CSO

CSO Update

April 14, 2019

Image: Privacy violations involving FEMA contractor may be more widespread

Privacy violations involving FEMA contractor may be more widespread

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk? Read more ▶

Your Must-Read Stories

•

What is Emotet? And how to guard against this persistent Trojan malware

•

6 ways to fight deploy and decay

•

Cybercrime groups raise the bar for security teams by borrowing APT techniques

•

New TajMahal APT discovered by Kaspersky has one known victim, likely others

•

How and why deepfake videos work — and what is at risk

•

Group behind TRITON industrial sabotage malware made more victims

eBook: Red Canary

Threat Detection Report

MITRE ATT&CK™ has become the security industry’s de facto standard for measuring detection coverage and visibility. In 2017, Red Canary adopted the ATT&CK framework across our operations and platform to standardize the way we communicate about threats and detection coverage. We now have multiple years of detection data mapped back to ATT&CK. Read more ▶

Image: What is Emotet? And how to guard against this persistent Trojan malware

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here's what you can do to safeguard your business. Read more ▶

Image: You Can Now Get This Award-Winning VPN For Just $1/month

FROM OUR BUSINESS PARTNERS

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: 6 ways to fight deploy and decay

6 ways to fight deploy and decay

Even your best security controls will weaken over time after deployment, much to hackers' delight. Take these steps to slow down or get ahead of that decay. Read more ▶

 
 
Image: Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more ▶

Image: New TajMahal APT discovered by Kaspersky has one known victim, likely others

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once. Read more ▶

Image: How and why deepfake videos work — and what is at risk

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous. Read more ▶

Image: Group behind TRITON industrial sabotage malware made more victims

Group behind TRITON industrial sabotage malware made more victims

The attackers stayed undetected on the victim's network for more than a year and sought out operational technology networks. Read more ▶

White Paper: Neustar

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security

Forty Years After the First DDoS Attack, Hackers Are Developing New Ways to Disrupt Network Security and Pilfer Personal Data. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.