Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
csonline
csonline
7 reasons to avoid investing in cyber insurance
7 reasons to avoid investing in cyber insurance With cyberattacks rising at an alarming rate around...
csonline
GoDaddy connects a slew of past attacks to a multiyear hacking campaign
GoDaddy connects a slew of past attacks to a multiyear hacking campaign Web hosting and infrastructure...
csonline
Three-quarters of businesses braced for ‘serious’ email attack this year
Three-quarters of businesses braced for ‘serious’ email attack this year IT security leaders at three-out-of-four global...
csonline
Why CISOs change jobs
Why CISOs change jobs Being a CISO is a hard job. You must constantly balance business,...
csonline
10 dark web monitoring tools
10 dark web monitoring tools The dark web is the place where every CISO hope their...
csonline
DNA Diagnostic Center fined $400,000 for 2021 data breach
DNA Diagnostic Center fined $400,000 for 2021 data breach DNA Diagnostics Center, a DNA testing company,...
csonline
Cyber arms race, economic headwinds among top macro cybersecurity risks for 2023
Cyber arms race, economic headwinds among top macro cybersecurity risks for 2023 Despite the billions of...
csonline
Alcatraz AI streamlines facial recognition access control with mobile update
Alcatraz AI streamlines facial recognition access control with mobile update Access control provider Alcatraz AI is...
csonline
What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data
What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data Traffic Light...
csonline
Backdoor deployment overtakes ransomware as top attacker action
Backdoor deployment overtakes ransomware as top attacker action Deployment of backdoors on networks was the top...
csonline
Malware authors leverage more attack techniques that enable lateral movement
Malware authors leverage more attack techniques that enable lateral movement A new study of over a...
csonline
Evolving cyberattacks, alert fatigue creating DFIR burnout, regulatory risk
Evolving cyberattacks, alert fatigue creating DFIR burnout, regulatory risk The evolution of cybercrime is weighing heavily...
csonline
Security tool adoption jumps, Okta report shows
Security tool adoption jumps, Okta report shows A report from identity and access management (IAM) vendor...
csonline
How automation in CSPM can improve cloud security
How automation in CSPM can improve cloud security With the rapid growth and increasing complexity of...
csonline
BEC groups are using Google Translate to target high value victims
BEC groups are using Google Translate to target high value victims Abnormal Security has identified two...
csonline
EnterpriseDB adds Transparent Data Encryption to PostgreSQL
EnterpriseDB adds Transparent Data Encryption to PostgreSQL The new Transparent Data Encryption (TDE) feature will be...
csonline
Attacks on industrial infrastructure on the rise, defenses struggle to keep up
Attacks on industrial infrastructure on the rise, defenses struggle to keep up The last year saw...
csonline
Defending against attacks on Azure AD: Goodbye firewall, hello identity protection
Defending against attacks on Azure AD: Goodbye firewall, hello identity protection Not too long ago, guarding...
csonline
Descope launches authentication and user management SaaS
Descope launches authentication and user management SaaS Descope has launched its first product, a platform designed...
csonline
Cybersecurity startup Oligo debuts with new application security tech
Cybersecurity startup Oligo debuts with new application security tech Israel-based startup Oligo Security is exiting stealth...
csonline
5 biggest risks of using third-party services providers
5 biggest risks of using third-party services providers As business processes become more complex, companies are...
csonline
China-based cyberespionage actor seen targeting South America
China-based cyberespionage actor seen targeting South America China-based cyberespionage actor DEV-0147 has been observed compromising diplomatic...
csonline
5 top threats from 2022 most likely to strike in 2023
5 top threats from 2022 most likely to strike in 2023 The threat landscape is highly...
csonline
Economic headwinds could deepen the cybersecurity skills shortage
Economic headwinds could deepen the cybersecurity skills shortage According to the most recent research report from...
csonline
How to survive below the cybersecurity poverty line
How to survive below the cybersecurity poverty line The security poverty line broadly defines a divide...
csonline
FBI takes down Hive ransomware group in an undercover operation
FBI takes down Hive ransomware group in an undercover operation The US Department of Justice (DOJ)...
csonline
Hackers abuse legitimate remote monitoring and management tools in attacks
Hackers abuse legitimate remote monitoring and management tools in attacks Security researchers warn that an increasing...
csonline
US Maritime Administrator to study port crane cybersecurity concerns
US Maritime Administrator to study port crane cybersecurity concerns The 2023 National Defense Authorization Act (NDAA)...
csonline
European data protection authorities issue record €1.65 billion in GDPR fines
European data protection authorities issue record €1.65 billion in GDPR fines European data regulators issued a...
csonline
DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services
DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services Digital security certificate company DigiCert...
Posts navigation
1
…
4
5
6
…
16
Latest News
securityweek.com
Cloudflare Tunnels Abused in New Malware Campaign – Source: www.securityweek.com
22/06/2025
The Hacker News
Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages – Source:thehackernews.com
21/06/2025
The Register Security
Netflix, Apple, BofA websites hijacked with fake help-desk numbers – Source: go.theregister.com
21/06/2025
The Register Security
Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web – Source: go.theregister.com
21/06/2025
The Register Security
Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations – Source: go.theregister.com
21/06/2025
The Register Security
Attack on Oxford City Council exposes 21 years of election worker data – Source: go.theregister.com
21/06/2025