article thumbnail

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

CSO Magazine

. | Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here

CSO 120
article thumbnail

8 IT security disasters: Lessons from cautionary examples

CSO Magazine

Sign up for CSO newsletters. ]. 2012: Court Ventures gets social-engineered. Hopefully you'll come away with some ideas on how not to suffer a disaster of your own. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The password hall of shame (and 10 tips for better password security)

CSO Magazine

The six-digit sequence has also ranked high on other lists over the years; SplashData, which has come up with lists using similar methodology, found "123456" in second place in 2011 and 2012; it then jumped up to number one where it stayed every year right through 2019. To read this article in full, please click here

Passwords 145
article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

Chinese hackers launch Linux variant of PingPull malware

CSO Magazine

Alloy Taurus, a Chinese APT , has been active since 2012. Chinese state-sponsored threat actor Alloy Taurus has introduced a new variant of PingPull malware , designed to target Linux systems, Palo Alto Networks said in its research. Along with the new variant, another backdoor called Sword2033 was also identified by the researchers.

Malware 105
article thumbnail

North Korean APT group targets email credentials in social engineering campaign

CSO Magazine

Operating since at least 2012, the group often employs targeted phishing and social engineering tactics to gather intelligence and access sensitive information." To read this article in full, please click here

article thumbnail

How to Speak Information Security to Executives: A CSO Perspective

NopSec

Back in 2012, General Keith Alexander(Ret.) The post How to Speak Information Security to Executives: A CSO Perspective appeared first on NopSec. has referred to cybersecurity breaches resulting in the loss of intellectual property as, “representing the greatest transfer of wealth in human history.”