CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

February 14, 2022

NIST releases software, IoT, and consumer cybersecurity labeling guidance

The new guidance aims to tighten security requirements for federally purchased software and give consumers better insight into the security of software and devices they buy. Read more ▶

Image: Sponsored by ExtraHop: IT in the Crosshairs of Modern Ransomware

BrandPost Sponsored by ExtraHop

Sponsored by ExtraHop: IT in the Crosshairs of Modern Ransomware

The days of smash-and-grab cyberattacks are over. Instead, headline-making hits on Acer, JBS Foods, and Colonial Pipeline make it clear: We've entered a new, more sophisticated modern era of ransomware tactics.

How BIC is removing roadblocks for Black security pros

Blacks in Cybersecurity offers a “spinning wheel of resources” to help its members advance their cybersecurity skills and careers, says founder and CEO Michaela Barnett.

CISA warns about 15 actively exploited vulnerabilities

The high-severity vulnerabilities that CISA has added to its patch-now list include SeriousSAM privilege escalation and SMB remote code execution.

Image: Hear from AstraZeneca, Prudential Financial, Target and more at CIO’s Future of Work Summit

Hear from AstraZeneca, Prudential Financial, Target and more at CIO’s Future of Work Summit

Focusing on talent, technology, culture and leadership, the summit, held virtually February 15-17, will feature speakers from major companies, consultancies, and academia to help IT leaders navigate their way through the complexities of a vastly changed corporate landscape.

Major SAP vulnerability requires urgent patch to prevent HTTP request smuggling attacks

SAP ICM vulnerability allows theft of credentials and session information, which can be used to launch ransomware and steal sensitive data.

New Magnet Forensics app automates, coordinates cybersecurity response

Magnet's new application, Automate Enterprise, is designed to speed up investigation and response to cybersecurity incidents by automating basic and repetitive manual tasks, and integrating detection and post-incident tools including SIEM and EDR software.

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494