CSOonline
csoonline.bsky.social
CSOonline
@csoonline.bsky.social
CSO empowers enterprise security leaders with critical insights to stay ahead of threats. Covering #cybersecurity from #riskmanagement to #networkdefense, we provide the expertise needed to defend against cybercrime.
Combine structured frameworks with a customizable assessment model to turn strategic fog into prioritized remediation plans with the most value.

Get the full story by #FoundryExpert Contributor, Greg Neville:
spr.ly/633277kjWU

#Compliance #Security #RiskManagement

November 13, 2025 at 9:57 PM
Blending DDI with AI lets your network see, think and fight back faster — closing gaps before attackers even get in.

Get the full story by #FoundryExpert Contributor, Sunil Gentyala:
spr.ly/633247na2i

#Cyberattacks #DataBreach #Cybercrime

November 12, 2025 at 10:32 PM
Hackers are using AI agents to outsmart old logins. It’s time to ditch passwords and move to phishing-proof credentials like passkeys.

Don’t miss the full story from #FoundryExpert Contributor, Srinivasa Ravi Teja Peri: spr.ly/633227PN1m

#Authentication
#Passwords
#Phishing
November 7, 2025 at 8:38 PM
If your backups aren’t secure, your business isn’t either. Cybersecurity and continuity must now work hand in hand to keep you running.

Don’t miss the full story from #FoundryExpert Contributor, Omowunmi Makinde, MsC: spr.ly/633227PFTj

#Hacking #DataBreach
November 7, 2025 at 8:11 PM
The next pandemic won’t just test our biology — it’ll test whether our AI and cybersecurity can survive the storm.

Read the full piece from #FoundryExpert Contributor, Rama Devi Drakshpalli: spr.ly/633297OiqD

Enjoyed this story? ⬇️
spr.ly/633247Oiqy
November 6, 2025 at 10:26 PM
Cyberespionage groups are always looking for novel ways to establish covert and long-term persistent access to compromised systems. The latest example comes from a Russian APT group known as Curly COMrades. www.csoonline.com/article/4085...
Russian APT abuses Windows Hyper-V for persistence and malware execution
Recently documented Curly COMrades group bypasses traditional host-based EDR solutions by spinning up VMs with deceptive names using Windows’ own bare-metal hypervisor.
www.csoonline.com
November 6, 2025 at 2:50 PM
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been popular with threat groups as far back as 2017.

www.csoonline.com/article/4082...
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
Chinese UNC6384 campaign cleverly exploits Windows .LNK vulnerability, security company finds.
www.csoonline.com
November 6, 2025 at 2:44 PM
A critical remote-code execution (RCE) flaw in the widely used @react-native-community/cli (and its server API) lets attackers run arbitrary OS commands via the Metro development server, the default JavaScript bundler for React Native.

www.infoworld.com/article/4085...
Flaw in React Native CLI opens dev servers to attacks
The bug exposes the Metro development server to remote attacks, allowing arbitrary OS command execution on developer systems before a fix in version 20.0.0.
www.infoworld.com
November 6, 2025 at 2:43 PM
While tracking cyberattacks since last year, a Crowdstrike report also found that physical attacks and kidnappings have increased dramatically, particularly in Europe.

www.csoonline.com/article/4084...
Crowdstrike cybersecurity report highlights a spike in physical attacks on privileged users
Will CISOs now have to plan defenses for attackers with guns and knives? Said one consultant: “It is giving new meaning to 'brute force' attacks.”
www.csoonline.com
November 5, 2025 at 2:07 PM
Cyber threats don’t just hit your systems — they move through your connections. The ULM shows how those hidden links fuel real risk.

Don’t miss the full story from #FoundryExpert Contributor, Henry Sienkiewicz: spr.ly/633257HRR3

#ZeroTrust #Cyberattacks

October 31, 2025 at 8:34 PM
If your cyber dashboard looks like a tech manual, you’re flying blind. Real leaders measure resilience, not patch counts.

Here are the only metrics that matter to rewire your boardroom dashboard spr.ly/633227GG5O

#Analytics
#NetworkSecurity
#ROIandMetrics #FoundryExpert
October 30, 2025 at 9:48 PM
Is your perimeter having an identity crisis?

Your biggest security risk might now sound exactly like your boss. AI clones identities so well that only zero-trust thinking can keep you safe.

