CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

November 11, 2020

4 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks. Read more ▶

Image: Sponsored by Darktrace: Threat find: Hacker poses as Microsoft Teams

Sponsored by Darktrace: Threat find: Hacker poses as Microsoft Teams

Email attackers are increasingly disguising as trusted collaboration tools like Teams and Zoom to deploy malware or steal credentials. One such attack was recently detected and stopped by AI, which revealed the true source of the email.

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

From pranks to APTs: How remote access Trojans became a major security threat

A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victim’s computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701