CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

January 07, 2021

4 ways attackers exploit hosted services: What admins need to know

Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for. Read more ▶

Image: 33 hardware and firmware vulnerabilities: A guide to the threats

33 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Egregor ransomware group explained: And how to defend against it

Egregor is one of the most rapidly growing ransomware families. It employs "double ransom" techniques to threaten reputational damage and increase pressure to pay.

How to prepare for and respond to a SolarWinds-type attack

If you can perform these tasks on your Windows network, then you are properly prepared to respond to a nation-state attack like SolarWinds.

Differential privacy: Pros and cons of enterprise use cases

Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.

5 questions CISOs should ask prospective corporate lawyers

Where can you find an attorney with the knowledge and insight to help you navigate thorny privacy and security issues? These five questions will help you find the right match.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
492 Old Connecticut Path
Framingham, MA 01701