CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

December 11, 2021

Apache Log4j vulnerability actively exploited, impacting millions of Java-based apps

The vulnerability affects not only Java-based applications and services that use the library directly, but also many other popular Java components and development frameworks that rely on it. Read more ▶

Image: Google disrupts major malware distribution network Glupteba

Google disrupts major malware distribution network Glupteba

The botnet take-down is believed to be temporary as the criminal group has a backup command-and-control mechanism based on Bitcoin blockchain.

Researchers warn about continuous abuse of unpatched MikroTik routers

Attackers are still exploiting unaddressed vulnerabilities in an estimated 300,000 MikroTik routers. A new tool will detect compromised devices.

Your Microsoft network is only as secure as your oldest server

It's time to inventory your network to identify systems to replace or migrate away from.

Image: Penetration testing explained: How ethical hackers simulate attacks

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the system’s owners.

How CISOs can drive the security narrative

If you want people to follow proper security practices, they need to understand why. That's best done by telling a good story.

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494