Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
New Deep Instinct partner program targets MSSPs fighting ransomware
New Deep Instinct partner program targets MSSPs fighting ransomware Cybersecurity firm Deep Instinct has rolled out...
csonline
Top 5 security risks of Open RAN
Top 5 security risks of Open RAN When a cell phone or other mobile device connects...
csonline
3 ways China’s access to TikTok data is a security risk
3 ways China’s access to TikTok data is a security risk The short-video platform TikTok has...
csonline
New exploits can bypass Secure Boot and modern UEFI security protections
New exploits can bypass Secure Boot and modern UEFI security protections Two teams of researchers have...
csonline
Black Basta: New ransomware threat aiming for the big league
Black Basta: New ransomware threat aiming for the big league Many ransomware gangs have risen to...
csonline
How a Venezuelan disinformation campaign swayed voters in Colombia
How a Venezuelan disinformation campaign swayed voters in Colombia Ever since the Kremlin’s troll farm, the...
csonline
Cisco admits hack on IT network, links attacker to LAPSUS$ threat group
Cisco admits hack on IT network, links attacker to LAPSUS$ threat group IT, networking, and cybersecurity...
csonline
What happened to the Lapsus$ hackers?
What happened to the Lapsus$ hackers? [Editor’s note: This article originally appeared on the CSO Germany...
csonline
Network mistakes, misconfigurations cost companies millions
Network mistakes, misconfigurations cost companies millions Network misconfigurations cost companies an average of 9% of annual...
csonline
Top cybersecurity products unveiled at Black Hat 2022
Top cybersecurity products unveiled at Black Hat 2022 Zero trust security management, extended detection and response...
csonline
Chinese APT group uses multiple backdoors in attacks on military and research organizations
Chinese APT group uses multiple backdoors in attacks on military and research organizations Since early this...
csonline
CrowdStrike adds AI-powered indicators of attack to Falcon platform
CrowdStrike adds AI-powered indicators of attack to Falcon platform Cybersecurity vendor CrowdStrike has added new AI-powered...
csonline
Microsoft urges Windows users to run patch for DogWalk zero-day exploit
Microsoft urges Windows users to run patch for DogWalk zero-day exploit Despite previously claiming the DogWalk...
csonline
Sensitive data in the cloud gets new automated remediation tool from BigID
Sensitive data in the cloud gets new automated remediation tool from BigID Data intelligence company BigID...
Posts navigation
1
…
15
16
Latest News
securityweek.com
Hackers Access Legacy Systems in Oxford City Council Cyberattack – Source: www.securityweek.com
20/06/2025
CSO - Online
GitHub hit by a sophisticated malware campaign as ‘Banana Squad’ mimics popular repos – Source: www.csoonline.com
20/06/2025
CSO - Online
IBM combines governance and security tools to solve the AI agent oversight crisis – Source: www.csoonline.com
20/06/2025
CSO - Online
Hacker legen Leymann Baustoffe lahm – Source: www.csoonline.com
20/06/2025
CSO - Online
How to conduct an effective post-incident review – Source: www.csoonline.com
20/06/2025
CSO - Online
Chain IQ data theft highlights need to oversee third party suppliers – Source: www.csoonline.com
20/06/2025