A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.| CSO Online
NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.| CSO Online
A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. The name evokes a scenario where an attacker has gotten the jump on a software vendor, implementing attacks that exploit the flaw before the good guys of infosec are able to respond.| CSO Online
Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.| CSO Online
Ransomware is a form of malware that encrypts or blocks access to a victim’s files, data, or systems until a ransom is paid. Here’s what you need to know to avoid being a victim and what to do if you fall prey to cyber criminals.| CSO Online
Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.| CSO Online