Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
BadSuccessor: Unpatched Microsoft Active Directory attack enables domain takeover – Source: www.csoonline.com
Source: www.csoonline.com - Author: Unprivileged users with permission to create objects inside an Active Directory organizational...
CSO - Online
Cyberangriff auf Arla Deutschland – Source: www.csoonline.com
Source: www.csoonline.com - Author: Der Molkereikonzern Arla wurde Ziel einer Cyberattacke. Dadurch war die Produktion an...
CSO - Online
Ransomware-Bande BlackBasta hat neuen Malware-Favoriten – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die modulare Malware Skitnet ist maßgeschneidert für Cybercrime, da sie über spezielle...
CSO - Online
Critical flaw in OpenPGP.js raises alarms for encrypted email services – Source: www.csoonline.com
Source: www.csoonline.com - Author: It could pose a serious risk to services like Proton Mail that...
CSO - Online
Trust becomes an attack vector in the new campaign using trojanized KeePass – Source: www.csoonline.com
Source: www.csoonline.com - Author: The attack’s success hinged on exploiting the assumed safety of open-source tools...
CSO - Online
GitHub package limit put law firm in security bind – Source: www.csoonline.com
Source: www.csoonline.com - Author: A cautionary tale of how a developer tool limit case could derail...
CSO - Online
Threat intelligence platform buyer’s guide: Top vendors, selection advice – Source: www.csoonline.com
Source: www.csoonline.com - Author: Threat intelligence platforms have evolved and became essential security defensive tools. Here...
CSO - Online
Poor DNS hygiene is leading to domain hijacking – Source: www.csoonline.com
Source: www.csoonline.com - Author: Infoblox says crooks are finding and taking over ‘dangling’ CNAME records for...
CSO - Online
CSO30 Australia Awards 2025: Nominations now open – Source: www.csoonline.com
Source: www.csoonline.com - Author: CSO Australia is accepting nominations for the 2025 CSO30 Awards, entries close...
CSO - Online
8 KI-Sicherheitsrisiken, die Unternehmen übersehen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine Studie zeigt: Fast zwei Drittel der Unternehmen versäumen es, die Auswirkungen...
CSO - Online
You’ve already been targeted: Why patch management is mission-critical – Source: www.csoonline.com
Source: www.csoonline.com - Author: Every day you delay a patch is a day attackers gain the...
CSO - Online
Skitnet malware: The new ransomware favorite – Source: www.csoonline.com
Source: www.csoonline.com - Author: The modular malware is tailor-made for ransomware as it features dedicated plugins...
CSO - Online
4 ways to safeguard CISO communications from legal liabilities – Source: www.csoonline.com
Source: www.csoonline.com - Author: The SEC’s lawsuit against SolarWinds’ CISO highlights the legal liabilities CISOs can...
CSO - Online
Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks – Source: www.csoonline.com
Source: www.csoonline.com - Author: During Pwn2Own hacking contest, participants were asked to compromise Microsoft Windows 11,...
CSO - Online
Massives Datenleck in Cloud-Speichern – Source: www.csoonline.com
Source: www.csoonline.com - Author: Sicherheitsforscher haben entdeckt, dass weltweit rund 200 Milliarden Dateien bei mehreren großen...
CSO - Online
A spoof antivirus makes Windows Defender disable security scans – Source: www.csoonline.com
Source: www.csoonline.com - Author: In a proof-of-concept, a security researcher demonstrated how the Windows Security Center...
CSO - Online
8 security risks overlooked in the rush to implement AI – Source: www.csoonline.com
Source: www.csoonline.com - Author: Nearly two-thirds of companies fail to vet the security implications of AI...
CSO - Online
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine Public Key Infrastructure (PKI) ersetzt Passwörter durch digitale Zertifikate. Warum Unternehmen...
CSO - Online
‘Would rather pay bounty than ransom’: Coinbase on $20M extortion attempt – Source: www.csoonline.com
Source: www.csoonline.com - Author: Stolen data includes customers’ personal and crypto account details, along with Coinbase’s...
CSO - Online
How to establish an effective AI GRC framework – Source: www.cio.com
Source: www.cio.com - Author: To get the most from artificial intelligence without falling prey to the...
CSO - Online
Hacker stehlen BVG-Kundendaten – Source: www.csoonline.com
Source: www.csoonline.com - Author: Cyberkriminelle haben bei einem Angriff auf einen Dienstleister der Berliner Verkehrsbetriebe möglicherweise...
CSO - Online
Proofpoint buying Hornetsecurity in a play to expand email security scope – Source: www.csoonline.com
Source: www.csoonline.com - Author: The deal is one of many big-ticket purchases in the cybersecurity industry...
CSO - Online
After helping Russia on the ground North Korea targets Ukraine with cyberespionage – Source: www.csoonline.com
Source: www.csoonline.com - Author: NewsMay 15, 20254 minsAdvanced Persistent ThreatsCyberattacks A cyberespionage group linked to North...
CSO - Online
Google patches Chrome vulnerability used for account takeover and MFA bypass – Source: www.csoonline.com
Source: www.csoonline.com - Author: Emergency patch fixes critical issue after exploit discovered in the wild. Chrome...
CSO - Online
Stealth RAT uses a PowerShell loader for fileless attacks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Remcos RAT gets a stealthy upgrade as attackers ditch old office exploits...
CSO - Online
Alternatives to Microsoft Outlook webmail come under attack in Europe – Source: www.csoonline.com
Source: www.csoonline.com - Author: Suspected Russian XSS attacks on organizations running Roundcube, Horde, MDaemon, and Zimbra....
CSO - Online
Data on sale: Trump administration withdraws data broker oversight proposal – Source: www.csoonline.com
Source: www.csoonline.com - Author: While the US Consumer Financial Protection Bureau cites policy shifts and legal...
CSO - Online
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR – Source: www.csoonline.com
Source: www.csoonline.com - Author: Phishing emails presumably from IT or HR remain the most potent, with...
CSO - Online
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers – Source: www.csoonline.com
Source: www.csoonline.com - Author: The same group is believed to be behind the M&S breach and...
CSO - Online
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die Cyberkriegertruppe Fancy Bear gilt als eine der einflussreichsten staatlich gesteuerten Hackergruppen...
Posts pagination
1
…
19
20
21
…
60
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025