Shadow Brokers teases more Windows exploits and cyberespionage data

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 17, 2017
Featured Image
INSIDER

What security leaders are surprised to learn about cyber insurance

Jason Christopher reveals some surprising insights on what cyber insurance offers for security leaders and how to take advantage of these benefits Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Shadow Brokers teases more Windows exploits and cyberespionage data
36% off iOttie Easy One Touch 2 Car Mount Holder - Deal Alert
How 'smart cities' push IoT cybersecurity for state and local IT
Digital signature service DocuSign hacked and email addresses stolen
DevOps and cloud infrastructure permutations
The CSO IoT security basics survival guide

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Shadow Brokers teases more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs. Read More

Thumbnail Image
DealPost

36% off iOttie Easy One Touch 2 Car Mount Holder - Deal Alert

Averaging 4.5 out of 5 stars from over 17,000 people on Amazon, this popular smartphone car mount locks and releases the device with just a push of a finger, features a telescopic adjustable arm, and is discounted a generous 36% right now. Read More

Thumbnail Image

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT technology to better serve citizens quickly while ensuring that this rapid pace doesn’t introduce more security problems than it’s worth. Read More

Thumbnail Image

Digital signature service DocuSign hacked and email addresses stolen

Digital signature service DocuSign said Monday that an unnamed third-party had got access to email addresses of its users after hacking into its systems. Read More

Thumbnail Image

DevOps and cloud infrastructure permutations

The cloud has one DevOps advantage - it limits the number of permutations of storage, network, and CPU combinations that can be used for infrastructure (IaaS). Read More

Thumbnail Image
INSIDER

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks. Read More

White Paper: Viavi Solutions

10th Annual State of The Network Study

The Tenth Annual State of the Network Global Study focuses a lens on the network team's role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. Read More

Top 5 Stories

1. Microsoft patches Windows XP and Server 2003 due to WannaCrypt attacks
2. A 'kill switch' is slowing the spread of WannaCry ransomware
3. Did Kaspersky step in dog-doo?
4. Vendors approve of NIST password draft
5. A ransomware attack is spreading worldwide, using alleged NSA exploit

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.