Quantcast
Channel: Hackers target SSRF flaws to steal AWS credentials | CSO Online
Browsing all 1623 articles
Browse latest View live

Tool used by ransomware groups now seen killing EDR: Report

Defenders are being warned that a tool used by several ransomware gangs to sabotage the functions of endpoint protection software has been updated, with at least one attacker using a new capability to...

View Article


BlackByte ransomware gang exploits more orgs than previously known

According to security researchers, the BlackByte ransomware group has been more active in exploiting organizations than previously thought. Security researchers from Cisco Talos have found evidence...

View Article


5 best practices for running a successful threat-informed defense in...

If you’ve been in cybersecurity for the past five to 10 years, you’ve probably heard the term “threat-informed defense.” Simply stated, a threat-informed defense focuses security teams, technologies,...

View Article

The US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributor

The US Department of State is offering a reward of $2.5 million for information leading to the arrest of Volodymyr Kadariya, the cybercriminal associated with an alleged scheme to transmit the Angler...

View Article

Telegram CEO allowed platform to be abused by criminals, French prosecutors...

Days on from his arrest at Paris Le Bourget airport last Saturday, it looks as if Telegram founder and CEO Pavel Durov will be spending more time in France than he bargained for. On Wednesday, French...

View Article


Google ups bug bounties for ‘high quality’ Chrome hunters

Google has announced new compensation incentives for people who find vulnerabilities in the Chrome browser as part of the company’s Chrome Vulnerability Reward Program (VRP). The increases to its...

View Article

Iranian threat actors targeting businesses and governments, CISA, Microsoft warn

Warnings went out this week to infosec leaders about two groups of Iranian threat actors attacking American and other organizations. The US Cybersecurity and Infrastructure Security Agency (CISA), the...

View Article

F5, Intel team up to boost AI delivery, security

F5 this week said it’s working with Intel to offer customers a way to develop and securely deliver AI-based inference models and workloads. Specifically, the companies will combine the security and...

View Article


Fortinet expands security lineup with sovereign SASE

The concept of the secure access service edge (SASE) is one that many organizations have embraced in recent years. A challenge for some enterprise adopters, however, is a lack of control, as some SASE...

View Article


The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...

View Article

15 infamous malware attacks: The first and the worst

Viruses and other malware spreading for sinister or baffling reasons has been a staple of cyberpunk novels and real-life news stories alike for decades. And in truth, there have been computer viruses...

View Article

Ransomware feared in the cyberattack on US oil services giant

The August 21 cyberattack on the US oilfield services contractor Halliburton is now feared to be a ransomware attack, according to an email reportedly sent to the company’s suppliers. BleepingComputer...

View Article

LLMs fueling a “genAI criminal revolution” according to Netcraft report

Like seemingly everyone else, threat actors are increasingly adopting generative artificial intelligence (genAI) as a business tool. Recent findings by security researchers at Netcraft have revealed...

View Article


Image may be NSFW.
Clik here to view.

Women in Cyber Day finds those it celebrates ‘leaving in droves’

The information security industry has been trying for years to improve the participation of and respect for women in the cyber community, with some rising to CSO positions. But with International...

View Article

Ransomware recovery: 8 steps to successfully restore from backup

According to a Sophos survey of 5,000 IT and cybersecurity leaders released in April, 59% of organizations have been hit by a ransomware attack in 2023, from which 56% paid a ransom to get their data...

View Article


North Korean hackers actively exploited a critical Chromium zero-day

A zero-day flaw in open source browser, Chromium, which was patched recently, was exploited by a financially motivated North Korean threat actor, Citrine Sleet, to deliver the FudModule rootkit. The...

View Article

How to ensure cybersecurity strategies align with the company’s risk tolerance

Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one that requires balancing technical controls and business needs. Achieving that balance...

View Article


Cloud providers must own up to their part in the current state of insecurity

The shared responsibility model has been foundational to cybersecurity from the start. But modern developments and complications, especially in the cloud, are beginning to erode our ability to truly...

View Article

6 things hackers know that they don’t want security pros to know that they know

Security professionals have good insights into the technical tactics, techniques, and procedures (TTPs) that threat actors use to launch cyberattacks. They are likewise well-versed in key defensive...

View Article

12 hottest IT security certs for higher pay today

Security professionals understand that certifications matter. Apart from a technical exam, there is no quicker way to gauge a person’s ability than to examine their certifications. Despite this fact,...

View Article
Browsing all 1623 articles
Browse latest View live