Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
Ransomware is (slightly) on the decline, cyberinsurance company says
Ransomware is (slightly) on the decline, cyberinsurance company says Ransomware attacks began to become both less...
csonline
Top 5 attack surface challenges related to security operations
Top 5 attack surface challenges related to security operations According to newly published ESG research, just...
csonline
Report: The state of secure identity 2022
Report: The state of secure identity 2022 A new report from Okta has found that credential...
csonline
Former Broadcom engineer gets eight months in prison for trade secrets theft
Former Broadcom engineer gets eight months in prison for trade secrets theft Peter Kisang Kim admitted...
csonline
Multi-factor authentication fatigue attacks are on the rise: How to defend against them
Multi-factor authentication fatigue attacks are on the rise: How to defend against them Credential compromise has...
csonline
D&O insurance not yet a priority despite criminal trial of Uber’s former CISO
D&O insurance not yet a priority despite criminal trial of Uber’s former CISO The trial of...
csonline
The 12 biggest data breach fines, penalties, and settlements so far
The 12 biggest data breach fines, penalties, and settlements so far Sizable fines assessed for data...
csonline
8 notable open-source security initiatives of 2022
8 notable open-source security initiatives of 2022 Open-source security has been high on the agenda this...
csonline
Medical device vulnerability could let hackers steal Wi-Fi credentials
Medical device vulnerability could let hackers steal Wi-Fi credentials A vulnerability found in an interaction between...
csonline
Key takeaways from the Open Cybersecurity Schema Format
Key takeaways from the Open Cybersecurity Schema Format One of the most pervasive challenges in the...
csonline
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger Researchers have discovered a new...
csonline
Nvidia partners with Dell and VMware for faster AI systems
Nvidia partners with Dell and VMware for faster AI systems New vSphere paired with Nvidia DPUs...
csonline
Traceable AI debuts API testing product for its security platform
Traceable AI debuts API testing product for its security platform Traceable AI today announced the general...
csonline
Stuxnet explained: The first known cyberweapon
Stuxnet explained: The first known cyberweapon What is Stuxnet? Stuxnet is a powerful computer worm designed...
csonline
Resolving conflicts between security best practices and compliance mandates
Resolving conflicts between security best practices and compliance mandates So, you read a great tip on...
csonline
Women in cybersecurity form non-profit organization The Forte Group
Women in cybersecurity form non-profit organization The Forte Group A group of over 90 women working...
csonline
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution Cybersecurity vendor...
csonline
Intro to MongoDB’s queryable encryption
Intro to MongoDB’s queryable encryption Queryable encryption was the main attraction at MongoDB World 2022, for...
csonline
Dashlane launches integrated passkey support for password manager with new in-browser passkey solution
Dashlane launches integrated passkey support for password manager with new in-browser passkey solution Password management vendor...
csonline
Remediant wants to move beyond PAM to secure enterprise networks
Remediant wants to move beyond PAM to secure enterprise networks Security software provider Remediant wants to...
csonline
Ragnar Locker continues trend of ransomware targeting energy sector
Ragnar Locker continues trend of ransomware targeting energy sector The recent attack on Greece’s largest natural...
csonline
Apple pushes out emergency updates to address zero-day exploits
Apple pushes out emergency updates to address zero-day exploits Apple has encouraged users of older mobile...
csonline
OpenSSF releases npm best practices to help developers tackle open-source dependency risks
OpenSSF releases npm best practices to help developers tackle open-source dependency risks The Open Source Security...
csonline
Top 12 managed detection and response solutions
Top 12 managed detection and response solutions Of all foundational elements for information security, logging requires...
csonline
How Azure Active Directory opens new authentication risks
How Azure Active Directory opens new authentication risks It’s been common knowledge for years that local...
csonline
Samsung reports second data breach in 6 months
Samsung reports second data breach in 6 months Samsung has opened up about a data breach...
csonline
The Heartbleed bug: How a flaw in OpenSSL caused a security crisis
The Heartbleed bug: How a flaw in OpenSSL caused a security crisis What is Heartbleed? Heartbleed...
csonline
Ransomware attacks on retailers rose 75% in 2021
Ransomware attacks on retailers rose 75% in 2021 Retailers are fast becoming the favorite targets for...
csonline
North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset
North Korean state-sponsored hacker group Lazarus adds new RAT to its malware toolset Security researchers have...
csonline
Password manager LastPass reveals intrusion into development system
Password manager LastPass reveals intrusion into development system LastPass, maker of a popular password management application,...
Posts navigation
1
…
12
13
14
…
16
Latest News
The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks – Source:thehackernews.com
25/06/2025
The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages – Source:thehackernews.com
25/06/2025
The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options – Source:thehackernews.com
25/06/2025
securelist.com
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025 – Source: securelist.com
25/06/2025
CSO - Online
US House reportedly bans WhatsApp from staffers’ devices over security concerns – Source: www.computerworld.com
25/06/2025
CSO - Online
Aflac-Datenleck: Versicherungsbranche im Visier von Hackern – Source: www.csoonline.com
25/06/2025