CSO

CSO Daily

May 12, 2020

Image: Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot. Read more ▶

Your Must-Read Stories

•

State of Software Security

•

COVID-19 pandemic accelerates transformation in enterprise security

•

6 ways attackers are exploiting the COVID-19 crisis

•

Healthcare security in a time of crisis

•

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

•

How IoT changes your threat model: 4 key considerations

•

32 hardware and firmware vulnerabilities: A guide to the threats

Miscellaneous: Veracode

State of Software Security

Read the report to gain valuable perspective on the state of software security today. Read more ▶

Image: COVID-19 pandemic accelerates transformation in enterprise security

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

Image: 6 ways attackers are exploiting the COVID-19 crisis

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Image: Healthcare security in a time of crisis

Healthcare security in a time of crisis

Podcast Episode 8: Listen now as Gary Gooden, CISO at Seattle Children’s, joins host Bob Bragdon to discuss the impact of COVID-19 on security at the healthcare organization.

Image: Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Image: How IoT changes your threat model: 4 key considerations

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

Image: 32 hardware and firmware vulnerabilities: A guide to the threats

32 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Twitter Facebook LinkedIn
Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com