Loading...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
February 01, 2025
How law enforcement agents gain access to encrypted devices
From traditional investigative methods to zero-day exploits, authorities have a range of techniques at their disposal, including digital searches at borders, which could present concerns for CISOs.
Read more
VMware offers fixes to severe vulnerabilities in VMware Aria
Broadcom urges the application of patches that address pressing vulnerabilities in VMwareâs cloud management tools.
North Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systems
Attackers from the Lazarus group used social engineering tactics to impersonate recruiters and gain access to systems in a well-coordinated campaign over several months.
American CISOs should prepare now for the coming connected-vehicle tech bans
A new US Commerce Department rule banning Chinese and Russian hardware and software in internet-connected vehicles takes effect in 2027.
What is Magecart? How this hacker group steals payment card data
Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.
New Mirai botnet fires off DDoS attacks via compromised Mitel phones, notifies command & control when detected
Aquabotv3 is actively exploiting a known vulnerability in Mitel devices to include them in its botnet, according to Akamai's Security Intelligence and Response Team.
Threat actors using Google Gemini to amplify attacks: Report
Analysis showed hackers are already leveraging the power of open AI systems for research, troubleshooting code, and manipulating content.
© 2025