CSO

CSO Update

January 27, 2019

Image: Ursnif Trojan is back with fileless persistence

Ursnif Trojan is back with fileless persistence

Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros. Read more ▶

Your Must-Read Stories

•

Multi-vector attacks target cloud-hosted technologies

•

15 secure coding practices to use in digital identity

•

Center for Internet Security releases Microsoft 365 benchmarks

•

How to land a digital forensics job

•

4 tips to mitigate Slack security risks

•

Back to basics: Malware explained

White Paper: Osterman Research

Why You Need Third Party Solutions for Office 365

his white papers discusses some of the gaps in Office 365 and why third-party solutions to supplement or replace some of the native capabilities in Office 365 is a good idea. Read more ▶

Image: Multi-vector attacks target cloud-hosted technologies

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: 15 secure coding practices to use in digital identity

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data. Read more ▶

 
 
Image: Center for Internet Security releases Microsoft 365 benchmarks

Center for Internet Security releases Microsoft 365 benchmarks

Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization. Read more ▶

Image: How to land a digital forensics job

How to land a digital forensics job

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path. Read more ▶

Image: 4 tips to mitigate Slack security risks

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more ▶

Image: Back to basics: Malware explained

Back to basics: Malware explained

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it. Read more ▶

White Paper: Osterman Research

Addressing the Top 10 Security Issues Organizations Face

This white paper focuses on the Top 10 security threats facing organizations and what can be done to address them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.