🏳️CSO Online | Security at the speed of business

Website faviconcsoonline.com

CSO delivers the critical information about trends, practices, and products enterprise security leaders need to defend against criminal cyberattacks and other threats.

[

feature

### The dirty dozen: 12 worst ransomware groups active today

Ransomware is on the rise across all industries. Here are the criminal operations cybersecurity professionals must be aware of.

By John Leyden

05 Mar 202511 mins

Ransomware

](https://www.csoonline.com/article/3838121/the-dirty-dozen-12-worst-ransomware-groups-active-today.html)

[

feature

### 7 key trends defining the cybersecurity market today

By Neal Weinberg

04 Mar 20259 mins

Intrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture Capital

](https://www.csoonline.com/article/3829666/7-key-trends-defining-the-cybersecurity-market-today.html)

[

feature

### Why cyber attackers are targeting your solar energy systems — and how to stop them

By Michael Nadeau

03 Mar 202513 mins

Critical InfrastructureSecurityUtilities Industry

](https://www.csoonline.com/article/3829736/why-attackers-target-companys-solar-energy-system-and-how-to-stop-them.html)

[

opinion

### Microsoft pushes a lot of products on users, but here’s one cybersecurity can embrace

By Susan Bradley

05 Mar 20256 mins

Access ControlData and Information SecurityWindows Security

](https://www.csoonline.com/article/3836778/microsoft-pushes-a-lot-of-products-on-users-but-heres-one-cybersecurity-can-embrace.html)

[

news

### Manufacturers still poorly prepared for cyberattacks as IT/OT converge

By Julia Mutzbauer

04 Mar 20253 mins

Manufacturing IndustrySecurity

](https://www.csoonline.com/article/3835943/cyber-attacks-manufacturing-industry-still-poorly-prepared.html)

[

news

### VMware ESXi gets critical patches for in-the-wild virtual machine escape attack

By Lucian Constantin

04 Mar 20254 mins

SecurityZero-Day Vulnerabilities

](https://www.csoonline.com/article/3837874/vmware-esxi-gets-critical-patches-for-in-the-wild-virtual-machine-escape-attack.html)

[

news

### CISOs should address identity management 'as fast as they can’ says CrowdStrike exec

By Howard Solomon

03 Mar 20255 mins

CyberattacksSecurity

](https://www.csoonline.com/article/3836917/cisos-should-address-identity-management-as-fast-as-they-can-says-crowdstrike-exec.html)

[

news

### US Cybercom, CISA retreat in fight against Russian cyber threats: reports

By Cynthia Brumfield

03 Mar 20256 mins

CyberattacksGovernment ITRansomware

](https://www.csoonline.com/article/3836775/us-cybercom-cisa-retreat-in-fight-against-russian-cyber-threats-reports-2.html)

[

feature

### Download the AI Risk Management Enterprise Spotlight

By CSOonline.com and CIO.com staff

03 Mar 20251 min

Risk Management

](https://us.resources.csoonline.com/resources/form?placement_id=53a519e1-60f7-47d5-88e0-f8512261f2e8&brand_id=32&locale_id=1)

More security news

------------------

[

news

### Badbox Android botnet disrupted through coordinated threat hunting

Human Security, in collaboration with Google, Shadowserver and others, has sinkholed C2 operations affecting 500,000 infected machines.

By Shweta Sharma

06 Mar 2025 4 mins

Android SecuritySecurity

](https://www.csoonline.com/article/3840157/badbox-android-botnet-disrupted-through-coordinated-threat-hunting.html)

[

news analysis

### 60% of cybersecurity pros looking to change employers

High salaries are not enough to discourage cybersecurity workers — including functional leaders — from keeping an eye out for better jobs in a competitive talent market.

By John Leyden

06 Mar 2025 5 mins

CareersIT Leadership

](https://www.csoonline.com/article/3839266/60-of-cybersecurity-pros-looking-to-change-employers.html)

[

opinion

### The risks of standing down: Why halting US cyber ops against Russia erodes deterrence

The threat from Russian bad actors is real; if the US government is halting offensive operations, it may fall to the private sector to take up the cause of disruption, argues Christopher Whyte.

