Quantcast
Channel: Cyber agencies urge organizations to collaborate to stop fast flux DNS attacks | CSO Online
Browsing all 1594 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

EDR-Software – ein Kaufratgeber

EDR-Software verhindert Endpunkt-Sicherheitsdebakel. Die richtige Lösung vorausgesetzt.SvetaZi | shutterstock.com Software im Bereich Endpoint Detection and Response (EDR) erfreut sich weiterhin...

View Article


Top tips for CISOs running red teams

Red team is the de facto standard in offensive security testing when you want to know how all security investments — from technological controls to user training to response procedures — work together...

View Article


Image may be NSFW.
Clik here to view.

Zukunft schenken und die Hacker School unterstützen

Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres Arbeitens und unseres Lebens beeinflussen, gehören digitale Skills einfach dazu. Es geht um...

View Article

AWS customers face massive breach amid alleged ShinyHunters regroup

Terabytes of data belonging to thousands of AWS customers, including customer details, AWS credentials, and proprietary source code, were compromised in a large-scale cyber operation linked to the...

View Article

Image may be NSFW.
Clik here to view.

Termite-Bande bekennt sich zu Blue Yonder-Hack

Die Ransomware-Bande Termite ist offenbar für den Hackerangriff auf den SaaS-Anbieter Blue Yonder verantwortlich. DC Studio – Shutterstock.com Die Ransomware-Gruppe Termite hat jetzt die Verantwortung...

View Article


Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight

This week in London Black Hat Europe will feature a diverse range of talks and presentations covering the latest developments in cybersecurity. The opening keynote on Wednesday will be delivered by...

View Article

Black Hat: Latest news and insights

The infosecurity world decamps to London this week, with research on vulnerabilities in AI systems at the fore of the latest edition of Black Hat Europe. The four-day program runs from Dec. 9-12, with...

View Article

Romanian energy supplier Electrica hit by ransomware

First, the Romanian presidential election was annulled after being targeted with cyberattacks from foreign state-sponsored actors and a suspected Russian-controlled massive TikTok influence campaign....

View Article


Attackers exploit zero-day RCE flaw in Cleo managed file transfer

Security researchers have warned about in-the-wild attacks that exploit a remote code execution vulnerability in managed file transfer (MFT) solutions developed by enterprise software vendor Cleo...

View Article


US sanctions Chinese cybersecurity firm over global malware campaign

The US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one of its employees, Guan Tianfeng, for their alleged involvement in a 2020 global...

View Article

Image may be NSFW.
Clik here to view.

ISO und ISMS: Darum gehen Security-Zertifizierungen schief

Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, weshalb der Zertifizierungsprozess häufig...

View Article

Salt Typhoon poses a serious supply chain risk to most organizations

In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports of malicious activities targeting multiple US telecommunications companies. The agency determined...

View Article

Bug bounty programs can deliver significant benefits, but only if you’re ready

Bug bounty programs, which offer financial incentives to outside security researchers to find software vulnerabilities, seem like a 21st-century phenomenon, but according to bug bounty platform...

View Article


Image may be NSFW.
Clik here to view.

Rumänien kommt digital weiterhin nicht zur Ruhe

Nehmen die Russen Rache an Rumänien für die gescheiterte Wahl „ihres“ Kandidaten?structuresxx – shutterstock.com Zuerst wurde die rumänischen Präsidentschaftswahlen annulliert, nachdem sie durch eine...

View Article

Image may be NSFW.
Clik here to view.

Hersteller von Geräten für die Herzchirurgie angegriffen

Cyberkriminelle üben immer häufiger Druck auf den Gesundheitssektor aus – sei es durch den Diebstahl von Daten oder Angriffe auf Zulieferer. Germany only – metamorworks/shutterstock.com Der Schutz der...

View Article


Microsoft secretly stopped actors from snooping on your MFA codes

Microsoft may have silently fixed a problem with its MFA implementation that attackers could have used to gain access to Outlook, OneDrive, Teams, and Azure accounts without any user interaction....

View Article

Cardiac surgery device manufacturer falls prey to ransomware

The healthcare industry has been increasingly in the crosshairs of cyberattackers this year, with ransomware near the top of the sector’s biggest cyber threats. Hackers are attacking IT systems and...

View Article


The imperative for governments to leverage genAI in cyber defense

In an era where cyber threats are evolving at an unprecedented pace, the need for robust cyber defense mechanisms has never been more critical. Sixty-two percent of all cyberattacks focus on public...

View Article

Attackers can abuse the Windows UI Automation framework to steal data from apps

An accessibility feature built into Windows to facilitate the use of computers by people with disabilities can be abused by malware to steal data from other applications or control them in malicious...

View Article

AMD data center chips vulnerable to revealing data through ‘BadRAM’ attack

AMD’s Secure Encrypted Virtualization (SEV), meant to protect processor memory from prying eyes in virtual machine (VM) environments, can be tricked into giving access to its encrypted memory contents...

View Article
Browsing all 1594 articles
Browse latest View live