CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

April 13, 2022

Ukraine energy facility hit by two waves of cyberattacks by Russia’s Sandworm group

Sandworm succeeded in planting a new version of the Industroyer malware to disrupt ICS infrastructure at multiple levels, but was thwarted from doing serious damage. Read more ▶

Image: Sponsored by ActZero: Cybersecurity Template: Incident Response Guide

Sponsored by ActZero: Cybersecurity Template: Incident Response Guide

This incident response template is built for IT teams and CISOs tasked with responding to security breaches or other incidents. It provides a step-by-step list of basic detection and response actions for IT teams to follow as they respond to and remediate incidents of various severities.

Serious flaws allow the hijacking of autonomous logistics robots used in hospitals

The now patched JekyllBot:5 vulnerabilities in Aethon TUG robots expose three communications interfaces, two APIs, and a websocket interface.

FBI active defense measure removes malware from privately owned firewalls

The action targeted devices infected by the Cyclops Blink malware, believed to have been developed by Russia's Sandworm group.

Image: Who is your biggest insider threat?

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

Thoma Bravo's $6.9B SailPoint deal brings IAM to security portfolio

SailPoint's IAM (identity access management) capabilities fill a gap in private equity firm Thoma Bravo's cybersecurity portfolio.

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494