CSO Security Leadership
The day's top cybersecurity news and in-depth coverage
July 15, 2024
AT&s massive breach of metadata is a criminal treasure trove â as spy agencies know
There is plenty of intelligence that can be gathered from call data records if you know where to look. Spy agencies have been doing it effectively for years. Read more
Why a TikTok ban makes sense
The U.S. attempting to ban TikTok goes beyond just stopping a social media app that shows funny dance videos or makeup tips. Experts in national intelligence say itâs about stopping a foreign state (China) from waging information warfare against the U.S. and protecting citizens from propaganda campaigns. Keith chats with Craig Albert, Ph.D., from Augusta University about the dangers of TikTok, as well as how foreign nations and other cyberhacker groups utilize social media to subtly (and not-so-subtly) influence the opinions of American citizens.Read more
AT&T confirms arrest in data breach of more than 110 million customers
This is apparently the first cybersecurity incident where the Justice Department initially allowed an enterprise to not disclose Read more
Known SSH-Snake bites more victims with multiple OSS exploitation
The threat actor uses a multitude of open-source software tools to find and exploit vulnerabilities within victim systems. Read more
Get more from the voice of CSOs and IT leadership
Read more from CSO delivered to your inbox. Subscribe now.
Mobile surveillance software firm mSpy suffers data breach
Attackers scoop 318GB of data from 10 years of customer support tickets. Read more
Top 10 open source software security risks â and how to mitigate them
Open source software is the bedrock of modern software development, but it can also be a weak link in the software supply chain. Here are the biggest risks â and tips on how to safely use OSS components. Read more
What is the CIA triad? A principled framework for defining infosec policies
The CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organizationâs efforts and policies aimed at keeping its data secure â but tradeoffs are necessary in real-world scenarios. Read more