Laden...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
February 14, 2025
What is anomaly detection? Behavior-based analysis for cyber threats
Anomaly detection can be powerful in spotting cyber incidents, but experts say CISOs should balance traditional signature-based detection with more bespoke methods that can identify malicious activity based on outlier signals.
Read more
Unusual attack linked to Chinese APT group combines espionage and ransomware
The attacker deployed a variant of the PlugX cyberespionage toolset previously associated with Chinese APT groups against a small company that they then infected with the RA World ransomware and extorted for money.
Russian hacking group targets critical infrastructure in the US, the UK, and Canada
Microsoft warns of expanding Russian cyberwarfare as attackers exploit software to breach enterprises.
CISA, FBI call software with buffer overflow issues âunforgivableâ
The federal directive forbids vendors from shipping software with such flaws, and flags recent Microsoft, and Ivanti zero-days as examples.
24% of vulnerabilities are abused before a patch is available
Exploited CVEs increased by a fifth in 2024, according to analysis by VulnCheck, with increased transparency and improved monitoring playing a role. Still, proactive measures are vital.
What security teams need to know about the coming demise of old Microsoft servers
While the planned phase-out of Microsoft Exchange 2016 and Exchange 2019 is many months away, evaluate your organizationâs needs now to avoid hassles down the road.
Beyond the paycheck: What cybersecurity professionals really want
In the face of talent shortages, organisations must rethink their approach to retaining cybersecurity professionals as money isnât always the motivation professionals are looking for.
© 2025