Ursnif Trojan is back with fileless persistence Multi-vector attacks target cloud-hosted technologies CSO Update January 27, 2019 Ursnif Trojan is back with fileless persistence Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros. Read more ▶ Your Must-Read Stories • Multi-vector attacks target cloud-hosted technologies • 15 secure coding practices to use in digital identity • Center for Internet Security releases Microsoft 365 benchmarks • How to land a digital forensics job • 4 tips to mitigate Slack security risks • Back to basics: Malware explained White Paper: Osterman Research Why You Need Third Party Solutions for Office 365 his white papers discusses some of the gaps in Office 365 and why third-party solutions to supplement or replace some of the native capabilities in Office 365 is a good idea. Read more ▶ Multi-vector attacks target cloud-hosted technologies Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure. Read more ▶ FROM OUR BUSINESS PARTNERS Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶ 15 secure coding practices to use in digital identity Secure coding of any application or service is important, but it is vital in systems that process personal data. Read more ▶ Center for Internet Security releases Microsoft 365 benchmarks Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization. Read more ▶ How to land a digital forensics job Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path. Read more ▶ 4 tips to mitigate Slack security risks A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more ▶ Back to basics: Malware explained Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it. Read more ▶ White Paper: Osterman Research Addressing the Top 10 Security Issues Organizations Face This white paper focuses on the Top 10 security threats facing organizations and what can be done to address them. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.