By Christopher Whyte

06 Mar 2025 8 mins

Advanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management

](https://www.csoonline.com/article/3839098/the-risks-of-standing-down-why-halting-us-cyber-ops-against-russia-erodes-deterrence.html)

[

news

### Ransomware goes postal: US healthcare firms receive fake extortion letters

Fraudsters reportedly demanded up to $350,000 to cover up a fictitious data breach — but how can CSOs tell fake attacks from real ones in cybercrime’s hall of mirrors?

By John E. Dunn

05 Mar 2025 6 mins

RansomwareSecurity

](https://www.csoonline.com/article/3839190/ransomware-goes-postal-us-healthcare-firms-receive-fake-extortion-letters.html)

[

news

### Critical vulnerabilities expose network security risks in Keysight's infrastructure

Multiple security flaws in network packet broker devices could lead to code execution and data compromise.

By Gyana Swain

05 Mar 2025 4 mins

SecurityVulnerabilities

](https://www.csoonline.com/article/3838980/critical-vulnerabilities-expose-network-security-risks-in-keysights-infrastructure.html)

[

news

### Chinese cyber espionage growing across all industry sectors

New and expanding China-backed threat groups are pushing a broader cyber strategy, likely with eventual reunification with Taiwan in mind, CrowdStrike security researchers say.

By Lucian Constantin

05 Mar 2025 6 mins

Advanced Persistent ThreatsCyberattacksThreat and Vulnerability Management

](https://www.csoonline.com/article/3838331/chinese-cyber-espionage-growing-across-all-industry-sectors-2.html)

[

news

### Polyglot files used to spread new backdoor

Proofpoint reports that a threat actor has used the tactic against critical infrastructure firms in the UAE, warns CISOs to watch for it elsewhere.

By Howard Solomon

04 Mar 2025 5 mins

MalwarePhishing

](https://www.csoonline.com/article/3837964/polyglot-files-used-to-spread-new-backdoor.html)

[

news

### Misconfigured access management systems expose global enterprises to security risks

Widespread AMS vulnerabilities threaten physical and data security across key industries.

By Gyana Swain

04 Mar 2025 4 mins

Access ControlIdentity and Access ManagementSecurity

](https://www.csoonline.com/article/3837531/misconfigured-access-management-systems-expose-global-enterprises-to-security-risks.html)

[

news analysis

### Ransomware access playbook: What Black Basta’s leaked logs reveal

Analyzing leaked internal communication logs, security researchers are piecing together how one of the most notorious ransomware groups infiltrates its victims.

By Lucian Constantin

03 Mar 2025 6 mins

Ransomware

](https://www.csoonline.com/article/3836040/ransomware-access-playbook-what-black-bastas-leaked-logs-reveal.html)

[

news

### Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards

The civil suit against four members of Storm-2139 underscores an emerging trend that blends stolen LLM credentials and AI jailbreaking to reap financial gains for cybercriminals and losses for companies they exploit.

By Lucian Constantin

28 Feb 2025 4 mins

CybercrimeGenerative AIThreat and Vulnerability Management

](https://www.csoonline.com/article/3835936/microsoft-files-lawsuit-against-llmjacking-gang-that-bypassed-ai-safeguards.html)

[

feature

### What is zero trust? The security model for a distributed and risky era

A zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach.

