CSOonline
csoonline.bsky.social
CSOonline
@csoonline.bsky.social
CSO empowers enterprise security leaders with critical insights to stay ahead of threats. Covering #cybersecurity from #riskmanagement to #networkdefense, we provide the expertise needed to defend against cybercrime.
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from dating apps Hinge, Match, OkCupid and Bumble. www.csoonline.com/article/4124...
ShinyHunters ramp up new vishing campaign with 100s in crosshairs
The group has released stolen data from Match.com, Bumble, and Panera Bread as part of what appears to be a SLSH campaign against high-value corporate targets.
www.csoonline.com
January 30, 2026 at 5:12 PM
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users to achieve remote code execution on affected instances.

www.csoonline.com/article/4124...
Critical RCE bugs expose the n8n automation platform to host‑level compromise
A JavaScript sandbox bug rated CVSS 9.9 enables attackers to bypass AST‑based protections, while a Python execution bypass affects internal‑mode deployments common in enterprise setups.
www.csoonline.com
January 29, 2026 at 3:53 PM
NIST is shifting from a broad, principle-based AI risk management framework toward more operationally grounded expectations, especially for systems that act without constant human oversight. www.csoonline.com/article/4123...
NIST’s AI guidance pushes cybersecurity boundaries
Emerging NIST guidance suggests that the long-standing practice of treating AI as “just software” for cybersecurity purposes is giving way to more novel approaches to managing AI risks.
www.csoonline.com
January 29, 2026 at 3:51 PM
Fortinet has disclosed a critical authentication bypass zero-day vulnerability affecting its FortiCloud single sign-on feature after the company took the emergency step of temporarily disabling the cloud authentication service globally to stop active exploitation.

www.csoonline.com/article/4123...
Critical FortiCloud SSO zero‑day forces emergency service disablement at Fortinet
CISA added the flaw to its KEVs catalog as Fortinet warned that patches for most affected versions remain “upcoming,” even though vulnerable devices can no longer use cloud SSO until upgraded.
www.csoonline.com
January 28, 2026 at 2:17 PM
The most consequential delegation decisions being made today are not primarily about people. They are about authority moving into systems.

www.csoonline.com/article/4123...
Delegation is a risk decision every leader makes, not an ops choice
Why AI systems, personal agents, and agent-to-agent interactions are reshaping accountability before leaders notice.
www.csoonline.com
January 28, 2026 at 1:43 PM
AI-fueled attacks can transform an innocuous webpage into a customed phishing page. The attacks, revealed in a research from Palo Alto Networks’ Unit 42, are clever in how they combine various obfuscation techniques. www.csoonline.com/article/4123...
AI-powered polymorphic attack lures victims to phishing webpages
A new breed of malware uses various dynamic techniques to avoid detection and create customized phishing webpages.
www.csoonline.com
January 28, 2026 at 1:26 PM
Microsoft is warning admins of an Office security bypass zero day vulnerability that can be triggered simply by a user opening a document. The flaw is currently being actively exploited.

www.csoonline.com/article/4123...
Fixes released for a serious Microsoft Office zero-day flaw
The fixes for Office 2021 are automatic, but for Office 2016 and Office 2019, they must be applied manually.
www.csoonline.com
January 28, 2026 at 1:25 PM
AI fatigue is real, and it is slowing security teams at the worst possible moment. But governance is still within reach.
Jason Fruge maps out the steps CISOs can take today.

Explore: spr.ly/63320hB99m

#FoundryExpert
January 27, 2026 at 10:26 PM
CISA has released a new advisory mapping post-quantum cryptography (PQC) standards to common enterprise hardware and software categories, giving CIOs and security teams an early reference for evaluating quantum-safe technology readiness. www.csoonline.com/article/4122...
CISA releases technology readiness list for post-quantum cryptography
CISA has released a category-level inventory of hardware, software, and cryptography standards tied to post-quantum cryptography (PQC).
www.csoonline.com
January 27, 2026 at 1:55 PM
Besides the overall feeling of near inevitability of attack, security chiefs acknowledge that various challenges keep them from boosting their overall security posture and feeling more confident in their ability to block or respond to attacks.

www.csoonline.com/article/4117...
4 issues holding back CISOs’ security agendas
58% of CISOs believe their organization is unprepared to respond to a cyberattack. Cyber execs and experts shed light on common strategy issues, providing advice on how to address them.
www.csoonline.com
January 27, 2026 at 1:53 PM
PC makers “are already signaling price increases across the board and likely memory spec downgrades, especially in entry-level devices,” Rishi Padhi, principal analyst at Gartner, tells Computerworld.

