Sunday, July 22, 2018

Samsam infected thousands of LabCorp systems via brute force RDP

Review: Predictively locking down security with Balbix

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jul 22, 2018
Featured Image

Samsam infected thousands of LabCorp systems via brute force RDP

LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and didn't result in a data breach. However, in the brief time between detection and mitigation, the ransomware was able to encrypt thousands of systems and several hundred production servers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Review: Predictively locking down security with Balbix
Zero-day exploits are powerful but fragile weapons
How risk-based authentication has become an essential security tool
The global cyber war is heating up: Why businesses should be worried
CSO Spotlight: Tracy Reinhold, Everbridge

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

Thumbnail Image
INSIDER

Review: Predictively locking down security with Balbix

Balbix may technically be a vulnerability manager, but it does it so much better and also so much more that it breaks the bounds of its category. Read More

Thumbnail Image

Zero-day exploits are powerful but fragile weapons

Zero-days are sexy and exciting but, let's face it, not as big a deal as they used to be. Read More

Thumbnail Image
INSIDER

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them. Read More

Thumbnail Image
INSIDER

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them. Read More

Thumbnail Image
INSIDER

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity. Read More

White Paper: PTC

Remote Monitoring Provides Real-Time Information for Improved Servicing

In the "Quick Start Guide: Monitoring Equipment with IoT" eBook, Tech-Clarity, an independent manufacturing technology research firm, shows how manufacturers can use remote monitoring to quickly identify failures and efficiently repair equipment. Tech-Clarity provides actionable steps that manufacturers can take to connect remote equipment, gather the right data and put that data to use. Read More

Editor's Picks

1. 11 tips for prioritizing security spending
2. Are bad analogies killing your security training program?
3. Security platform or best of breed? There's only one answer
4. How to perform a risk assessment: Rethinking the process
5. The 5 best malware metrics you can generate
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive