Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
csonline
Page 3
csonline
csonline
Iron Tiger updates malware to target Linux platform
Iron Tiger updates malware to target Linux platform Iron Tiger, an advanced persistent threat (APT) group,...
csonline
HPE to acquire Axis Security to deliver a unified SASE offering
HPE to acquire Axis Security to deliver a unified SASE offering Hewlett Packard Enterprise has agreed...
csonline
DNS data shows one in 10 organizations have malware traffic on their networks
DNS data shows one in 10 organizations have malware traffic on their networks During every quarter...
csonline
IBM partners up with Cohesity for better data defense in new storage suite
IBM partners up with Cohesity for better data defense in new storage suite Data security and...
csonline
Can a quantum algorithm crack RSA cryptography? Not yet
Can a quantum algorithm crack RSA cryptography? Not yet Every CISO has encryption implementation decisions to...
csonline
Amazon-owned Ring reportedly suffers ransomware attack
Amazon-owned Ring reportedly suffers ransomware attack Ring, a home security and smart home company owned by...
csonline
ReversingLabs adds new context-based secret detection capabilities
ReversingLabs adds new context-based secret detection capabilities ReversingLabs has added new secret detection capabilities to its...
csonline
Universities and colleges cope silently with ransomware attacks
Universities and colleges cope silently with ransomware attacks Although some cybersecurity researchers say that ransomware attacks...
csonline
Booking.com account takeover flaw shows possible pitfalls in OAuth implementations
Booking.com account takeover flaw shows possible pitfalls in OAuth implementations Booking.com, one of the world’s largest...
csonline
Software liability reform is liable to push us off a cliff
Software liability reform is liable to push us off a cliff Like “SBOMs will solve everything,”...
csonline
Gitpod flaw shows cloud-based development environments need security assessments
Gitpod flaw shows cloud-based development environments need security assessments Researchers from cloud security firm Snyk recently...
csonline
White House releases an ambitious National Cybersecurity Strategy
White House releases an ambitious National Cybersecurity Strategy The White House released its long-anticipated National Cybersecurity...
csonline
6 reasons why your anti-phishing strategy isn’t working
6 reasons why your anti-phishing strategy isn’t working Phishing attempts are typically like fishing in a...
csonline
Blackbaud penalized $3M for not disclosing the full scope of ransomware attack
Blackbaud penalized $3M for not disclosing the full scope of ransomware attack Software firm Blackbaud has...
csonline
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast Asia
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast Asia The recently identified Dark...
csonline
Best and worst data breach responses highlight the do’s and don’ts of IR
Best and worst data breach responses highlight the do’s and don’ts of IR In theory, enterprises...
csonline
Unpatched old vulnerabilities continue to be exploited: Report
Unpatched old vulnerabilities continue to be exploited: Report Known vulnerabilities as old as 2017 are still...
csonline
Microsoft Intune Suite consolidates endpoint management and protection
Microsoft Intune Suite consolidates endpoint management and protection Intune Suite will streamline endpoint management with added...
csonline
Lazarus group infiltrated South Korean finance firm twice last year
Lazarus group infiltrated South Korean finance firm twice last year Lazarus group was spotted exploiting flaws...
csonline
GitHub begins 2FA rollout for code contributors
GitHub begins 2FA rollout for code contributors GitHub has begun its official rollout of two-factor authentication...
csonline
New Chinese regulatory body expected to streamline data governance rules
New Chinese regulatory body expected to streamline data governance rules A new data regulation body that...
csonline
Congressional health insurance service hit by data breach
Congressional health insurance service hit by data breach A health insurance marketplace that provides coverage for...
csonline
Stolen credentials increasingly empower the cybercrime underground
Stolen credentials increasingly empower the cybercrime underground The cybercrime underground has long functioned as an open...
csonline
Attacks on SonicWall appliances linked to Chinese campaign: Mandiant
Attacks on SonicWall appliances linked to Chinese campaign: Mandiant A persistent malware targeting unpatched SonicWall Secure...
csonline
Top cybersecurity M&A deals for 2023
Top cybersecurity M&A deals for 2023 Uncertainty and instability marked the end of 2022 for many...
csonline
AT&T informs 9M customers about data breach
AT&T informs 9M customers about data breach AT&T is informing customers about a data breach at...
csonline
New variant of the IceFire ransomware targets Linux enterprise systems
New variant of the IceFire ransomware targets Linux enterprise systems A novel Linux version of the...
csonline
BrandPost: Cybersecurity Automation: Leveling the Playing Field
BrandPost: Cybersecurity Automation: Leveling the Playing Field Many things challenge how we practice cybersecurity these days....
csonline
Cybersecurity in wartime: how Ukraine’s infosec community is coping
Cybersecurity in wartime: how Ukraine’s infosec community is coping Whenever shells rain down on Ukraine, Yuriy...
csonline
Economic pressures are increasing cybersecurity risks; a recession would amp them up more
Economic pressures are increasing cybersecurity risks; a recession would amp them up more Predictions on whether...
Posts navigation
1
2
3
4
…
16
Latest News
The Hacker News
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data – Source:thehackernews.com
03/05/2024
The Hacker News
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources – Source:thehackernews.com
03/05/2024
The Hacker News
Google Announces Passkeys Adopted by Over 400 Million Accounts – Source:thehackernews.com
03/05/2024
Data Breach Today
Critical Flaw in R Language Poses Supply Chain Risk – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Correlating Cyber Investments With Business Outcomes – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits – Source: www.databreachtoday.com
03/05/2024