Quantcast
Channel: Cyber agencies urge organizations to collaborate to stop fast flux DNS attacks | CSO Online
Browsing all 1594 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cloudflare-Vorfall führt zu massivem Verlust an Logs

Unzureichend getestete Systeme und falsch konfigurierte Schutzmechanismen haben zu einem massiven Datenverlust geführt. T. Schneider/shutterstock.com Am 14. November 2024 führte eine Fehlkonfiguration...

View Article


Security-FinOps collaboration can reap hidden cloud benefits: 11 tips

For enterprises operating on the cloud, security and cost management are rising concerns. Typically, these issues are addressed in silos, with cyber teams and FinOps teams pursuing their charters and...

View Article


Image may be NSFW.
Clik here to view.

Ransomware-Trend: Hacker mit Zerstörungsdrang

Hacker setzen bei Ransomware-Angriffen immer häufiger auf Zerstörung und nicht mehr “nur” auf Erpressung.Gearstd – Shutterstock.com Ransomware zählt nach wie vor zu den größten Cyberbedrohungen für...

View Article

Popular game script spoofed to infect thousands of game developers

A malware loader, now named GodLoader, has been observed to be using Godot, a free and open-source game engine, as its runtime to execute malicious codes and has dropped known malware on at least...

View Article

Image may be NSFW.
Clik here to view.

Was ist ein Keylogger?

Keylogger sind Malware der alten Schule. Lesen Sie, wie die Tools zur Tastaturüberwachung funktionieren und warum sie nicht nur etwas für Cyberkriminelle sind. IM_photo | shutterstock.com Auch wenn...

View Article


Working in critical infrastructure? Boost your effectiveness with these...

Hybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber/physical...

View Article

AWS launches tools to tackle evolving cloud security threats

The increasing sophistication and scale of cyber threats pose a growing challenge for enterprises managing complex cloud environments. Security teams often face overwhelming volumes of alerts,...

View Article

Image may be NSFW.
Clik here to view.

Phishing mit Word-Dokumenten und QR-Code

Cyberkriminelle nutzen defekte Word-Dateien, um Sicherheitssoftware zu umgehen und ihre Opfer zu täuschen. JLStock/shutterstock.com Phishing ist kein neues Problem, einzig die Art und Weise wie es...

View Article


Download the Cloud Optimization Enterprise Spotlight

Download the December 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

View Article


Download our endpoint detection and response (EDR) buyer’s guide

From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what endpoint detection and response (EDR) tools can do for their organizations and how to choose the right...

View Article

Hundreds of UK Ministry of Defence passwords found circulating on the dark web

The login credentials of nearly 600 employees accessing a key British Ministry of Defence (MOD) employee portal have been discovered circulating on the dark web in the last four years, it has been...

View Article

Image may be NSFW.
Clik here to view.

CIO POV: Building trust in cyberspace

Trust lies at the heart of every relationship, transaction, and encounter. Yet in cyberspace—where we work, live, learn, and play—trust can become elusive. Since the dawn of the internet nearly 50...

View Article

Image may be NSFW.
Clik here to view.

Intelligent Privilege Controls™: A quick guide to secure every identity

Security used to be simpler. Employees, servers, and applications were on site. IT admins were the only privileged identities you had to secure, and a strong security perimeter helped to keep all the...

View Article


Why identity security is your best companion for uncharted compliance challenges

In today’s rapidly evolving global regulatory landscape, new technologies, environments, and threats are heightening cybersecurity and data privacy concerns. In the last year, governing bodies have...

View Article

Image may be NSFW.
Clik here to view.

Der Weg zum nachhaltigen Cyberschutz

Wenn im Ernstfall Unternehmen stillstehen, sind die Sorgen groß. Mit Cyberresilienz tragen CISOs dazu bei, dass der Geschäftsbetrieb weitergehen kann. Kjetil Kolbjornsrud Die deutschen Ergebnisse der...

View Article


Want to be a cybersecurity pro? Use generative AI to get some simulated training

I often get approached by young, ambitious people looking to start a cybersecurity career. Some are studying cybersecurity in college, some are looking to jump from IT, and some believe that the field...

View Article

10 most critical LLM vulnerabilities

Enterprise adoption of generative AI technologies has exploded in 2024 due to the rapid evolution of the technology and the emergence of a variety of business use cases. According to Menlo Ventures,...

View Article


EU enacts new laws to strengthen cybersecurity defenses and coordination

The European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. The measures, part of the cybersecurity legislative package, include the Cyber Solidarity...

View Article

SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer

Threat actors are using a well-known modular malware loader, SmokeLoader, to exploit known Microsoft Office vulnerabilities and steal sensitive browser credentials. The loader which runs a framework...

View Article

Image may be NSFW.
Clik here to view.

Möglicher Cyberangriff: IT-Ausfall bei Medion

Zunächst hat Medion einen Cyberangriff als Ursache für den IT-Ausfall genannt. Mittlerweile spricht das Unternehmen “nur” noch von einer IT-Störung.OleksandrShnuryk – Shutterstock.com Der...

View Article
Browsing all 1594 articles
Browse latest View live