Cybercrime | News, how-tos, features, reviews, and videos
Artificial intelligence is altering not only the threat landscape but also how security teams can defend their organizations. But AI isn’t the only trend cybersecurity pros should be on top of.
Escalating cyberthreats, hacktivism, and cyber espionage suggest the Paris Games may present the greatest cybersecurity risk ever. Here’s what to look out for and how to prep.
Attackers make a living evading your EDR/XDR systems. Here’s how they get around or go undetected by your defenses at three key points along the way.
From the Retamares military base in Madrid, CSO Spain receives an inside look at the Spanish team’s headquarters for Locked Shields 2024, a worldwide event for practicing coordination and cooperation in defense of cyberspace.
Criminal attackers view your employees as potential accomplices to transform into insider threats. Here’s who they target, how they recruit them, and what they want malicious insiders to do to help compromise IT systems.
A logic bomb is malicious code that waits for the right time or opportunity to strike. Some infamous examples show the potential for damage.
Presidents, CEOs, and other C-suite-level leaders are attractive targets for cybercriminals. Digital executive protection is like a bodyguard service to protect them from bad actors.
Swatting is a form of criminal harassment in which attackers “prank call” law enforcement to trick police into surrounding unsuspecting homes — and the resulting confrontations can go very badly.
Disruptive events can affect an organization in multiple ways, but with the right strategy and practice CISOs can minimize downtime and accelerate the recovery process.
AI-powered deepfake technology is rapidly advancing, and it’s only a matter of time before cybercriminals find a business model they can use, some security experts say.