Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
New Deep Instinct partner program targets MSSPs fighting ransomware
New Deep Instinct partner program targets MSSPs fighting ransomware Cybersecurity firm Deep Instinct has rolled out...
csonline
Top 5 security risks of Open RAN
Top 5 security risks of Open RAN When a cell phone or other mobile device connects...
csonline
3 ways China’s access to TikTok data is a security risk
3 ways China’s access to TikTok data is a security risk The short-video platform TikTok has...
csonline
New exploits can bypass Secure Boot and modern UEFI security protections
New exploits can bypass Secure Boot and modern UEFI security protections Two teams of researchers have...
csonline
Black Basta: New ransomware threat aiming for the big league
Black Basta: New ransomware threat aiming for the big league Many ransomware gangs have risen to...
csonline
How a Venezuelan disinformation campaign swayed voters in Colombia
How a Venezuelan disinformation campaign swayed voters in Colombia Ever since the Kremlin’s troll farm, the...
csonline
Cisco admits hack on IT network, links attacker to LAPSUS$ threat group
Cisco admits hack on IT network, links attacker to LAPSUS$ threat group IT, networking, and cybersecurity...
csonline
What happened to the Lapsus$ hackers?
What happened to the Lapsus$ hackers? [Editor’s note: This article originally appeared on the CSO Germany...
csonline
Network mistakes, misconfigurations cost companies millions
Network mistakes, misconfigurations cost companies millions Network misconfigurations cost companies an average of 9% of annual...
csonline
Top cybersecurity products unveiled at Black Hat 2022
Top cybersecurity products unveiled at Black Hat 2022 Zero trust security management, extended detection and response...
csonline
Chinese APT group uses multiple backdoors in attacks on military and research organizations
Chinese APT group uses multiple backdoors in attacks on military and research organizations Since early this...
csonline
CrowdStrike adds AI-powered indicators of attack to Falcon platform
CrowdStrike adds AI-powered indicators of attack to Falcon platform Cybersecurity vendor CrowdStrike has added new AI-powered...
csonline
Microsoft urges Windows users to run patch for DogWalk zero-day exploit
Microsoft urges Windows users to run patch for DogWalk zero-day exploit Despite previously claiming the DogWalk...
csonline
Sensitive data in the cloud gets new automated remediation tool from BigID
Sensitive data in the cloud gets new automated remediation tool from BigID Data intelligence company BigID...
Posts navigation
1
…
15
16
Latest News
The Register Security
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days – Source: go.theregister.com
14/01/2025
The Hacker News
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks – Source:thehackernews.com
14/01/2025
CSO - Online
US attacks ransomware supply chain with indictment of three cryptocurrency mixer operators – Source: www.csoonline.com
13/01/2025
CSO - Online
Sicherheitsmängel gefährden DNA-Sequenziergeräte – Source: www.csoonline.com
13/01/2025
CSO - Online
Biden’s final push: Using AI to bolster cybersecurity standards – Source: www.csoonline.com
13/01/2025
CSO - Online
CISOs embrace rise in prominence — with broader business authority – Source: www.csoonline.com
13/01/2025