Loading...
The day's top cybersecurity news and in-depth coverage
September 23, 2022
Corrupting files is faster, cheaper, and less likely to be stopped by endpoint protection tools than encrypting them. Read more â¶
The cost is too high and the risk too low to offer CISOs directors-and-officers insurance at many companies. Protective governance policies might make more sense.
LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.
New research from Oktaâs Auth0 access management platform found that credential stuffing and fraudulent registration attacks are on the rise.
The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.
Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup.
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
© 2025