cybersecurity-news

5 top deception tools and how they ensnare attackers

Security-savvy organizations understand that it's best to assume that their systems are breached. It's one reason why zero-trust architectures get so ...

LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack

Research by Eli Salem, Lior Rochberger, & Niv Yona Introduction Cybereason’s Nocturnus and Active Hunting Service are two teams dedicated to easil...

Microsoft gives mitigation advice for Follina vulnerability exploitable via Office apps

Attackers are actively exploiting an unpatched remote code execution (RCE) vulnerability in a Windows component called the Microsoft Support Diagnosti...

When Your Smart ID Card Reader Comes With Malware – Krebs on Security

Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled...

2022 CSO Hall of Fame honorees

The CSO Hall of Fame was created to spotlight outstanding leaders who have significantly contributed to the practice of information risk management an...

US CSO50 2022 awards showcase world-class security strategies

The CSO50 awards recognize security projects that demonstrate outstanding thought leadership and business value. The awards are scored according to a...

AccessQuint Access360