CSO

CSO Daily

February 21, 2019

Image: IoT botnets target Polycom video conferencing systems

IoT botnets target Polycom video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more ▶

Your Must-Read Stories

•

Are zero-day exploits the new norm?

•

The cybersecurity legislation agenda: 5 areas to watch

•

North Korean hackers target Russian-based companies

•

How much does it cost to launch a cyberattack?

•

Review: SlashNext is like shooting phish in a barrel

•

How to update Windows 10 for side channel vulnerability fixes

eGuide: SecureAuth

Best Practice Guide to Strong Identity Access Management: Prevent and Contain Breaches - Without Impacting Users

Read your guide to prevent breaches from attackers with stolen credentials and ways around 2FA. The more you know about users, the more confidently you can remove authentication disruptions. Read more ▶

Image: Are zero-day exploits the new norm?

Are zero-day exploits the new norm?

Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more ▶

Image: Empower your teams with Salesforce's productivity platform — get started for free

FROM OUR BUSINESS PARTNERS

Empower your teams with Salesforce's productivity platform — get started for free

Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more ▶

Image: The cybersecurity legislation agenda: 5 areas to watch

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list. Read more ▶

 
 
Image: North Korean hackers target Russian-based companies

North Korean hackers target Russian-based companies

The North Korean Lazarus APT group is going after the Russians. Russian hackers, however, needed less than 20 minutes in 2018 to completely pwn an organization. Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

Image: Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶

Image: How to update Windows 10 for side channel vulnerability fixes

How to update Windows 10 for side channel vulnerability fixes

Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more ▶

White Paper: SecureAuth

Making Passwordless Possible: How SecureAuth is eliminating passwords while improving security and user experience

This paper explores how you can actually increase security and make users more productive by removing them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.