Latest from todaynewsCrowdStrike CEO apologizes for crashing IT systems around the world, details fixAttempts to mitigate a novel Windows threat caused systems running CrowdStrike’s Falcon sensor to crash.By Peter Sayer20 Jul 20244 minsSecurity news Federal judge greenlights securities fraud charges against SolarWinds and its CISOBy Evan Schuman19 Jul 20246 minsCSO and CISOLegalVulnerabilitiesnews Solarwinds patches critical RCE flaws in Access Rights ManagerBy Mikael Markander19 Jul 20241 minAccess ControlVulnerabilities newsBlue screen of death strikes crowd of CrowdStrike serversBy Peter Sayer 19 Jul 20244 minsBugsSecurity featureInside the world’s largest ‘live-fire’ cyber-defense exerciseBy Mario Moreno 19 Jul 20247 minsCyberattacksIT Training Critical Infrastructure featureHashcat explained: How this password cracker worksBy J.M. Porup 19 Jul 20247 minsPasswordsNetwork SecuritySecurity newsCisco patches severe password reset flaw that lets hackers hijack SSM On-Prem license serversBy John E. Dunn 18 Jul 20244 minsVulnerabilitiesSecurity newsSAP security holes raise questions about the rush to AIBy Evan Schuman 18 Jul 20245 minsCloud Security newsAttempted Trump assassination exploited in new crypto doubling scamsBy Shweta Sharma 18 Jul 20243 minsPhishing CSO Executive Sessions videoCSO Executive Sessions: Data protection in MalaysiaToh Shang Yee – Head of Information Security at MCIS Life – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about data governance and regulations in Malaysia, strategies to ensure resilience, and more. 02 Jul 2024 15 minsCSO and CISO CSO Executive Sessions: The new realities of the CISO role – whistleblowing and legal liabilities 28 May 2024 17 minsCSO and CISO CSO Executive Sessions: The personality of cybersecurity leaders 29 Apr 2024 19 minsCSO and CISO CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 2024 16 minsCSO and CISO See all videos More security newsnewsAttackers abuse URL protection services to hide phishing links in emailsReputation filters used to prevent access to phishing sites were misused to allow access to the very sites they are meant to prevent access to.By Lucian Constantin 18 Jul 2024 4 minsEmail SecurityPhishingnewsBaffle to offer tenant-level data encryption to AWS usersBaffle has integrated homegrown key management capability with AWS server-side encryption, allowing SaaS applications to isolate and encrypt data at the customer level.By Shweta Sharma 17 Jul 2024 3 minsEncryptionCloud Securitynews analysisAPT exploits Windows zero-day to launch zombie IE attackLast week’s patched Microsoft file spoofing flaw has been exploited in the wild by APT group Void Banshee by resurrecting Internet Explorer without the user’s knowledge.By Lucian Constantin 17 Jul 2024 5 minsAdvanced Persistent ThreatsWindows SecurityZero-day vulnerabilitynewsKaspersky Lab shuts down US operations in wake of national security banThe announcement comes as CISOs deal with a 29 September deadline to stop using the company’s antivirus software, which the US Department of Commerce recently deemed a national security risk.By Viktor Eriksson 16 Jul 2024 3 minsAnti MalwareTechnology IndustrynewsDisney suffers massive internal communications data leak after cyberattackThe incident highlights the need for stronger security in workplace collaboration tools.By Prasanth Aby Thomas 16 Jul 2024 3 minsData BreachnewsHacker was allegedly paid $370,000 ransom to delete stolen AT&T dataThe hacker claims it sent a video as proof of deletion and received the ransom in bitcoins.By Shweta Sharma 15 Jul 2024 4 minsData BreachnewsGoogle eyes security startup Wiz for $23B in its largest-ever acquisitionThe deal could face a lot of regulatory hurdles, according to analysts.By Gyana Swain 15 Jul 2024 5 minsTechnology IndustryCloud Securitynews AT&T confirms arrest in data breach of more than 110 million customersThis is apparently the first cybersecurity incident where the Justice Department initially allowed an enterprise to not discloseBy Evan Schuman 12 Jul 2024 6 minsData BreachCyberattacksPrivacynewsMobile surveillance software firm mSpy suffers data breachAttackers scoop 318GB of data from 10 years of customer support tickets.By John Leyden 12 Jul 2024 4 minsData BreachPrivacynewsKnown SSH-Snake bites more victims with multiple OSS exploitationThe threat actor uses a multitude of open-source software tools to find and exploit vulnerabilities within victim systems.By Shweta Sharma 12 Jul 2024 3 minsMalwareOpen SourcenewsCisco Talos analyzes attack chains, network ransomware tacticsRansomware actors often prioritize gaining initial access to targeted networks, says Cisco’s Talos security intelligence group.By Michael Cooney 11 Jul 2024 1 minRansomwareNetwork Securitynews analysisRansomware attackers exploit year-old backup vulnerabilityA post-mortem of a recent ransomware attack illustrates the continued importance of basic security controls such as patching in withstanding an evolving cybercrime threat.By John Leyden 11 Jul 2024 4 minsRansomwareCyberattacks Show more Show less Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Popular topicsCybercrime featureHow cybercriminals recruit insiders for malicious actsBy Dov Lerner 16 Jul 2024 17 minsCybercrime featureLogic bombs explained: Definition, examples, preventionBy Josh Fruhlinger 05 Jul 2024 12 minsMalwareCybercrimeSecurity brandpostSponsored by CyberArkWhy identity security Is essential to cybersecurity strategyBy Claudio Neiva, CyberArk’s Field Technology Director (LATAM), PAM and Identity Security 24 Jun 2024 6 minsCybercrime View topic Careers featureWhat savvy hiring execs look for in a CISO todayBy Evan Schuman 16 Jul 2024 10 minsCSO and CISOCareersIT Leadership featureMore than a CISO: the rise of the dual-titled IT leaderBy Rosalyn Page 10 Jul 2024 8 minsCSO and CISOCareersIT Leadership featureCRISC certification: Exam, requirements, training, potential salaryBy Josh Fruhlinger 09 Jul 2024 8 minsCertificationsIT SkillsIT Training View topic IT Leadership featureIf you’re a CISO without D&O insurance, you may need to fight for itBy Linda Rosencrance 08 Jul 2024 7 minsCSO and CISOInsurance IndustryIT Leadership how-toTabletop exercise scenarios: 10 tips, 6 examplesBy Josh Fruhlinger and Sarah D. Scalet 04 Jul 2024 16 minsRansomwarePhishingDisaster Recovery featureWhat is digital executive protection and how does it work?By Deb Radcliff 26 Jun 2024 8 minsCSO and CISOCyberattacksEmployee Protection View topic Upcoming Events14/Nov awardsCSO30 Awards ASEAN14 Nov 2024Singapore CSO and CISO View all events In depth featureWho owns your data? SaaS contract security, privacy red flagsCompanies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.By Andrada Fiscutean27 Mar 202410 mins Data and Information Security Show me moreLatestArticlesPodcastsVideos opinion Beware the tools that can bring risk to a Windows network By Susan Bradley 18 Jul 20248 mins Network AdministratorWindows SecurityCloud Security brandpost Sponsored by Trinity Cyber Introducing Full Content Inspection: The New Standard in Network Security, and Why it’s Necessary By Trinity Cyber 17 Jul 20244 mins Network Security opinion Sometimes the cybersecurity tech industry is its own worst enemy By Jon Oltsik 17 Jul 20246 mins Threat and Vulnerability ManagementSecurity PracticesSecurity Software podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia 02 Jul 202415 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO