Massive DDoS Attack Unleashed by ‘HTTP/2 Rapid Reset’ Bug: A groundbreaking zero-day attack called “HTTP/2 Rapid Reset” has exploited an Internet-wide security vulnerability, resulting in the largest-ever distributed …
CSC News
-
-
News & Resources
Lazarus Group Launders $900 Million in Cryptocurrency
by CSC Newsby CSC News 1 minutes readLazarus Group Launders $900 Million in Cryptocurrency: Cryptocurrency laundering, to the tune of billions, has been linked to the notorious North Korean Lazarus Group. Between July 2022 and …
-
News & Resources
Network Segmentation: A Critical Shield Against Cyber Threats
by CSC Newsby CSC News 2 minutes readNetwork Segmentation – A Critical Shield Against Cyber Threats: Effective network segmentation is the backbone of cybersecurity, creating vital security boundaries within a network. This news item explores …
-
News & Resources
Mitigating Risks Through Effective Patch Management
by CSC Newsby CSC News 1 minutes readMitigating Risks Through Effective Patch Management: Effective patch management is a cornerstone of robust cybersecurity. This news item highlights the critical importance of proper patch management practices in …
-
News & Resources
Enhancing Network Security: The Impact of Insufficient Internal Network Monitoring
by CSC Newsby CSC News 2 minutes readEnhancing Network Security – The Impact of Insufficient Internal Network Monitoring: Effective network monitoring is a cornerstone of cybersecurity. Inadequate monitoring configurations can lead to undetected threats, potentially …
-
News & Resources
Security Risks of Improper User Administrator Privilege Separation
by CSC Newsby CSC News 2 minutes readSecurity Risks of Improper User Administrator Privilege Separation: The separation of user and administrator privileges is a critical aspect of network security. Inadequate separation can expose organizations to …
-
News & Resources
GitHub Expands Secret Scanning to AWS, Microsoft, Google, and Slack
by CSC Newsby CSC News 1 minutes readGitHub Expands Secret Scanning to AWS, Microsoft, Google, and Slack: GitHub, a Microsoft subsidiary, has unveiled an enhancement to its secret scanning feature. This update broadens the coverage …
-
News & ResourcesBest Practices & How-to Guides
NSA-CISA Top 10 Cybersecurity Misconfigurations for Organizations
by CSC Newsby CSC News 1 minutes readNSA-CISA Top 10 Cybersecurity Misconfigurations for Organizations: The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have joined forces to issue a crucial cybersecurity …
-
News & Resources
Critical Security Vulnerabilities Discovered in Supermicro BMC Firmware
by CSC Newsby CSC News 1 minutes readCritical Security Vulnerabilities Discovered in Supermicro BMC Firmware: Several critical security vulnerabilities have been uncovered in Supermicro’s baseboard management controllers (BMCs) firmware. These vulnerabilities in the Intelligent Platform …
-
News & Resources
Over 100,000 Critical Infrastructure Devices Vulnerable to Cyberattacks
by CSC Newsby CSC News 1 minutes readOver 100,000 Critical Infrastructure Devices Vulnerable to Cyberattacks: More than 100,000 industrial control systems (ICS) are accessible via the internet globally, overseeing crucial operational technologies (OT) like power …