CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 10, 2022

Hackers using stealthy Linux backdoor Symbiote to steal credentials

Symbiote is deployed as a shared object that can inject itself into existing processes, making it difficult to detect. Read more ▶

Image: Sponsored by Akamai: Get Clear About Zero Trust and Get Started

Sponsored by Akamai: Get Clear About Zero Trust and Get Started

There’s a case to be made for calling it One-to-One security, says the chief technology officer of Akamai.

Software supply chain security fixes gain prominence at RSA

Attendees are urged to improve asset management, use SBOMs, and collaborate with government cybersecurity agencies to better ensure software integrity.

Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program

The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members.

Image: 9 types of computer virus and how they do their dirty work

9 types of computer virus and how they do their dirty work

From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.

Snowflake offers cybersecurity data platform with security app integrations

Snowflake's cybersecurity workload integrates the company's data cloud, storage and query features with tools from cybersecurity vendors, for enhanced threat detection, investigation and alerts.

ConcealBrowse isolates malicious software before it can work its mischief

Agent-based solution screens code to prevent browser-borne attacks on the enterprise.

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494