Laden...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
February 17, 2025
How to evaluate and mitigate risks to the global supply chain
CISOs are under the gun to understand and address potential risks tied to geopolitical tensions, regulations and other changes outside their control.
Read more
CSO Award and Hall of Fame Nominations Open Now
Get recognition for your organizationâs innovations in security. Submit by April 10 to be considered.
Unusual attack linked to Chinese APT group combines espionage and ransomware
The attacker deployed a variant of the PlugX cyberespionage toolset previously associated with Chinese APT groups against a small company that they then infected with the RA World ransomware and extorted for money.
What is anomaly detection? Behavior-based analysis for cyber threats
Anomaly detection can be powerful in spotting cyber incidents, but experts say CISOs should balance traditional signature-based detection with more bespoke methods that can identify malicious activity based on outlier signals.
whoAMI name confusion attacks can expose AWS accounts to malicious code execution
Due to a misconfiguration, developers could be tricked into retrieving malicious Amazon Machine Images (AMI) while creating EC2 instances.
Palo Alto Networks firewall bug being exploited by threat actors: Report
PAN admins urged to block open internet access to firewall management interfaces after discovery of vulnerability.
PostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacks
Rapid7 researchers believe the BeyondTrust Remote Support attacks from December also exploited a zero-day flaw in PostgreSQL.
© 2025