Skip to content
Federal agencies face new zero-threat cybersecurity requirements.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 13 September 2021, 1252 UTC.
Content supplied by CSOonline.com.
Please scroll down to read your selections.
The Azure vulnerability, which affects only those using the Jupyter Notebook feature, gives attackers access to data in databases.
This newly discovered ransomware works fast, has multiple ways to avoid detection, and preys on Windows systems with known vulnerabilities.
The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.
Technology, financial, and education leaders commit to a wide range of initiatives to enhance the nation’s cybersecurity posture in collaboration with the Biden Administration.
Keep up with news of CSO, CISO, and other senior security executive appointments.
As devops matures into devsecops, cultural obstacles continue to exert drag.
This new, aggressive ransomware group also uses Cobalt Strike to move laterally across the network.
New research identifies four emerging ransomware groups currently affecting organizations and that show signs of becoming bigger threats in the future.
Research warns consumer-grade services can undermine risk assessment of corporate networks amid remote working as Houdini malware spoofs devices to exfiltrate data.
It’s not the IoT vendors’ fault. Lack of a cryptographically secure pseudo-random number generator subsystem for the internet of things devices will be vulnerable.
IIS malware presents diverse, persistent, and growing threats from old and new threat actors.
Experts argue that Apple is clearing a path for governments to gain access to their citizens’ data–essentially an encryption backdoor.
The new initiative aims to provide organizations with unprecedented levels of information and context with an initial focus on ransomware and incident response for cloud providers.
The guidance seeks to educate IT administrators about cloud security risks and best practices for implementing and maintaining Kubernetes.
Critical vulnerabilities potentially affect millions of devices, but finding and patching them will be difficult.
Multiple vulnerabilities could allow persistent take-over and ransom demands by attackers.
The White House initiatives and expected passage of the US infrastructure plan will set new cybersecurity standards for critical infrastructure, provide money to state and local governments.
Praying Mantis group is likely a nation-state actor that uses custom malware and is adept at avoiding detection.
For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.