CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

March 29, 2022

Leaked hacker logs show weaknesses of Russia’s cyber proxy ecosystem

Recently leaked documents from the Conti cybercriminal gang provide clues to how Western governments and CISOs can better combat Russian proxy threat actors. Read more ▶

Image: Sponsored by ExtraHop: New Gartner Report, Quick Answer: Ransomware — What Happens If You Pay?

BrandPost Sponsored by ExtraHop

Sponsored by ExtraHop: New Gartner Report, Quick Answer: Ransomware — What Happens If You Pay?

There's one surefire way to end ransomware once and for all: Stop paying. If every organization that suffered a ransomware attack refused to pay up, the threats would lose their income stream, and the work would dry up leading to the end of these attacks as we know them.

CISA, FBI, DOE issue cybersecurity advisory on Russian attacks against global energy sector

The advisory outlines two intrusion campaigns against U.S. and international energy sector organizations and warns of persistent threats posed by Russian cyber operations.

Malware detections surge from "COVID Bounce"

A year after pandemic peak, malicious threats to businesses and consumers rose above pre-virus levels, especially for mobile devices.

Image: Making security a more welcoming field for women

Making security a more welcoming field for women

Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.

New open-source tool tackles pesky access denial messages in AWS

Access Undenied will take a CloudTrail event with an 'Access Denied' outcome and tell you how to fix it.

Man-in-the-middle (MitM) attack definition and examples

A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data.

Ransomware, endpoint risks are top concerns for DFIR professionals

Digital forensics incident responders worry most about ransomware, but risks associated with remote work are also top of mind.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494