Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
Chrome extension privacy promises undone by hardcoded secrets, leaky HTTP – Source: www.csoonline.com
Source: www.csoonline.com - Author: Chrome extensions were spotted leaking sensitive browser data like API keys, secrets,...
CSO - Online
Unmasking the silent saboteur you didn’t know was running the show – Source: www.csoonline.com
Source: www.csoonline.com - Author: If your system clocks are off, your entire cybersecurity stack is compromised....
CSO - Online
CISOs reposition their roles for business leadership – Source: www.csoonline.com
Source: www.csoonline.com - Author: As business risk takes center stage, CISOs are embracing elevated roles, transforming...
CSO - Online
Cloud assets have 115 vulnerabilities on average — some several years old – Source: www.csoonline.com
Source: www.csoonline.com - Author: The state of cloud security has reached a critical tipping point, as...
CSO - Online
Microsoft startet neues europäisches Sicherheitsprogramm – Source: www.csoonline.com
Source: www.csoonline.com - Author: Vor dem Hintergrund der zunehmenden Bedrohungslage im Cyberraum hat Microsoft eine neue...
CSO - Online
New phishing campaign hijacks clipboard via fake CAPTCHA for malware delivery – Source: www.csoonline.com
Source: www.csoonline.com - Author: A single click and Ctrl+V combo now compromises endpoints with zero file...
CSO - Online
Colossal breach exposes 4B Chinese user records in surveillance-grade database – Source: www.csoonline.com
Source: www.csoonline.com - Author: A meticulously curated dataset included WeChat IDs, bank details, Alipay data, home...
CSO - Online
Don’t give hacktivists what they really want – Source: www.csoonline.com
Source: www.csoonline.com - Author: Overload attacks such as DDoSes hurt society for the moment, but keeping...
CSO - Online
CISOs urged to push vendors for roadmaps on post-quantum cryptography readiness – Source: www.csoonline.com
Source: www.csoonline.com - Author: News AnalysisJun 6, 20254 minsData and Information SecurityEncryption The looming ‘Q-Day’ should...
CSO - Online
Cybersecurity in der Lieferkette: Wie Sie Ihre Software-Supply-Chain schützen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Software-Lieferketten stehen unter Druck: Eine Schwachstelle entlang der Lieferkette kann zu einer...
CSO - Online
CISA asks CISOs: Does that asset really have to be on the internet? – Source: www.csoonline.com
Source: www.csoonline.com - Author: NewsJun 5, 20255 minsData and Information SecuritySecurityThreat and Vulnerability Management Too many...
CSO - Online
Top US cyber officials face divergent paths after Senate confirmation – Source: www.csoonline.com
Source: www.csoonline.com - Author: News AnalysisJun 5, 20257 minsGovernmentGovernment ITSecurity Practices Following their Senate confirmations, Sean...
CSO - Online
CISOs beware: genAI use is outpacing security controls – Source: www.csoonline.com
Source: www.csoonline.com - Author: Report shows that every organization uses an average of 6.6 high risk...
CSO - Online
Hacker erbeuten Salesforce-Daten mit Vishing – Source: www.csoonline.com
Source: www.csoonline.com - Author: Mithilfe von gefälschten IT-Support-Anrufen brachte die Gruppe UNC6040 Mitarbeitende dazu der, ein...
CSO - Online
Outdoor-Shop Unterwegs von Cyberattacke betroffen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Der Outdoor-Spezialist Unterwegs warnt seine Kunden aktuell vor einem Datenleck. Der Händler...
CSO - Online
Microsoft launches European Security Program to counter nation-state threats – Source: www.csoonline.com
Source: www.csoonline.com - Author: The tech giant is offering free AI-powered cybersecurity resources to 27 EU...
CSO - Online
Supply chain attack hits RubyGems to steal Telegram API data – Source: www.csoonline.com
Source: www.csoonline.com - Author: Threat actor exploits Fastlane plugin trust to redirect Telegram traffic via C2...
CSO - Online
Data hoarding can have financial and security consequences – Source: www.computerworld.com
Source: www.computerworld.com - Author: Poor end-of-life data management is hurting enterprise IT budgets and security posture....
CSO - Online
Hackerangriff auf deutschen Pappspezialist Wellteam – Source: www.csoonline.com
Source: www.csoonline.com - Author: 126822068 Olivier Le Moal – shutterstock.com Laut einem Bericht der Regionalzeitung Westfalen-Blatt...
CSO - Online
Get out of the audit committee: Why CISOs need dedicated board time – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISOs increasingly need dedicated time with the board, but lack of board...
CSO - Online
Cyber Resilience in Zeiten geopolitischer Unsicherheit – Source: www.csoonline.com
Source: www.csoonline.com - Author: Geopolitische Spannungen führen zu einer erhöhten Cyberbedrohungslage. Vor diesem Hintergrund ist der...
CSO - Online
Hackers use Vishing to breach Salesforce customers and swipe data – Source: www.csoonline.com
Source: www.csoonline.com - Author: Employees are tricked into granting enterprise access to a modified Salesforce tool...
CSO - Online
Vendor email compromise: The silent $300M threat CISOs can’t ignore – Source: www.csoonline.com
Source: www.csoonline.com - Author: AI-crafted VEC scams are bypassing MFA, legacy filters, and employee awareness, demanding...
CSO - Online
Cybersecurity’s ‘rare earth’ skills: Scarce, high-value, and critical for future defense – Source: www.csoonline.com
Source: www.csoonline.com - Author: OpinionJun 4, 20256 minsHiringIT SkillsIT Training All cyber skills are vital, but...
CSO - Online
Dobrindt will aufrüsten gegen Cyberkriminelle – Source: www.csoonline.com
Source: www.csoonline.com - Author: Deutschland steh im Fokus von kriminellen Hackern. Ransomware zählt dabei nach wie...
CSO - Online
6 ways CISOs can leverage data and AI to better secure the enterprise – Source: www.csoonline.com
Source: www.csoonline.com - Author: Supercharging your data analysis strategy with machine learning, data science, and custom-trained...
CSO - Online
Google patches third zero-day flaw in Chrome this year – Source: www.csoonline.com
Source: www.csoonline.com - Author: NewsJun 3, 20253 minsBrowser SecurityZero-Day Vulnerabilities The vulnerability in the Chrome V8...
CSO - Online
One hacker, many names: Industry collaboration aims to fix cyber threat label chaos – Source: www.csoonline.com
Source: www.csoonline.com - Author: The effort likened to a ‘cyber Rosetta Stone’ aims to reduce alert...
CSO - Online
Cisco Wireless LAN Controllers under threat again after critical exploit details go public – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security experts call vulnerability a 'textbook case' of dangerous coding practices; Cisco...
CSO - Online
The high cost of misconfigured DevOps tools: Global cryptojacking hits enterprises – Source: www.csoonline.com
Source: www.csoonline.com - Author: Attackers exploit exposed Nomad, Docker, and Gitea instances to deploy XMRig miners...
Posts pagination
1
…
16
17
18
…
60
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025