article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. To read this article in full, please click here

CSO 128
article thumbnail

The Microsoft Exchange Server hack: A timeline

CSO Magazine

Related reading: 9 tips to detect and prevent web shell attacks on Windows networks | Sign up for CSO newsletters. ]. On the same day, Microsoft announced they suspected the attacks were carried out by a previously unidentified Chinese hacking group they dubbed Hafnium. To read this article in full, please click here

Hacking 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI cleans web shells from hacked Exchange servers in rare active defense move

CSO Magazine

In a move that has been described as unprecedented, the FBI obtained a court order that allowed it to remove a backdoor program from hundreds of private Microsoft Exchange servers that were hacked through zero-day vulnerabilities earlier this year. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].

Hacking 132
article thumbnail

What happened to the Lapsus$ hackers?

CSO Magazine

[Editor's note: This article originally appeared on the CSO Germany website on July 29.] Claire Tills, senior research engineer at Tenable, describes the methods of the hacking group Lapsus$ as bold, illogical and poorly thought out. To read this article in full, please click here

CSO 106
article thumbnail

Chinese cyberespionage group hacks US organizations with Exchange zero-day flaws

CSO Magazine

Sign up for CSO newsletters. ]. To read this article in full, please click here The flaws allow the extraction of mailbox contents and the installation of backdoors on vulnerable servers. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.

CSO 117
article thumbnail

Uber CISO's trial underscores the importance of truth, transparency, and trust

CSO Magazine

Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.

CISO 107
article thumbnail

Social engineering: Definition, examples, and techniques

CSO Magazine

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Get the latest from CSO by signing up for our newsletters. ] Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here