CSO Online: Cybersecurity News

"European Commission takes step toward approving EU-US data privacy pact."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents. Accessed on 14 December 2022, 1321 UTC. Content supplied by "CSO Online" via https://feedly.com.

Source: https://feedly.com/i/collection/content/user/f401222a-bca6-4c45-9cc1-183f239e8d86/category/418bf719-5c3d-400f-86b5-d19504f2fc07

Please click link or scroll down to read your selections. Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

CSO Online

11

MOST POPULAR

Do you want to track critical vulnerabilites and 0-days?

CVSS > 8 or exploit
New Royal ransomware group evades detection with partial encryption
A new ransomware group dubbed Royal that formed earlier this year has significantly ramped up its operations over the past few months and developed its own custom ransomware program that allows attackers to perform flexible and fast file encryption. "The Royal ransomware group emerged in early 2022 and has gained momentum since the middle of the year," researchers from security firm Cybereason sa
14 lessons CISOs learned in 2022
We're about to finish yet another erratic year, in which Elon Musk bought Twitter, Russia invaded Ukraine, and many workers returned to their offices. We also saw, for the first time, a security chief sentenced to prison for concealing a data breach. These events and many more have changed the business landscape and forced CISOs to steer a course through uncertain waters. "With the shifts in the

TODAY

How acceptable is your acceptable use policy?
In a world before smartphones, social media, and hybrid workplaces, an acceptable use policy was a lot easier to write—and to enforce. These days, it’s a lot more complicated. Work can take place almost anywhere, on any number of devices. An employee can accept a job and then never physically set foot in the office, working from home (or the Caribbean) on their personal laptop. That’s why an acce
Clear and present danger—report highlights serious cybersecurity issues with US defense contractors
When a company engages in business with a government, especially with the defense sector of that government, one should expect that security surrounding the engagement would be a serious endeavor. A recent report offered up by CyberSheath throws cold water on that assumption—indeed, DEFENSELESS - A statistical report on the state of cybersecurity maturity across the defense industrial base (DIB)

YESTERDAY

BrandPost: 3 Common DDoS Myths
There are several trends evident in the latest DDoS Threat Intelligence Report from NETSCOUT. These include adaptive distributed denial-of-service (DDoS), direct-path TCP-based DDoS, proliferation of botnets, sociopolitical fallout, and collateral damage. The thing these trends all have in common is they are designed to evade common DDoS defense measures and cause maximum harm to targets and othe
BrandPost: Securing Operational Technology Environments for Critical Infrastructure
Juniper Networks is applying its industry leading AI-driven capabilities and cloud-native architectures to Critical Infrastructure (CI) networks. We’re directly addressing the communications and cybersecurity challenges exposed by the convergence of IT and OT networks alongside the ever-increasing drumbeat of cyber threats from sophisticated, state-sponsored malicious actors. By enabling network
Palo Alto Networks flags top cyberthreats, offers new zero-day protections
Firewall and security software vendor Palo Alto Network’s annual Ignite conference kicked off Tuesday, highlighted by several product announcements, which were unveiled alongside the company’s latest threat report. Palo Alto’s “What’s Next in Cyber” report named ransomware and business email compromise as the most common attacks faced by businesses worldwide, with supply chain threats, malicious
BrandPost: Staying Cyber Safe This Holiday Season with Security Awareness Training
The holiday season is the most wonderful time of the year for cybercriminals. Threat adversaries inevitably have more opportunities to carry out targeted attacks as more people are online shopping and checking emails for coupons that could actually be phishing attacks. Well-staffed security teams using the right technologies can undoubtedly go a long way in protecting organizations against cyberc
PCI Secure Software Standard version 1.2 sets out new payment security requirements
The Payment Card Industry Security Standards Council (PCI SSC) has published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. One of two standards that make up the PCI Software Security Framework (SSF), the PCI Secure Software Standard sets out requirements to help ensure that payment software is designed, developed, and maintained in a manner that protect
Are robots too insecure for lethal use by law enforcement?
In late November, the San Francisco Board of Supervisors voted 8-3 to give the police the option to launch potentially lethal, remote-controlled robots in emergencies, creating an international outcry over law enforcement use of “killer robots.” The San Francisco Police Department (SFPD ) , which was behind the proposal, said they would deploy robots equipped with explosive charges “to contact, i

END OF FEED

Comments

Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.