIs of trusted e-signing services platform DocuSign to send out convincing invoices in a new phishing campaign. In a research published this week, Cybersecurity firm,...

View Article

Schneider Electric suffers data breach, exposing critical project and user data

A hacker group known as “Grep” has reportedly infiltrated Schneider Electric’s internal project tracking system, stealing about 40 GB of data in the latest cyberattack targeting the French...

View Article

Image may be NSFW.
Clik here to view.

Wie Hacker ML für Angriffe nutzen

srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_1255043227.jpg?quality=50&strip=all 4500w,...

View Article


Five-country attack on cybercrooks welcomed by security expert

The revelation this week that an international operation took down thousands of malicious IP addresses is good news, says a cybersecurity expert, but the better news is the arrest of 41 suspects....

View Article


DDoS attacks: Definition, examples, techniques, and how to defend them

What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a digital service to be delivered. This could be sending a web...

View Article

Top 5 security mistakes software developers make

Creating and enforcing the best security practices for application development teams isn’t easy. Software developers don’t necessarily write their code with these in mind, and as the appdev landscape...

View Article

Infostealers are using BYOVD to steal critical system data

Threat actors are dropping a new info-stealer on Windows systems that uses the bring your own vulnerable driver (BYOVD) technique to extract victims’ browser data, software details, and credit card...

View Article

Image may be NSFW.
Clik here to view.

Interpol nimmt 22.000 IP-Adressen vom Netz

Interpol In einer konzentrierten Polizeiaktion hat Interpol zusammen mit mehreren privatwirtschaftlichen Partnern und Strafverfolgungsbehörden aus 95 Interpol-Mitgliedsländern der Cybercrime-Szene mal...

View Article


Beware malicious NPM packages, Checkmarx warns

Application testing company Checkmarx has warned developers to be on the lookout for malicious NPM packages, after discovering a new attack that employs typosquatting to impersonate two popular...

View Article

Why AI is the final missing piece of the CNAPP puzzle

Cloud security teams are facing a growing number of risks due to the complex and dynamic nature of cloud environments. Prioritizing and remediating these vulnerabilities and misconfigurations before...

View Article


Cisco IoT wireless access points hit by severe command injection flaw

Cisco’s Ultra-Reliable Wireless Backhaul (URWB) hardware has been hit with a hard-to-ignore flaw that could allow attackers to hijack the access points’ web interface using a crafted HTTP request....

View Article

The US Department of Defense has finalized cyber rules for its suppliers

A new rule by the US Department of Defense to ensure that contractors and subcontractors are implementing information security measures required by the federal government is set to take effect 60 days...

View Article


Choosing AI: the 7 categories cybersecurity decision-makers need to understand

Most of the chatter about artificial intelligence (AI) in cybersecurity concerns the technology’s use in augmenting and automating the traditional functional tasks of attackers and defenders, like how...

View Article

US consumer protection agency bans employee mobile calls amid Chinese hack fears

The US Consumer Financial Protection Bureau (CFPB) has issued an urgent directive barring employees and contractors from using mobile phones for work-related calls, following a major breach in US...

View Article

Image may be NSFW.
Clik here to view.

Ransomware-Attacke auf bayerische Schulen

Hacker sind in die IT-Systeme von sieben bayerischen Schulen eingedrungen. CeltStudio – Shutterstock.com Bereits im Oktober wurden sieben weiterführenden Bildungseinrichtungen im Landkreis Kitzingen...

View Article
Browsing latest articles
Browse All 863 View Live