Showing posts with label CSO First Look: Top Cybersecurity News. Show all posts
Showing posts with label CSO First Look: Top Cybersecurity News. Show all posts

Wednesday, February 15, 2023

CSO First Look: Top Cybersecurity News

"Attacks on industrial infrastructure on the rise...."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 15 February 2023, 1521 UTC. Content provided by email subscription to "CSO First Look."

Source:   https://mail.google.com/mail/u/0/#inbox/FMfcgzGrcXscsBNkRVMtVshWhlbNTxGf (Top Cybersecurity News from "CSO Firsts Look").

Please click link or scroll down to read your selections.   Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

CSO

The day's top cybersecurity news and in-depth coverage

CSO FIRST LOOK

15 FEBRUARY, 2023

Attacks on industrial infrastructure on the rise, defenses struggle to keep up

A Dragos report shows threat actors new and old have the potential to cause major disruptions of critical infrastructure.

Image: Sponsored by Palo Alto Networks: The value of ‘code to cloud’ security

Sponsored by Palo Alto Networks: The value of ‘code to cloud’ security

Vulnerabilities like the Apache Log4j pose major problems to businesses, who may suffer revenue as well as reputational consequences. Find out how businesses can improve their resilience by ensuring cloud native apps have been rigorously tested before they are deployed to the live environment.

Expel announces MDR for Kubernetes with MITRE ATT&CK framework alignment

Expel MDR for Kubernetes addresses three core layers of Kubernetes applications: configuration, control panel, and run-time security.

Yes, CISOs should be concerned about the types of data spy balloons can intercept

The Chinese airship that floated over the US and Canada was likely a multipurpose intelligence platform, gathering a variety of information types. It could gather data from corporate, government, or agricultural sources on the ground.

UK/US cybercrime crackdown sees 7 ransomware criminals sanctioned

Seven cybercriminals linked to the Trickbot ransomware group have been sanctioned to travel bans, asset freezes, and are severely restricted in their use of the global financial system.

Measuring cybersecurity: The what, why, and how

CISOs need to report the key security performance and risk indicators to executive teams in way that they find meaningful and actionable.

CSO
FacebookTwitterLinkedIn
© 2023 CSO
IDG Communications Ltd.,
101 Euston Road,
London NW1 2RA,
United Kingdom


Thursday, January 5, 2023

CSO First Look: Top Cybersecurity News

"Cyberattacks against governments jumped 95% in last half of 2022."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 05 January 2023, 1402 UTC.  Content provided by email subscription to "CSO First Look."

Source:  https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGrbtzfQszVJwjZlXKjMVKvjDvW

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

CSO

The day's top cybersecurity news and in-depth coverage

CSO FIRST LOOK

05 JANUARY, 2023

Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says

India, the US, Indonesia, and China accounted for 40% of the total reported cyberattacks in the government sector.

Image: Sponsored by Palo Alto Networks: How to Combat a New Era of Threats

Sponsored by Palo Alto Networks: How to Combat a New Era of Threats

Find out how to create a best-in-class cybersecurity strategy which leverages automation and increases business resiliency.

LockBit apologizes for ransomware attack on hospital, offers decryptor

The LockBit ransomware-as-a-service operation said it is against its rules to attack medical institutions, but the ransomware gang's affiliates do not always adhere to this policy.

PyTorch suffers supply chain attack via dependency confusion

A rogue packet on the machine learning framework allowed the attacker to exfiltrate data, including SSH keys.

Why it might be time to consider using FIDO-based authentication devices

Access codes sent by SMS or authenticator apps can be bypassed by clever phishing. Hardware-based tokens make that harder to do.

CSO
FacebookTwitterLinkedIn
© 2023 CSO
IDG Communications Ltd.,
101 Euston Road,
London NW1 2RA,
United Kingdom

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...