CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 01, 2021

How cybercriminals turn "harmless" stolen or leaked data into dollars

By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns. Read more ▶

Image: Sponsored by Terranova Security: Register for the 2021 Security Awareness Virtual Summit!

Sponsored by Terranova Security: Register for the 2021 Security Awareness Virtual Summit!

Discover how to best align your security awareness training program KPIs with your overall cybersecurity goals. On June 22nd, join Terranova Security, sponsor Microsoft and a line up of industry experts like Gartner for the 2021 Security Awareness Virtual Summit! Register Today!

Defining linchpins: An industry perspective on remediating Sunburst

The concept of linchpin software can be useful in assessing risk and focusing security efforts, but it comes with challenges.

SolarWinds attacker Nobelium targets over 150 companies in new mass email campaign

The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services.

Image: 6 most common types of software supply chain attacks explained

6 most common types of software supply chain attacks explained

Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.

HITRUST explained: One framework to rule them all

HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.

How to prepare for the demise of Windows NT LAN Manager

NTLM is a less secure protocol for authenticating Windows network access. Follow these steps to begin migration off it or to limit its use.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494