www.computerworld.com/article/4121...
Enterprise PC upgrades in 2026: Higher prices, worse configurations
CPU and memory shortages, tariffs, and a focus on higher-end devices will make low-cost laptops offering decent performance nearly impossible to find.
www.computerworld.com
January 27, 2026 at 1:06 PM
A little light Friday news and some reassurance that hackers are flawed humans just like the rest of us. www.csoonline.com/article/4121...
Ransomware gang’s slip-up led to data recovery for 12 US firms
The discovery of artifacts from backup software used by the INC gang helped get encrypted data back.
www.csoonline.com
January 23, 2026 at 4:06 PM
Reposted by CSOonline
“Some of the challenges CIOs face include losing top-tier talent, limiting the pool of candidates available for hire, and damaging company culture, with a team filled with resentment,” Lacey Kaelani, CEO at job search engine Metaintro, tells CIO.com's Grant Gross. www.cio.com/article/4119...
Work-from-office mandate? Expect top talent turnover, culture rot
Organizations requiring IT workers to commute to an office need to ground decisions in value creation, focus on data-driven results, and avoid badge-swipe metrics, employment experts say.
www.cio.com
January 22, 2026 at 2:04 PM
High CVSS scores feel decisive, until attacks bypass them entirely.

Read Henry Sienkiewicz on why prioritization must go beyond the number and focus on how vulnerabilities actually spread: spr.ly/63325CAOOl

Context changes everything.

#FoundryExpert #CyberSecurity #RiskManagement
January 21, 2026 at 11:15 PM
spr.ly/63322CfuzK
Why identity is now the only security boundary

Firewalls still exist, but breaches keep happening. Ashish Mishra explains why identity, not network location, is now the primary security perimeter enterprises must defend.

#FoundryExpert #IdentitySecurity
January 20, 2026 at 10:10 PM
A massive surge in attacks on the npm ecosystem over the past year reveals a stark shift in the software supply‑chain threat landscape.

www.csoonline.com/article/4117...
From typos to takeovers: Inside the industrialization of npm supply chain attacks
A dramatic spike in npm-focused intrusions shows how attackers have shifted from opportunistic typosquatting to systematic, credential-driven supply chain compromises — exploiting CI systems, maintain...
www.csoonline.com
January 15, 2026 at 4:45 PM
A critical command injection issue in Fortinet FortiSIEM has been disclosed along with public exploit code, and researchers claim attackers could have been remotely achieving unauthenticated root access to the SIEM platform for nearly three years. www.csoonline.com/article/4117...
Researchers warn of long‑running FortiSIEM root exploit vector as new CVE emerges
The latest phMonitor vulnerability continues a multiyear pattern of unauthenticated command‑injection flaws in Fortinet’s SIEM platform.
www.csoonline.com
January 15, 2026 at 4:42 PM
spr.ly/63329CLBZf

The federal playbook is written and funded, but execution is stalling. Kevin Powers breaks down why local jurisdictions must move now to secure critical systems before attackers exploit the gaps.

#FoundryExpert #CriticalInfrastructure #CyberLeadership
January 14, 2026 at 10:24 PM
spr.ly/63323CL6XW
Iran’s internet shutdown may be a rare gift to defenders. Evan Schuman reports how the blackout isolates government traffic, making it easier to fingerprint state actors and map their digital paths before the window closes.

#CSONews #ThreatIntel #Cyberespionage
January 14, 2026 at 9:54 PM
The near-total internet blackout imposed by the Iranian government starting January 8, reportedly due to a crackdown on protesters, may offer a rare opportunity for cybersecurity analysts to track Iranian state actors. www.csoonline.com/article/4116...
Iran’s partial internet shutdown may be a windfall for cybersecurity intel
With only government agencies allowed internet access, the signal to noise ratio in that country is flipped, which could allow digital fingerprinting of the key paths that Iranian state actors use.
www.csoonline.com
January 14, 2026 at 8:49 PM
Power-hungry AI data centers have been facing backlash across the US for skyrocketing power usage and utility rates.

Microsoft is angling to get ahead of this with its newly-articulated Community-First AI Infrastructure strategy. www.networkworld.com/article/4116...
Microsoft tells communities it will ‘pay its way’ as AI data center resource usage sparks backlash
The company has unveiled a community-first AI infrastructure strategy promising no increases in local power or water costs, highlighting the mounting pressure on tech companies to balance AI growth wi...
www.networkworld.com
January 14, 2026 at 1:49 PM
spr.ly/63326CxxLY
Alerts are not the answer. Sunil Gentyala reveals why software supply chain risk and running systems demand a new approach to application security.

#FoundryExpert #AppSec #CyberSecurity
January 13, 2026 at 9:20 PM
spr.ly/63321CxoMN
AI agents are becoming trusted decision-makers—but attackers are already exploiting them. Keith Shaw and Michael Bargury reveal why no AI agent is fully secure and what you must do now. Watch the episode.

#TodayinTech #AIsecurity #CyberRisk
January 13, 2026 at 6:56 PM
Blind spots are multiplying as AI reshapes enterprise security. Are you seeing the full picture—or missing critical risks? Joan Goodchild reveals how CSOs can close gaps without adding tools. Read now.

spr.ly/63321CxgAP
#Sponsored #CyberSecurity #OpenText @opentext.bsky.social
January 13, 2026 at 5:29 PM