CSOonline
csoonline.bsky.social
CSOonline
@csoonline.bsky.social
91 followers 22 following 240 posts
CSO empowers enterprise security leaders with critical insights to stay ahead of threats. Covering #cybersecurity from #riskmanagement to #networkdefense, we provide the expertise needed to defend against cybercrime.
Posts Media Videos Starter Packs
Is your perimeter having an identity crisis?

Your biggest security risk might now sound exactly like your boss. AI clones identities so well that only zero-trust thinking can keep you safe.

Get the full story by #FoundryExpert Contributor, Chris Novak: spr.ly/633247Eajp

North Korea-aligned threat actor BlueNoroff, also known under aliases APT38 and TA444, has resurfaced with two new campaigns dubbed “GhostCall” and “GhostHire,” targeting executives, Web3 developers, and blockchain professionals.

www.csoonline.com/article/4081...
BlueNoroff reemerges with new campaigns for crypto theft and espionage
GhostCall and GhostHire use fake investor meetings and bogus recruiter tests to deliver cross-platform malware to blockchain and Web3 professionals.
www.csoonline.com
Volvo’s data scare shows how fast — and smart — you need to move after a breach, especially when the problem starts with a vendor.

Catch the full write-up by #FoundryExpert Contributor, Justin Tolman: spr.ly/633267Dtse

#Cyberattacks
#DataBreach
#IncidentResponse
Reactive security is dead. The ROC proves the future belongs to those who fuse cyber and finance before the next breach hits.

Catch the full write-up by #FoundryExpert Contributor, Vishaal Hariprasad: spr.ly/633277Dtgt

#Cyberattacks
#Malware
#Ransomware
As organizations increasingly rely on services providers to help manage critical systems and security operations – from cloud infrastructure and data platforms to managed security and AI services – the risk of exposure also grows.
www.csoonline.com/article/4075...
Do CISOs need to rethink service provider risk?
CISOs are charged with managing a vast ecosystem of MSPs and MSSPs, but are the usual processes fit for purpose as outsourced services become more complex and critical — and will AI force a rethink?
www.csoonline.com
Days after cybersecurity analysts warned enterprises against installing OpenAI’s new Atlas browser, researchers have discovered a vulnerability that allows attackers to infect systems with malicious code, granting themselves access privileges, or deploy malware. www.csoonline.com/article/4080...
Atlas browser exploit lets attackers hijack ChatGPT memory
OpenAI’s Atlas browser is under scrutiny after researchers demonstrated how attackers can hijack ChatGPT memory and execute malicious code, without leaving traditional malware traces.
www.csoonline.com
Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party attestation.

See what #FoundryExpert Contributor Michelle Buckner has to say: spr.ly/6332478dwG

#AccessControl
#Encryption
#ZeroTrust
Signal’s getting ahead of the quantum curve, adding new layers of encryption to keep your chats safe from tomorrow’s supercomputers.

Get the full story by #FoundryExpert Contributor, Sunil Gentyala: spr.ly/63321AhYfb

#Encryption #Security
Detection’s not defense — if you can’t act in five minutes, you’re already losing the cyber war.

Get the full story by #FoundryExpert Contributor, Sean Heuer: spr.ly/63325AhYyJ

#CloudSecurity #CyberAttacks
Although one in four security leaders find themselves replaced after a ransomware attack, for example, other CISOs are finding incident-hardened experiences — with transparent and successful outcomes — to be increasingly sought after in the hiring market.

www.csoonline.com/article/4074...
Why must CISOs slay a cyber dragon to earn business respect?
Security leaders and industry experts weigh in on the complex calculus of CISOs’ internal clout.
www.csoonline.com
Researchers at Edera say they have uncovered a critical boundary-parsing bug, dubbed TARmageddon (CVE-2025-62518), in the popular async-tar Rust library. And not only is it in this library, but also in its many forks, including the widely used tokio-tar.
www.csoonline.com/article/4077...
Serious vulnerability found in Rust library
Hole in the TAR library and its forks could lead to remote code execution.
www.csoonline.com
Security researchers warn that MCP-based AI workflows can be vulnerable to malicious prompt injection attacks if session ID management was implemented insecurely on the MCP servers facilitating the connection. www.csoonline.com/article/4077...
Prompt hijacking puts MCP-based AI workflows at risk
An AI version of session hijacking can lead to attackers injecting malicious prompts into legitimate MCP communications.
www.csoonline.com
Most GenAI pilots flop, but with better security, oversight and smart integration, enterprises can finally turn experiments into real impact.

Get expert perspective from #FoundryExpert Contributor, Virendra Singh Panwar spr.ly/63323A7LEL

#Privacy #APIs
Privacy Sandbox, Google’s attempt to create an alternative to cookies, looks like it has reached the end of the line. The company has announced that it is discontinuing 11 Privacy Sandbox technologies — pretty much the entire gamut.
www.csoonline.com/article/4076...
Google kills its cookie killer
Privacy Sandbox discontinues most of its core technologies.
www.csoonline.com
As ransomware attacks accelerate in speed and sophistication, 38% of security leaders rank AI-enabled ransomware as their top concern — the most frequently cited worry about AI-related security issues according to CSO’s new 2025 Security Priorities study. www.csoonline.com/article/4075...
AI-enabled ransomware attacks: CISO’s top security concern — with good reason
New surveys from CSO and CrowdStrike reveal growing fears that generative AI is accelerating ransomware attacks while defenders rush to harness the same technology to fight back.
www.csoonline.com
Everyone’s worried about AGI, but the real threat’s already here — bots with keys to the kingdom. Until we secure them, creds remain the weak spot.

Don’t miss the full story from #FoundryExpert Contributor, Marc Manzano: spr.ly/63327AAcNt

#Cyberattacks
#Cybercrime