CSO

CSO Daily

December 13, 2019

Image: Cryptominers and fileless PowerShell techniques make for a dangerous combo

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes. Read more ▶

Your Must-Read Stories

•

Best antivirus software: 12 top tools

•

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

•

3 cloud security ‘hacks’ to consider today

•

2020 cybersecurity trends: 9 threats to watch

•

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

•

The race for quantum-proof cryptography

White Paper: Finisar Corporation

SWDM: The Lowest Total Cost Solution for 40G/100G in the Enterprise Data Center

Large and medium sized enterprises have been widely deploying 10G Ethernet for several years. Their data center infrastructure has been primarily architected around duplex OM3 and OM4 multimode fiber (MMF), since most of the switch port interfaces are multimode 10GBASE-SR using the SFP+ transceiver form factor. Read more ▶

Image: Best antivirus software: 12 top tools

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability. Read more ▶

 
 
Image: 3 cloud security ‘hacks’ to consider today

3 cloud security ‘hacks’ to consider today

Keeping your cloud deployments secure is a full-time job. Here are a few shortcuts that make your cloud security better and your life easier Read more ▶

Image: 2020 cybersecurity trends: 9 threats to watch

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them. Read more ▶

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

Image: The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com