CSO

CSO Daily

May 12, 2020

Image: Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot. Read more ▶

Your Must-Read Stories

•

State of Software Security

•

COVID-19 pandemic accelerates transformation in enterprise security

•

6 ways attackers are exploiting the COVID-19 crisis

•

Healthcare security in a time of crisis

•

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

•

How IoT changes your threat model: 4 key considerations

•

32 hardware and firmware vulnerabilities: A guide to the threats

Miscellaneous: Veracode

State of Software Security

Read the report to gain valuable perspective on the state of software security today. Read more ▶

Image: COVID-19 pandemic accelerates transformation in enterprise security

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

Image: 6 ways attackers are exploiting the COVID-19 crisis

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Image: Healthcare security in a time of crisis

Healthcare security in a time of crisis

Podcast Episode 8: Listen now as Gary Gooden, CISO at Seattle Children’s, joins host Bob Bragdon to discuss the impact of COVID-19 on security at the healthcare organization.

Image: Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Image: How IoT changes your threat model: 4 key considerations

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

Image: 32 hardware and firmware vulnerabilities: A guide to the threats

32 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Twitter Facebook LinkedIn
Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com