CSO

CSO Update

January 20, 2019

Image: Temporary micropatch available for zero-day Windows exploit

Temporary micropatch available for zero-day Windows exploit

A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix. Read more ▶

Your Must-Read Stories

•

Rocke coinminer disables cloud protection agents

•

I can get and crack your password hashes from email

•

Building your forensic analysis toolset

•

Why AI-based threat detection hasn’t taken over the market … yet

•

How to enable audit logs in Microsoft Office 365

•

New CISO appointments, January 2019

White Paper: GoToMeeting

A Buyer's Guide to Software Built for the Future of Work

A transformation to a more globally dispersed, flexible and remote workforce is happening–in some companies more rapidly than others. Read more ▶

Image: Rocke coinminer disables cloud protection agents

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

 
 
Image: Building your forensic analysis toolset

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶

Image: Why AI-based threat detection hasn’t taken over the market … yet

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more ▶

Image: How to enable audit logs in Microsoft Office 365

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more ▶

Image: New CISO appointments, January 2019

New CISO appointments, January 2019

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

Research/Infographic: GoToMeeting

Millennial's and Meetings: The Future of Collaboration

Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.