Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
CSO – Online
Page 5
CSO – Online
CSO - Online
Frontegg launches entitlements engine to streamline access authorization – Source: www.csoonline.com
Source: www.csoonline.com - Author: The new entitlement engine will be powered by context-aware logic controls (CALC)...
CSO - Online
Screen recording Android app found to be spying on users – Source: www.csoonline.com
Source: www.csoonline.com - Author: iRecorder was a legitimate app made available on Google Play Store in...
CSO - Online
Upskilling the non-technical: finding cyber certification and training for internal hires – Source: www.csoonline.com
Source: www.csoonline.com - Author: Andrey Popov / Shutterstock Finding qualified staff to replace vacancies or build...
CSO - Online
Hackers hold city of Augusta hostage in a ransomware attack – Source: www.csoonline.com
Source: www.csoonline.com - Author: The ransomware group has released 10GB of sample data from the cyberattack...
CSO - Online
New phishing technique poses as a browser-based file archiver – Source: www.csoonline.com
Source: www.csoonline.com - Author: The new technique has a hacker simulate an archiving software in the...
CSO - Online
Insider risk management: Where your program resides shapes its focus – Source: www.csoonline.com
Source: www.csoonline.com - Author: Choosing which department should be responsible for protecting an organization from threats...
CSO - Online
Researchers find new ICS malware toolkit designed to cause electric power outages – Source: www.csoonline.com
Source: www.csoonline.com - Author: Mandiant recommends threat-hunting steps to detect COSMICENERGY despite no confirmed attacks in...
CSO - Online
BrandPost: New report reveals tips for building a skilled cybersecurity workforce – Source: www.csoonline.com
Source: www.csoonline.com - Author: About | When you have comprehensive security, the future is yours to...
CSO - Online
BrandPost: The state of operational technology and cybersecurity – Source: www.csoonline.com
Source: www.csoonline.com - Author: About | CISOs today face an expanding attack surface, increasingly threats, and...
CSO - Online
BrandPost: Adding the operation focus to OT security – Source: www.csoonline.com
Source: www.csoonline.com - Author: About | Cybersecurity has a communication problem. It’s understood that action is...
CSO - Online
How to check for new exploits in real time? VulnCheck has an answer – Source: www.csoonline.com
Source: www.csoonline.com - Author: VulnCheck’s new database tracks exploits for fresh vulnerabilities in real time and...
CSO - Online
Inactive accounts pose significant account takeover security risks – Source: www.csoonline.com
Source: www.csoonline.com - Author: Inactive accounts that haven’t been accessed for extended periods are more likely...
CSO - Online
Microsoft links attacks on American critical infrastructure systems to China – Source: www.csoonline.com
Source: www.csoonline.com - Author: The Chinese nation-state actor has been actively conducting espionage and information-gathering attacks...
CSO - Online
6 ways generative AI chatbots and LLMs can enhance cybersecurity – Source: www.csoonline.com
Source: www.csoonline.com - Author: Generative AI chatbots and large language models can be a double-edged swords...
CSO - Online
Attributes of a mature cyber-threat intelligence program – Source: www.csoonline.com
Source: www.csoonline.com - Author: Mature cyber-threat intelligence programs follow a lifecycle and provide tactical, operational, and...
CSO - Online
BrandPost: Don’t pay for shadow IT discovery, it’s now free – Source: www.csoonline.com
Source: www.csoonline.com - Author: About | Discover SaaS Shadow IT for free with this self-service solution....
CSO - Online
SMBs and regional MSPs are increasingly targeted by state-sponsored APT groups – Source: www.csoonline.com
Source: www.csoonline.com - Author: Research shows a shift toward advanced persistent threat actors compromising smaller organization,...
CSO - Online
New hyperactive phishing campaign uses SuperMailer templates: Report – Source: www.csoonline.com
Source: www.csoonline.com - Author: Network security firm Cofense was able to identify a code trace in...
CSO - Online
US sanctions four North Korean entities for global cyberattacks – Source: www.csoonline.com
Source: www.csoonline.com - Author: North Korean hackers stole more virtual currency in 2022 than in any...
CSO - Online
CyberArk’s enterprise browser promises zero-trust support, policy management – Source: www.csoonline.com
Source: www.csoonline.com - Author: The identity security vendor is set to launch an enterprise browser in...
CSO - Online
Credential harvesting tool Legion targets additional cloud services – Source: www.csoonline.com
Source: www.csoonline.com - Author: Threat actors now use Legion to steal AWS-specific credentials from web servers...
CSO - Online
Former Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breach – Source: www.csoonline.com
Source: www.csoonline.com - Author: Will Joe Sullivan’s conviction for obstruction in the reporting of the 2016...
CSO - Online
Axiado releases new security processors for servers and network appliances – Source: www.csoonline.com
Source: www.csoonline.com - Author: The new TCUs released by Axiado are built within a single SoC,...
CSO - Online
Teleport releases Teleport 13 with automatic vulnerability patching, enhanced DevOps security – Source: www.csoonline.com
Source: www.csoonline.com - Author: Teleport 13 features include Transport Layer Security routing and the ability to...
CSO - Online
Think security first when switching from traditional Active Directory to Azure AD – Source: www.csoonline.com
Source: www.csoonline.com - Author: With the final release of Windows 10, the use of traditional Active...
CSO - Online
Meta fined $1.3B for violating EU GDPR data transfer rules on privacy – Source: www.csoonline.com
Source: www.csoonline.com - Author: The Irish Data Protection Commission has levied a record-breaking fine against Facebook's...
CSO - Online
Microsoft reports jump in business email compromise activity – Source: www.csoonline.com
Source: www.csoonline.com - Author: Thirty-five million business email compromise (BEC) attempts were detected in the last...
CSO - Online
BrandPost: Combining threat intelligence, data at scale, and AI to fortify cyber defenses – Source: www.csoonline.com
Source: www.csoonline.com - Author: About | When you have comprehensive security, the future is yours to...
CSO - Online
What cybersecurity professionals can learn from the humble ant – Source: www.csoonline.com
Source: www.csoonline.com - Author: When ants work together to defend their colony, it’s all for one...
CSO - Online
Legitimate looking npm packages found hosting TurkoRat infostealer – Source: www.csoonline.com
Source: www.csoonline.com - Author: The malicious packages have been downloaded hundreds of times, but the long-term...
Posts navigation
1
…
4
5
6
Latest News
The Register Security
US faith-based healthcare org Ascension says ‘cybersecurity event’ disrupted clinical ops – Source: go.theregister.com
10/05/2024
The Register Security
Dell customer order database of ’49M records’ stolen, now up for sale on dark web – Source: go.theregister.com
10/05/2024
The Register Security
America’s enemies targeting US critical infrastructure should be ‘wake-up call’ – Source: go.theregister.com
10/05/2024
The Hacker News
New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation – Source:thehackernews.com
09/05/2024
The Hacker News
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign – Source:thehackernews.com
09/05/2024
The Hacker News
New Guide: How to Scale Your vCISO Services Profitably – Source:thehackernews.com
09/05/2024