Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
Trust becomes an attack vector in the new campaign using trojanized KeePass – Source: www.csoonline.com
Source: www.csoonline.com - Author: The attack’s success hinged on exploiting the assumed safety of open-source tools...
CSO - Online
GitHub package limit put law firm in security bind – Source: www.csoonline.com
Source: www.csoonline.com - Author: A cautionary tale of how a developer tool limit case could derail...
CSO - Online
Threat intelligence platform buyer’s guide: Top vendors, selection advice – Source: www.csoonline.com
Source: www.csoonline.com - Author: Threat intelligence platforms have evolved and became essential security defensive tools. Here...
CSO - Online
Poor DNS hygiene is leading to domain hijacking – Source: www.csoonline.com
Source: www.csoonline.com - Author: Infoblox says crooks are finding and taking over ‘dangling’ CNAME records for...
CSO - Online
CSO30 Australia Awards 2025: Nominations now open – Source: www.csoonline.com
Source: www.csoonline.com - Author: CSO Australia is accepting nominations for the 2025 CSO30 Awards, entries close...
CSO - Online
8 KI-Sicherheitsrisiken, die Unternehmen übersehen – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine Studie zeigt: Fast zwei Drittel der Unternehmen versäumen es, die Auswirkungen...
CSO - Online
You’ve already been targeted: Why patch management is mission-critical – Source: www.csoonline.com
Source: www.csoonline.com - Author: Every day you delay a patch is a day attackers gain the...
CSO - Online
Skitnet malware: The new ransomware favorite – Source: www.csoonline.com
Source: www.csoonline.com - Author: The modular malware is tailor-made for ransomware as it features dedicated plugins...
CSO - Online
4 ways to safeguard CISO communications from legal liabilities – Source: www.csoonline.com
Source: www.csoonline.com - Author: The SEC’s lawsuit against SolarWinds’ CISO highlights the legal liabilities CISOs can...
CSO - Online
Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks – Source: www.csoonline.com
Source: www.csoonline.com - Author: During Pwn2Own hacking contest, participants were asked to compromise Microsoft Windows 11,...
CSO - Online
Massives Datenleck in Cloud-Speichern – Source: www.csoonline.com
Source: www.csoonline.com - Author: Sicherheitsforscher haben entdeckt, dass weltweit rund 200 Milliarden Dateien bei mehreren großen...
CSO - Online
A spoof antivirus makes Windows Defender disable security scans – Source: www.csoonline.com
Source: www.csoonline.com - Author: In a proof-of-concept, a security researcher demonstrated how the Windows Security Center...
CSO - Online
8 security risks overlooked in the rush to implement AI – Source: www.csoonline.com
Source: www.csoonline.com - Author: Nearly two-thirds of companies fail to vet the security implications of AI...
CSO - Online
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI – Source: www.csoonline.com
Source: www.csoonline.com - Author: Eine Public Key Infrastructure (PKI) ersetzt Passwörter durch digitale Zertifikate. Warum Unternehmen...
CSO - Online
‘Would rather pay bounty than ransom’: Coinbase on $20M extortion attempt – Source: www.csoonline.com
Source: www.csoonline.com - Author: Stolen data includes customers’ personal and crypto account details, along with Coinbase’s...
CSO - Online
How to establish an effective AI GRC framework – Source: www.cio.com
Source: www.cio.com - Author: To get the most from artificial intelligence without falling prey to the...
CSO - Online
Hacker stehlen BVG-Kundendaten – Source: www.csoonline.com
Source: www.csoonline.com - Author: Cyberkriminelle haben bei einem Angriff auf einen Dienstleister der Berliner Verkehrsbetriebe möglicherweise...
CSO - Online
Proofpoint buying Hornetsecurity in a play to expand email security scope – Source: www.csoonline.com
Source: www.csoonline.com - Author: The deal is one of many big-ticket purchases in the cybersecurity industry...
CSO - Online
After helping Russia on the ground North Korea targets Ukraine with cyberespionage – Source: www.csoonline.com
Source: www.csoonline.com - Author: NewsMay 15, 20254 minsAdvanced Persistent ThreatsCyberattacks A cyberespionage group linked to North...
CSO - Online
Google patches Chrome vulnerability used for account takeover and MFA bypass – Source: www.csoonline.com
Source: www.csoonline.com - Author: Emergency patch fixes critical issue after exploit discovered in the wild. Chrome...
CSO - Online
Stealth RAT uses a PowerShell loader for fileless attacks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Remcos RAT gets a stealthy upgrade as attackers ditch old office exploits...
CSO - Online
Alternatives to Microsoft Outlook webmail come under attack in Europe – Source: www.csoonline.com
Source: www.csoonline.com - Author: Suspected Russian XSS attacks on organizations running Roundcube, Horde, MDaemon, and Zimbra....
CSO - Online
Data on sale: Trump administration withdraws data broker oversight proposal – Source: www.csoonline.com
Source: www.csoonline.com - Author: While the US Consumer Financial Protection Bureau cites policy shifts and legal...
CSO - Online
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR – Source: www.csoonline.com
Source: www.csoonline.com - Author: Phishing emails presumably from IT or HR remain the most potent, with...
CSO - Online
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers – Source: www.csoonline.com
Source: www.csoonline.com - Author: The same group is believed to be behind the M&S breach and...
CSO - Online
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier – Source: www.csoonline.com
Source: www.csoonline.com - Author: Die Cyberkriegertruppe Fancy Bear gilt als eine der einflussreichsten staatlich gesteuerten Hackergruppen...
CSO - Online
How phones get hacked: 7 common attack methods explained – Source: www.csoonline.com
Source: www.csoonline.com - Author: Mobile security often is tighter than PC security, but users can still...
CSO - Online
Die acht wichtigsten Sicherheitsmetriken – Source: www.csoonline.com
Source: www.csoonline.com - Author: Feature15. Mai 20255 MinutenBusiness IT AlignmentIT-StrategieROI und Metriken Zur Bewertung der Cybersicherheitsleistung...
CSO - Online
Ivanti patches two EPMM flaws exploited in the wild – Source: www.csoonline.com
Source: www.csoonline.com - Author: The vulnerabilities located in third-party open-source libraries impact Ivanti’s mobile device management...
CSO - Online
Neue EU-Schwachstellen-Datenbank geht an den Start – Source: www.csoonline.com
Source: www.csoonline.com - Author: News14. Mai 20255 MinutenThreat and Vulnerability Management Nach dem Beinahe-Aus des CVE-Programm...
Posts navigation
1
…
3
4
5
…
44
Latest News
CSO - Online
Top US cyber officials face divergent paths after Senate confirmation – Source: www.csoonline.com
05/06/2025
CSO - Online
CISOs beware: genAI use is outpacing security controls – Source: www.csoonline.com
05/06/2025
CSO - Online
Hacker erbeuten Salesforce-Daten mit Vishing – Source: www.csoonline.com
05/06/2025
CSO - Online
Outdoor-Shop Unterwegs von Cyberattacke betroffen – Source: www.csoonline.com
05/06/2025
CSO - Online
Microsoft launches European Security Program to counter nation-state threats – Source: www.csoonline.com
05/06/2025
CSO - Online
Supply chain attack hits RubyGems to steal Telegram API data – Source: www.csoonline.com
05/06/2025