11 ways ransomware is evolving

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 30, 2018
Featured Image

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

11 ways ransomware is evolving
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
1.4B stolen passwords are free for the taking: What we know now
SamSam ransomware attacks have earned nearly $850,000
Think of 'insiders' when drafting and implementing security policies
Review: Bricata adds threat hunting to traditional IPS/IDS

White Paper: Everbridge

Critical IT Events Demand a Faster Response Than Ever

Shortening response time to critical IT events ought to be a business imperative. The longer a company takes to address an IT issue, the more severe the impact on the IT staff, end users, and ultimately on the business as a whole. Read More

Thumbnail Image

11 ways ransomware is evolving

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

1.4B stolen passwords are free for the taking: What we know now

The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords. Read More

Thumbnail Image

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD Read More

Thumbnail Image

Think of 'insiders' when drafting and implementing security policies

By following a few simple steps, the risk of vendor personnel using customer systems can be greatly diminished. Read More

Thumbnail Image
INSIDER

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies. Read More

White Paper: VMware

Migrating Apps to the Cloud in 5 Steps

Cloud applications, platforms and services are changing the way enterprises compete for customers. The implementation of cloud technology promises business transformation and modernization, while adding product value and meeting the increasingly demanding needs of applications. By developing a sound migration strategy and evaluating your business processes, effective cloud migration can be achieved on-time and on-budget with minimal risk. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.