Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSO – Online
CSO - Online
Top 10 cybersecurity misconfigurations: Nail the setup to avoid attacks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Feature17 Dec 202410 minsConfiguration ManagementSecurity PracticesThreat and Vulnerability Management Misconfigured cybersecurity products...
CSO - Online
DORA steht vor der Tür – Source: www.csoonline.com
Source: www.csoonline.com - Author: Kommentar16 Dezember 20244 Minuten Ab Januar fordert DORA von Finanzinstituten resiliente IT-Strukturen...
CSO - Online
Black Hat Europe 2024: Key takeaways for cybersecurity pros – Source: www.csoonline.com
Source: www.csoonline.com - Author: Technical talks and policy discussions took centre stage, including ERP in the...
CSO - Online
XDR provider Arctic Wolf buys BlackBerry’s Cylance suite – Source: www.csoonline.com
Source: www.csoonline.com - Author: News16 Dec 20246 minsEndpoint ProtectionSecurity Software Company plans to integrate Cylance into...
CSO - Online
Guarding against AI-powered threats requires a focus on cyber awareness – Source: www.csoonline.com
Source: www.csoonline.com - Author: Whether executives are developing a new cyber education effort or refreshing an...
CSO - Online
Catching the ghost in the machine: Adapting threat detection to cloud speed – Source: www.csoonline.com
Source: www.csoonline.com - Author: The ghost in the machine thrives in complexity, exploiting disjointed systems, fragmented...
CSO - Online
Amazon refuses Microsoft 365 deployment because of lax cybersecurity – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security executives applaud Amazon for publicly shaming Microsoft security, although some suspect...
CSO - Online
Rhode Island suffers major cyberattack, exposing personal data of thousands – Source: www.csoonline.com
Source: www.csoonline.com - Author: With government systems targeted in the state, Deloitte, law enforcement, and IT...
CSO - Online
SAP-Systeme geraten zunehmend ins Visier von Cyber-Angreifern – Source: www.csoonline.com
Source: www.csoonline.com - Author: Analyse16 Dezember 20245 MinutenUnternehmenHacker-GruppenRansomware Laut einer auf der Black Hat Europe 2024...
CSO - Online
Future of proposed US cybersecurity healthcare bills in doubt – Source: www.csoonline.com
Source: www.csoonline.com - Author: News Analysis16 Dec 20248 minsGovernmentHealthcare IndustrySecurity In the wake of ransomware attacks...
CSO - Online
Security leaders top 10 takeaways for 2024 – Source: www.csoonline.com
Source: www.csoonline.com - Author: CISOs share insights on lessons they have learned in 2024 about AI...
CSO - Online
BlackBerry’s Critical Communications: The Triple Shield Available to Safeguard Organizations and Governments – Source: www.csoonline.com
Source: www.csoonline.com - Author: From major IT outages and cyberattacks crippling critical infrastructure, to extreme weather...
CSO - Online
The Hidden Risks of Mobile Calls and Messages: Why End-to-End Encryption is Just the Starting Line – Source: www.csoonline.com
Source: www.csoonline.com - Author: The recent breaches of sovereign telecom networks in the United States, underscores...
CSO - Online
Cloud Access Security Broker – ein Kaufratgeber – Source: www.csoonline.com
Source: www.csoonline.com - Author: Bevor Sie in einen Cloud Access Security Broker investieren, sollten Sie diesen...
CSO - Online
SAP systems increasingly targeted by cyber attackers – Source: www.csoonline.com
Source: www.csoonline.com - Author: News13 Dec 20244 minsBlack HatPayment SystemsSoftware Providers Long viewed as an opaque...
CSO - Online
PUMA creeps through Linux with a stealthy rootkit attack – Source: www.csoonline.com
Source: www.csoonline.com - Author: The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate...
CSO - Online
How to turn around a toxic cybersecurity culture – Source: www.csoonline.com
Source: www.csoonline.com - Author: A poor security culture leaves team members confused, angry, and searching for...
CSO - Online
10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres IT-Sicherheitstechnik-Teams frei – Source: www.csoonline.com
Source: www.csoonline.com - Author: Da Security-Engineering-Teams immer mehr an Bedeutung gewinnen, müssen CISOs ihre Struktur und...
CSO - Online
Security researchers find deep flaws in CVSS vulnerability scoring system – Source: www.csoonline.com
Source: www.csoonline.com - Author: News12 Dec 20243 minsAdvanced Persistent ThreatsBlack HatThreat and Vulnerability Management Cybersecurity experts...
CSO - Online
Europol shutters 27 DDoS sites in major crackdown – Source: www.csoonline.com
Source: www.csoonline.com - Author: New attacks were planned for the Christmas holiday. Europol has announced that it has...
CSO - Online
Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’ – Source: www.csoonline.com
Source: www.csoonline.com - Author: Security researchers warn that the Windows ANSI API contains a hidden trap...
CSO - Online
KeyTrap DNSSEC: The day the internet (almost) stood still – Source: www.csoonline.com
Source: www.csoonline.com - Author: Black Hat conference attendees heard a post-mortem on the KeyTrap DNSSEC vulnerability,...
CSO - Online
Die wichtigsten Cybersecurity-Prognosen für 2025 – Source: www.csoonline.com
Source: www.csoonline.com - Author: Neue Sicherheitsgesetzte, Deepfakes und APT-Angriffe: Das Jahr 2025 stellt Unternehmen vor einige...
CSO - Online
A security ‘hole’ in Krispy Kreme Doughnuts helped hackers take a bite – Source: www.csoonline.com
Source: www.csoonline.com - Author: The attack that yet remains unclaimed disrupted parts of Krispy Kreme’s online...
CSO - Online
The 7 most in-demand cybersecurity skills today – Source: www.csoonline.com
Source: www.csoonline.com - Author: Evolving IT strategies and emerging technologies and threats have organizations shuffling their...
CSO - Online
AMD data center chips vulnerable to revealing data through ‘BadRAM’ attack – Source: www.csoonline.com
Source: www.csoonline.com - Author: Researchers find a way to access encrypted data in AMD EPYC data...
CSO - Online
Attackers can abuse the Windows UI Automation framework to steal data from apps – Source: www.csoonline.com
Source: www.csoonline.com - Author: News11 Dec 20245 minsData and Information SecurityEndpoint ProtectionMalware An Akamai researcher found...
CSO - Online
The imperative for governments to leverage genAI in cyber defense – Source: www.csoonline.com
Source: www.csoonline.com - Author: Harness the power of genAI to enhance threat detection and response capabilities,...
CSO - Online
Cardiac surgery device manufacturer falls prey to ransomware – Source: www.csoonline.com
Source: www.csoonline.com - Author: News11 Dec 20242 minsCyberattacksHealthcare IndustryRansomware Ransomware attack hits administrative processes at Artivion...
CSO - Online
Microsoft secretly stopped actors from snooping on your MFA codes – Source: www.csoonline.com
Source: www.csoonline.com - Author: The issue could allow threat actors to brute force MFA authentication codes...
Posts pagination
1
…
44
45
46
…
60
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025