Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
Managing the emotional toll cybersecurity incidents can take on your team – Source: www.csoonline.com
Source: www.csoonline.com - Author: Addressing the psychic pain suffered by cybersecurity team members during major incidents...
CSO - Online
Security-Infotainment: Die besten Hacker-Dokus – Source: www.csoonline.com
Source: www.csoonline.com - Author: Wenn Sie auch in Ihrer Freizeit nicht von IT-Sicherheit und Cyberangriffen lassen...
CSO - Online
Fake captcha attacks are increasing, say experts – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISOs need to warn employees in regular awareness training to refuse to...
CSO - Online
CISOs wollen Cloud-Security vorantreiben – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine aktuelle Umfrage zeigt: Deutsche CISOs wollen 2025 umfassend in Cloud-Security investieren....
CSO - Online
Mac users duped with FrigidStealer posing as browser updates – Source: www.csoonline.com
Source: www.csoonline.com - Author: Threat actors are seen distributing the new macOS stealer in a web...
CSO - Online
Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es...
CSO - Online
Understanding OWASP’s Top 10 list of non-human identity critical risks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Non-human identities represent a vast chunk of credentials used by a typical...
CSO - Online
What is SIEM? Improving security posture through event log data – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security information and event management software collects information to help identify and...
CSO - Online
Der trügerische Komfort des Risikomanagements – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISOs müssen ihre Organisationen heutzutage vor einem riesigen Ansturm existenzieller Bedrohungen schützen....
CSO - Online
CISO success story: Predicting cyber risk (accurately) is easier with this guy’s formula – Source: www.csoonline.com
Source: www.csoonline.com - Author: Ash Hunt of Apex Group piloted a statistic-driven model for predicting various...
CSO - Online
Russian cyberespionage groups target Signal users with fake group invites – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis19 Feb 20258 minsAdvanced Persistent ThreatsCommunications SecurityMessaging Security Russian APTs send...
CSO - Online
How to prevent AI-based data incidents – Source: www.csoonline.com
Source: www.csoonline.com - Author: GenAI simplifies work – for companies as well as for attackers and...
CSO - Online
Hackers gain root access to Palo Alto firewalls through chained bugs – Source: www.csoonline.com
Source: www.csoonline.com - Author: A recently disclosed medium-severity bug was chained with critical, older bugs to...
CSO - Online
Mehrheit der Deutschen fürchtet sich vor Cyberangriffen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Hacker-Attacken aus dem Ausland, zerstörte Strom- und Datenkabel in der Ostsee, Angriffe...
CSO - Online
Think being CISO of a cybersecurity vendor is easy? Think again – Source: www.csoonline.com
Source: www.csoonline.com - Author: Making the shift from a security product developer to the same role...
CSO - Online
Customer Identity & Access Management: Die besten CIAM-Tools – Source: www.csoonline.com
Source: www.csoonline.com - Author: Customer Identity and Access Management liefert die Grundlage, um den Zugriff Dritter...
CSO - Online
OpenSSH fixes flaws that enable man-in-the-middle, DoS attacks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Researchers from Qualys found two vulnerabilities that can be combined to bypass...
CSO - Online
Ransomware-Banden geben Opfern immer weniger Zeit – Source: www.csoonline.com
Source: www.csoonline.com - Author: Ransomware-Banden agieren viel schneller als früher. Dadurch bleibt Unternehmen weniger Zeit, Ransomware-Attacken...
CSO - Online
Russian malware discovered with Telegram hacks for C2 operations – Source: www.csoonline.com
Source: www.csoonline.com - Author: Stealthy C2 messages operated by the Golang backdoor could easily be mistaken...
CSO - Online
XCSSET macOS malware reappears with new attack strategies, Microsoft sounds alarm – Source: www.csoonline.com
Source: www.csoonline.com - Author: The updated malware, which spreads via infected Xcode projects, introduces advanced evasion...
CSO - Online
How CISOs can rebuild trust after a security incident – Source: www.csoonline.com
Source: www.csoonline.com - Author: Cybersecurity leaders share insight on a crucial but overlooked task after any...
CSO - Online
Password managers under increasing threat as infostealers triple and adapt – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis18 Feb 20257 minsAuthenticationMalwarePassword Managers Security experts warn of surge in...
CSO - Online
New family of data-stealing malware leverages Microsoft Outlook – Source: www.csoonline.com
Source: www.csoonline.com - Author: News17 Feb 20255 minsAPIsData and Information SecurityMalware Elastic Security says an attack...
CSO - Online
Nico Lange: „Cybersicherheit ist eine Frage der Verteidigung“ – Source: www.csoonline.com
Source: www.csoonline.com - Author: Nico Lange zählt zu den wichtigsten Stimmen in der Sicherheitspolitik der Europäischen...
CSO - Online
Websites der Bayerischen Staatsregierung angegriffen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Am Donnerstag waren die Internetseiten der Staatsregierung und des Digitalministeriums in Bayern...
CSO - Online
Ransomware gangs extort victims 17 hours after intrusion on average – Source: www.csoonline.com
Source: www.csoonline.com - Author: News17 Feb 20255 minsIncident ResponseRansomware The window for intrusion detection keeps getting...
CSO - Online
How to evaluate and mitigate risks to the global supply chain – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISOs are under the gun to understand and address potential risks tied...
CSO - Online
4 Wege aus der Security-Akronymhölle – Source: www.csoonline.com
Source: www.csoonline.com - Author: Abkürzungen können dazu beitragen, lange, technische Begriffe im Kopf zu behalten. Oder...
CSO - Online
Software Bill of Material umsetzen: Die besten SBOM-Tools – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine Software Bill of Material (SBOM) umzusetzen, muss kein Hexenwerk sein: Diese...
CSO - Online
CISO success story: How LA County trains (and retrains) workers to fight phishing – Source: www.csoonline.com
Source: www.csoonline.com - Author: The CISO for LA County, charged with safeguarding 38 departments and 100,000...
Posts navigation
1
2
…
26
Latest News
The Hacker News
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now – Source:thehackernews.com
20/02/2025
The Hacker News
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
securelist.com
Managed detection and response in 2024 – Source: securelist.com
20/02/2025
CSO - Online
Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen – Source: www.csoonline.com
20/02/2025