CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 02, 2021

17 cyber insurance application questions you'll need to answer

Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking. Read more ▶

Image: What are phishing kits? Web components of phishing attacks explained

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

SolarWinds attacker Nobelium targets over 150 companies in new mass email campaign

The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services.

How cybercriminals turn "harmless" stolen or leaked data into dollars

By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.

Image: The 6 most common types of software supply chain attacks

The 6 most common types of software supply chain attacks

Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.

HITRUST explained: One framework to rule them all

HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494