Quantcast
Channel: Cyber agencies urge organizations to collaborate to stop fast flux DNS attacks | CSO Online
Browsing all 1594 articles
Browse latest View live

Global Swift banking network readies AI platform to combat cyber threats

The global Swift (Society for Worldwide Interbank Financial Telecommunication) messaging platform, fundamental to the movement of money around the globe by institutions, is about to deploy its first...

View Article


Image may be NSFW.
Clik here to view.

Risiko-Management für KMU: Die 8 wichtigsten Schritte zur Abwehr von Ransomware

Verbessern Sie Ihre Selbstverteidigung, um große Schäden durch Ransomware zu vermeiden. Foto: Nomad_Soul – shutterstock.comRansomware betrifft Unternehmen auf der ganzen Welt. Doch gerade kleine und...

View Article


Image may be NSFW.
Clik here to view.

Fast alle Cyberangriffe auf GenAI führen zum Erfolg

LLMs wie Chatbots werden immer häufiger genutzt, aber selten ausreichend vor Cyberattacken geschützt.Shutterstock – GrandeDuc Pillar Security, ein israelisches Unternehmen für...

View Article

NIS2’s cybersecurity value spreads beyond its expanded scope

The European Union’s NIS2 (Network and Information Security) Directive has come into force to update the first 2016 NIS regulation to better address an increasingly damaging cyber threat landscape....

View Article

EU’s NIS2 Directive for cybersecurity resilience enters full enforcement

After years in development the European Union’s NIS2 Directive comes into full effect this week. NIS2 expands the scope of its predecessor to cover 15 sectors, including manufacturing, digital...

View Article


Image may be NSFW.
Clik here to view.

Cyberangriff auf Johannesstift Diakonie

Aufgrund einer Cyberattacke auf die Johannesstift Diakonie kämpfen mehrere Krankhäuser in Berlin mit technischen Problemen.yod370 – Shutterstock.com Die Johannesstift Diakonie ist das größte...

View Article

Microsoft fails to collect critical security logs, exposing customers to risks

Microsoft has admitted that it failed to collect crucial security logs for nearly a month due to a bug, leaving enterprise customers vulnerable to cyberattacks. The issue, which occurred between...

View Article

The Google Meet error you last saw could be someone trying to hack your system

Windows and Mac users are being targeted by a new social engineering campaign, ClickFix, that uses fake Google Meet landings for planting info-stealing malware onto victim systems. According to a...

View Article


Image may be NSFW.
Clik here to view.

3 key considerations when evaluating GenAI solutions for cybersecurity

At the start of this year, I shared my view that 2024 would be when security practitioners bridge the cyber divide – the use of artificial intelligence (AI) for cybersecurity will be on the rise and...

View Article


Image may be NSFW.
Clik here to view.

Schutz vor Business E-Mail Compromise: 8 wichtige Punkte für Ihre BEC-Richtlinie

Lesen Sie, welche Punkte in einer Richtlinie zum Schutz vor Business E-Mail Compromise (BEC) enthalten sein sollten. Foto: MMD Creative – shutterstock.comLaut Verizon machten BEC-Angriffe (Business...

View Article

Meet Latrodectus: Initial access brokers’ new favorite malware loader

This year law enforcement agencies have disrupted some of the biggest botnets that were used as payload distribution platforms by ransomware gangs. But when big players disappear from the...

View Article

What makes a great CISO

The CISO’s role has evolved from managing technical controls to also supporting the business strategy. Becoming a great CISO requires more than technical expertise. To be highly effective, CISOs must...

View Article

Russian group’s hack of Texas water system underscores critical OT cyber threats

Cybersecurity threats to water utilities have accelerated in 2024 as Iranian, Chinese, and Russian threat actors increasingly target these critical systems. A spate of apparent joy-riding intrusions...

View Article


Spectre flaw still haunts Intel and AMD chips, putting security at risk

Researchers from ETH Zurich have discovered new vulnerabilities in Intel and AMD processors, six years after the Spectre security flaws were first identified. The new Spectre variant, named...

View Article

Image may be NSFW.
Clik here to view.

Cisco bestätigt Datenklau

Hacker haben Daten von Cisco gestohlen.JRdes – Shutterstock.com In der vergangenen Woche sorgte ein Darknet-Post mit angeblich gestohlenen Cisco-Daten für Aufregung. Hacker behaupteten unter anderem...

View Article


Internet Archive breached twice within days

Internet Archive continues to be in trouble as, according to unnamed claims made on Sunday, it suffered a secondary breach days after falling prey to a security incident that exposed 31 million unique...

View Article

Image may be NSFW.
Clik here to view.

Microsoft geht jetzt unter die Phish-Fänger

Microsoft geht zwar nicht unter die Imker, jagt aber Kriminelle mit süßen Daten. Shuttertstock – inspiring.team Die Anzahl, Arten und Qualität von Cyberangriffen nehmen beständig zu – soweit ein alter...

View Article


Singapore unveils AI system guidelines, emphasizing secure-by-design

Singapore has rolled out new cybersecurity measures to safeguard AI systems against traditional threats like supply chain attacks and emerging risks such as adversarial machine learning, including...

View Article

Low turnover leaves job-seeking CISOs with nowhere to go

CISO job turnover is continuing to drop, placing security leaders looking to gain a salary increase or leave an unfulfilling role in a difficult position. Turnover in top security roles decreased from...

View Article

7 risk management mistakes CISOs still make

CISOs know risk management is essential for building and maintaining a resilient enterprise security posture. Yet despite their best efforts and good intentions, many security leaders continue to fall...

View Article
Browsing all 1594 articles
Browse latest View live