CSO

CSO Update

December 12, 2019

Image: Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability. Read more ▶

Your Must-Read Stories

•

2020 cybersecurity trends: 9 threats to watch

•

How to secure your DNS traffic under Windows

•

Why BT's red team strikes for real

•

Cryptominers and fileless PowerShell techniques make for a dangerous combo

•

How a nuclear plant got hacked

•

The race for quantum-proof cryptography

White Paper: IBM

A Forrester Opportunity Snapshot: Unlock Open Source Technology’s Full Value

The results were clear: enterprises need help unlocking the full potential of large-scale open source software adoption. Read more ▶

Image: 2020 cybersecurity trends: 9 threats to watch

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How to secure your DNS traffic under Windows

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection. Read more ▶

 
 
Image: Why BT's red team strikes for real

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security. Read more ▶

Image: Cryptominers and fileless PowerShell techniques make for a dangerous combo

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes. Read more ▶

Image: How a nuclear plant got hacked

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided. Read more ▶

Image: The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research. Read more ▶

Video/Webcast: IBM

CIO Playbook: Real examples of integrating the data center and cloud

IBM can be your single support partner for your journey to cloud. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com