Loading...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
June 20, 2025
How to conduct an effective post-incident review
Mitigation and remediation arenât the endpoints of incident response. Having a structured process to analyze and learn from a cybersecurity incident once it has been resolved is paramount to improving security operations.
Read more
Phishing campaign abuses Cloudflare Tunnels to sneak malware past firewalls
Serpentine#Cloud attack by unknown attackers opens RAT-based backdoor.
Chain IQ data theft highlights need to oversee third party suppliers
Firm says hack on 19 companies came from âtools and techniques that had never before been seen on a global scale.â
North Koreaâs BlueNoroff uses AI deepfakes to push Mac malware in fake Zoom calls
In a sophisticated new campaign, executives are being tricked into installing malware via AI-generated video calls with deepfake bosses, delivering custom-built, persistent Mac spyware targeting crypto firms.
Asanaâs MCP AI connector could have exposed corporate data, CSOs warned
Bug allowing access to other MCP usersâ data was found a month after server released.
© 2025