Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
Transparency and policy shapes Cloudflare’s Kiwi Farms decisions
Transparency and policy shapes Cloudflare’s Kiwi Farms decisions Cloudflare percolated back into the news cycle last...
csonline
Instagram faces $402 million fine for alleged mishandling of children’s data
Instagram faces $402 million fine for alleged mishandling of children’s data The Irish Data Protection Commissioner...
csonline
4 strategy game-changers for finding cybersecurity talent
4 strategy game-changers for finding cybersecurity talent Dave Stirling, CISO of Zions Bancorporation, isn’t waiting for...
csonline
Sophisticated BEC scammers bypass Microsoft 365 multi-factor authentication
Sophisticated BEC scammers bypass Microsoft 365 multi-factor authentication Business email compromise (BEC) attacks, where hackers hijack...
csonline
DNS data indicates increased malicious domain activity, phishing toolkit reuse
DNS data indicates increased malicious domain activity, phishing toolkit reuse New research from cybersecurity vendor Akamai...
csonline
Up to 35% more CVEs published so far this year compared to 2021
Up to 35% more CVEs published so far this year compared to 2021 A new report...
csonline
Why SBOMs alone aren’t enough for software supply chain security
Why SBOMs alone aren’t enough for software supply chain security It seems like just yesterday that...
csonline
Lloyd’s of London to exclude state-backed attacks from cyber insurance policies
Lloyd’s of London to exclude state-backed attacks from cyber insurance policies Insurance marketplace Lloyd’s of London...
csonline
Oracle sued over ‘worldwide surveillance machine’ by privacy rights activists
Oracle sued over ‘worldwide surveillance machine’ by privacy rights activists A class action lawsuit filed last...
csonline
What is the cost of a data breach?
What is the cost of a data breach? The cost of a data breach is not...
csonline
True crime shows might be the biggest educational tool for cybercrime awareness
True crime shows might be the biggest educational tool for cybercrime awareness A survey of U.S....
csonline
Why patching quality, vendor info on vulnerabilities are declining
Why patching quality, vendor info on vulnerabilities are declining Those who apply security patches are finding...
csonline
Why business email compromise still tops ransomware for total losses
Why business email compromise still tops ransomware for total losses While businesses are busy trying to...
csonline
New ransomware HavanaCrypt poses as Google software update
New ransomware HavanaCrypt poses as Google software update A new strain of ransomware has been making...
csonline
Russia-linked cyberattacks on Ukraine: A timeline
Russia-linked cyberattacks on Ukraine: A timeline Today is Ukraine Independence day. It’s also the six-month anniversary...
csonline
Researchers warn of darkverse emerging from the metaverse
Researchers warn of darkverse emerging from the metaverse The metaverse is seen by many companies as a great...
csonline
How 2023 cybersecurity budget allocations are shaping up
How 2023 cybersecurity budget allocations are shaping up Cybersecurity spending in the coming year may not...
csonline
WannaCry explained: A perfect ransomware storm
WannaCry explained: A perfect ransomware storm What is WannaCry? WannaCry is a ransomware worm that spread...
csonline
7 critical steps for successful security onboarding
7 critical steps for successful security onboarding Jerich Beason, CISO, Commercial Bank at Capital One, equates...
csonline
6 best practices for blue team success
6 best practices for blue team success Cybersecurity team conversations these days can feel like a...
csonline
Exposed VNC instances threatens critical infrastructure as attacks spike
Exposed VNC instances threatens critical infrastructure as attacks spike New research from threat intelligence and cybersecurity...
csonline
Safe Security debuts two free risk assessment tools for businesses
Safe Security debuts two free risk assessment tools for businesses Cybersecurity risk assessment company Safe Security...
csonline
“Evil PLC Attack” weaponizes PLCs to infect engineering workstations
“Evil PLC Attack” weaponizes PLCs to infect engineering workstations Most attack scenarios against industrial installations, whether...
csonline
Ransomware safeguards for small- to medium-sized businesses
Ransomware safeguards for small- to medium-sized businesses The Institute for Security and Technology (IST) recently released...
csonline
What is zk-SNARK?
What is zk-SNARK? Zk-SNARK, which stands for zero-knowledge succinct non-interactive argument or knowledge, is the most...
csonline
Google updates Chronicle with enhanced threat detection
Google updates Chronicle with enhanced threat detection Google Cloud Wednesday announced the general availability of what...
csonline
New Deep Instinct partner program targets MSSPs fighting ransomware
New Deep Instinct partner program targets MSSPs fighting ransomware Cybersecurity firm Deep Instinct has rolled out...
csonline
NIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessment
NIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessment The U.S. National Institute of Standards...
csonline
Google Cloud blocks largest HTTPS DDoS attack ever
Google Cloud blocks largest HTTPS DDoS attack ever Google Cloud has claimed to have blocked the...
csonline
Five things security pros want from CNAPP
Five things security pros want from CNAPP According to new research from ESG and the Information Systems...
Posts navigation
1
…
14
15
16
Latest News
The Hacker News
Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware – Source:thehackernews.com
14/01/2025
securityweek.com
CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks – Source: www.securityweek.com
14/01/2025
securityweek.com
Many Ivanti VPNs Still Unpatched as UK Domain Registry Emerges as Victim of Exploitation – Source: www.securityweek.com
14/01/2025
securityweek.com
Critical Aviatrix Controller Vulnerability Exploited Against Cloud Environments – Source: www.securityweek.com
14/01/2025
securityweek.com
Infostealer Infections Lead to Telefonica Ticketing System Breach – Source: www.securityweek.com
14/01/2025
securityweek.com
AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming – Source: www.securityweek.com
14/01/2025