CSO

CSO Daily

December 12, 2019

Image: 2020 cybersecurity trends: 9 threats to watch

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them. Read more ▶

Your Must-Read Stories

•

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

•

How to secure your DNS traffic under Windows

•

9 top fuzzing tools: Finding the weirdest application errors

•

Cryptominers and fileless PowerShell techniques make for a dangerous combo

•

The race for quantum-proof cryptography

•

How a nuclear plant got hacked

White Paper: IBM

A Forrester Opportunity Snapshot: Unlock Open Source Technology’s Full Value

The results were clear: enterprises need help unlocking the full potential of large-scale open source software adoption. Read more ▶

Image: Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How to secure your DNS traffic under Windows

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection. Read more ▶

 
 
Image: 9 top fuzzing tools: Finding the weirdest application errors

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit. Read more ▶

Image: Cryptominers and fileless PowerShell techniques make for a dangerous combo

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes. Read more ▶

Image: The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research. Read more ▶

Image: How a nuclear plant got hacked

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided. Read more ▶

Video/Webcast: IBM

CIO Playbook: Real examples of integrating the data center and cloud

IBM can be your single support partner for your journey to cloud. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com