Get the full story by #FoundryExpert Contributor, Chris Novak: spr.ly/633247Eajp

October 29, 2025 at 7:41 PM
North Korea-aligned threat actor BlueNoroff, also known under aliases APT38 and TA444, has resurfaced with two new campaigns dubbed “GhostCall” and “GhostHire,” targeting executives, Web3 developers, and blockchain professionals.

www.csoonline.com/article/4081...
BlueNoroff reemerges with new campaigns for crypto theft and espionage
GhostCall and GhostHire use fake investor meetings and bogus recruiter tests to deliver cross-platform malware to blockchain and Web3 professionals.
www.csoonline.com
October 29, 2025 at 1:38 PM
The point at which quantum computers will be capable of breaking existing cryptographic algorithms — known as “Q-Day” — is approaching. Here's a rundown of the latest developments in post-quantum cryptography. www.csoonline.com/article/6548...
Notable post-quantum cryptography initiatives paving the way toward Q-Day
The security community is working toward cryptographic encryption that can withstand post-quantum threats as quantum’s ability to break existing algorithms looms. Here are the latest developments.
www.csoonline.com
October 29, 2025 at 1:35 PM
Is your organization ready to add agentic AI to its cybersecurity arsenal? Here are seven top use cases for your consideration.

www.csoonline.com/article/4079...
Top 7 agentic AI use cases for cybersecurity
Agentic AI is revolutionizing the IT world. Yet its greatest benefit may lie in strengthening cybersecurity.
www.csoonline.com
October 29, 2025 at 1:31 PM
Researchers at Varonis have discovered a turnkey plug-and-play toolkit, dubbed Atroposia, that even the least experienced threat actor can effectively use for just $200 a month.

www.csoonline.com/article/4080...
Atroposia malware kit lowers the bar for cybercrime — and raises the stakes for enterprise defenders
Researchers have discovered an inexpensive, full-featured malware-as-a-service kit combining vulnerability scanning, covert access, and DNS hijacking.
www.csoonline.com
October 29, 2025 at 1:28 PM
Volvo’s data scare shows how fast — and smart — you need to move after a breach, especially when the problem starts with a vendor.

Catch the full write-up by #FoundryExpert Contributor, Justin Tolman: spr.ly/633267Dtse

#Cyberattacks
#DataBreach
#IncidentResponse
October 28, 2025 at 11:08 PM
Reactive security is dead. The ROC proves the future belongs to those who fuse cyber and finance before the next breach hits.

Catch the full write-up by #FoundryExpert Contributor, Vishaal Hariprasad: spr.ly/633277Dtgt

#Cyberattacks
#Malware
#Ransomware
October 28, 2025 at 11:01 PM
As organizations increasingly rely on services providers to help manage critical systems and security operations – from cloud infrastructure and data platforms to managed security and AI services – the risk of exposure also grows.
www.csoonline.com/article/4075...
Do CISOs need to rethink service provider risk?
CISOs are charged with managing a vast ecosystem of MSPs and MSSPs, but are the usual processes fit for purpose as outsourced services become more complex and critical — and will AI force a rethink?
www.csoonline.com
October 28, 2025 at 12:34 PM
Roughly 70% of security executives believe internal conflicts during a crisis cause more problems than the cyberattack itself.

www.csoonline.com/article/4079...
70% of CISOs say internal conflicts more damaging than cyberattacks
CISO-CEO tension and unclear authority under duress are imperiling incident response. CISOs must establish not only clear response plans but also leadership alliances centered on business value, advis...
www.csoonline.com
October 28, 2025 at 12:30 PM
Days after cybersecurity analysts warned enterprises against installing OpenAI’s new Atlas browser, researchers have discovered a vulnerability that allows attackers to infect systems with malicious code, granting themselves access privileges, or deploy malware. www.csoonline.com/article/4080...
Atlas browser exploit lets attackers hijack ChatGPT memory
OpenAI’s Atlas browser is under scrutiny after researchers demonstrated how attackers can hijack ChatGPT memory and execute malicious code, without leaving traditional malware traces.
www.csoonline.com
October 28, 2025 at 12:26 PM
Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party attestation.

See what #FoundryExpert Contributor Michelle Buckner has to say: spr.ly/6332478dwG

#AccessControl
#Encryption
#ZeroTrust
October 27, 2025 at 9:02 PM
CISOs are dealing with rising risks, competing priorities, limited budgets, and more. Here, they cite the 10 issues that are top of mind today.

www.csoonline.com/article/4077...
The 10 biggest issues CISOs and cyber teams face today
From escalating AI-enabled threats to budgets that don’t scale alongside expanding threat landscapes, security leaders are reshaping their agendas to address several key long-standing and emerging con...
www.csoonline.com
October 27, 2025 at 12:23 PM
Signal’s getting ahead of the quantum curve, adding new layers of encryption to keep your chats safe from tomorrow’s supercomputers.

Get the full story by #FoundryExpert Contributor, Sunil Gentyala: spr.ly/63321AhYfb

#Encryption #Security
October 24, 2025 at 4:14 PM