Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent
Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent Multinational food and beverage...
csonline
OpenSSL project patches two vulnerabilities but downgrades severity
OpenSSL project patches two vulnerabilities but downgrades severity The OpenSSL project released a patch for two...
csonline
The OSPO – the front line for secure open-source software supply chain governance
The OSPO – the front line for secure open-source software supply chain governance Organizations of every...
csonline
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats Last week, the...
csonline
Engineering workstation attacks on industrial control systems double: Report
Engineering workstation attacks on industrial control systems double: Report Engineering workstation compromises were the initial attack...
csonline
Security startups to watch for 2022
Security startups to watch for 2022 The problems cybersecurity startups attempt to solve are often a...
csonline
Phishing attacks increase by over 31% in third quarter: Report
Phishing attacks increase by over 31% in third quarter: Report Email security and threat detection company...
csonline
Data capture by border agencies can and will happen – are your on-the-road employees prepared?
Data capture by border agencies can and will happen – are your on-the-road employees prepared? Does...
csonline
What the Uber verdict means to CISOs: You’re (probably) not going to jail
What the Uber verdict means to CISOs: You’re (probably) not going to jail There seem to...
csonline
New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants
New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants Researchers have discovered a new...
csonline
Top skill-building resources and advice for CISOs
Top skill-building resources and advice for CISOs The role of the CISO has evolved, and so...
csonline
BrandPost: Why Ease-of-Use is Central to Better Security
BrandPost: Why Ease-of-Use is Central to Better Security Here is an old joke from my days...
csonline
Altruism under attack: why cybersecurity has become essential to humanitarian nonprofits
Altruism under attack: why cybersecurity has become essential to humanitarian nonprofits Humanitarian initiatives have always been...
csonline
8 top multi-factor authentication products and how to choose an MFA solution
8 top multi-factor authentication products and how to choose an MFA solution Today’s credential-based attacks are...
csonline
Supply chain attacks increased over 600% this year and companies are falling behind
Supply chain attacks increased over 600% this year and companies are falling behind The number of...
csonline
High, medium severity vulnerabilities impacting Zimbra Collaboration Suite
High, medium severity vulnerabilities impacting Zimbra Collaboration Suite Threat actors are actively exploiting multiple Common Vulnerabilities...
csonline
Attackers switch to self-extracting password-protected archives to distribute email malware
Attackers switch to self-extracting password-protected archives to distribute email malware Distributing malware inside password-protected archives has...
csonline
Financial losses to synthetic identity-based fraud to double by 2024
Financial losses to synthetic identity-based fraud to double by 2024 Losses to imposter scams based on...
csonline
Securing your organization against phishing can cost up to $85 per email
Securing your organization against phishing can cost up to $85 per email As phishing attacks increase,...
csonline
With Conti gone, LockBit takes lead of the ransomware threat landscape
With Conti gone, LockBit takes lead of the ransomware threat landscape The number of ransomware attacks...
csonline
96% of companies report insufficient security for sensitive cloud data
96% of companies report insufficient security for sensitive cloud data The vast majority of organizations lack...
csonline
IoT security strategy from enterprises using connected devices
IoT security strategy from enterprises using connected devices IoT devices pose significant threats to enterprises because...
csonline
It’s time to prioritize SaaS security
It’s time to prioritize SaaS security Did our focus on IaaS security come at the expense...
csonline
When CISOs are doomed to fail, and how to improve your chances of success
When CISOs are doomed to fail, and how to improve your chances of success There’s a...
csonline
Iran’s nuclear energy agency confirms email server hacked
Iran’s nuclear energy agency confirms email server hacked The Atomic Energy Organization of Iran on Sunday...
csonline
Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC
Security by design vital to protecting IoT, smart cities around the world, says CEO of UK...
csonline
Blockchain security companies tackle cryptocurrency theft, ransom tracing
Blockchain security companies tackle cryptocurrency theft, ransom tracing According to data from the Rekt leaderboard, cybercriminals...
csonline
8 hallmarks of a proactive security strategy
8 hallmarks of a proactive security strategy CISOs have long been tasked with building response and...
csonline
Akamai to boost network-layer DDoS protection with new scrubbing centers
Akamai to boost network-layer DDoS protection with new scrubbing centers Content delivery network (CDN) provider Akamai...
csonline
Microsoft Event Log vulnerabilities threaten some Windows operating systems
Microsoft Event Log vulnerabilities threaten some Windows operating systems A pair of newly discovered vulnerabilities have...
Posts navigation
1
…
10
11
12
…
16
Latest News
CSO - Online
US House reportedly bans WhatsApp from staffers’ devices over security concerns – Source: www.computerworld.com
25/06/2025
CSO - Online
Aflac-Datenleck: Versicherungsbranche im Visier von Hackern – Source: www.csoonline.com
25/06/2025
CSO - Online
New ‘Echo Chamber’ attack can trick GPT, Gemini into breaking safety rules – Source: www.csoonline.com
25/06/2025
CSO - Online
The CISO’s 5-step guide to securing AI operations – Source: www.csoonline.com
25/06/2025
CSO - Online
Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard – Source: www.csoonline.com
25/06/2025
The Hacker News
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public – Source:thehackernews.com
24/06/2025