By Josh Fruhlinger

28 Feb 2025 10 mins

Access ControlIdentity and Access ManagementZero Trust

](https://www.csoonline.com/article/564201/what-is-zero-trust-a-model-for-more-effective-security.html)

[

feature

### The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

By CSO Staff

28 Feb 2025 10 mins

Application SecurityEventsTechnology Industry

](https://www.csoonline.com/article/559539/the-cso-guide-to-top-security-conferences.html)

Show more

Show less

Explore a topic

---------------

*   [Generative AI](https://www.csoonline.com/generative-ai/)

*   [Application Security](https://www.csoonline.com/application-security/)

*   [Business Continuity](https://www.csoonline.com/business-continuity/)

*   [Business Operations](https://www.csoonline.com/business-operations/)

*   [Careers](https://www.csoonline.com/careers/)

*   [Cloud Security](https://www.csoonline.com/cloud-security/)

*   [Compliance](https://www.csoonline.com/compliance/)

*   [Critical Infrastructure](https://www.csoonline.com/critical-infrastructure/)

*   [Cybercrime](https://www.csoonline.com/cybercrime/)

*   [Identity and Access Management](https://www.csoonline.com/identity-and-access-management/)

*   [Industry](https://www.csoonline.com/industry/)

*   [IT Leadership](https://www.csoonline.com/it-leadership/)

*   [Network Security](https://www.csoonline.com/network-security/)

*   [Physical Security](https://www.csoonline.com/physical-security/)

*   View all topics

Browse all topics and categories below.

### CSO Smart Answers

Smart Answers is a chatbot tool designed to help you discover content, answer questions, and go deep on the topics that matter to you. [Learn more](/smart-answers)

 Ask

[](https://www.csoonline.com/risk-management/)

Popular topics

--------------

### Generative AI

[

news

### AI can kill banks: Cybersecurity’s disinformation gap

By Florian Maier

24 Feb 2025 2 mins

Financial Services IndustryGenerative AISecurity

](https://www.csoonline.com/article/3829738/ai-can-kill-banks.html)

[

opinion

### How to prevent AI-based data incidents

By Volker Sommer

19 Feb 2025 4 mins

Data BreachGenerative AISecurity

](https://www.csoonline.com/article/3827114/how-to-prevent-ai-based-data-incidents.html)

[

news

### Hacker allegedly puts massive OmniGPT breach data for sale on the dark web

By Shweta Sharma

12 Feb 2025 3 mins

Data BreachGenerative AI

](https://www.csoonline.com/article/3822911/hacker-allegedly-puts-massive-omnigpt-breach-data-for-sale-on-the-dark-web.html)

[View topic](https://www.csoonline.com/generative-ai/)

### Cybercrime

[

news

### Fake captcha attacks are increasing, say experts

By Howard Solomon

20 Feb 2025 6 mins

CyberattacksCybercrimeMalware

](https://www.csoonline.com/article/3829416/fake-captcha-attacks-are-increasing-say-experts.html)

[

news

### Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects

By Lucian Constantin

11 Feb 2025 3 mins

CybercrimeRansomware

](https://www.csoonline.com/article/3822338/authorities-seize-phobos-and-8base-ransomware-servers-arrest-4-suspects.html)

[

news

### Police arrest teenager suspected of hacking NATO and numerous Spanish institutions

By Computerworld España

06 Feb 2025 2 mins

CybercrimeSecurity

](https://www.csoonline.com/article/3818751/police-arrest-cybercriminal-who-hacked-nato-and-numerous-spanish-institutions.html)

[View topic](https://www.csoonline.com/cybercrime/)

### Careers

[

feature

### Beyond the paycheck: What cybersecurity professionals really want

By Aimee Chanthadavong

12 Feb 2025 9 mins

CSO and CISOCareersIT Training

](https://www.csoonline.com/article/3813922/beyond-the-paycheck-what-cybersecurity-professionals-really-want.html)

[

events promotionSponsored by CSO Events

### CSO Award and Hall of Fame Nominations Open Now

By CSO Events

11 Feb 2025 3 mins

CareersIT LeadershipSecurity

](https://www.csoonline.com/article/1287827/submit-now-cso-hall-of-fame-nominations-open-for-first-time.html)

[

feature

### CISOs embrace rise in prominence — with broader business authority

By Esther Shein

13 Jan 2025 11 mins

Business IT AlignmentCSO and CISOIT Strategy

](https://www.csoonline.com/article/3626973/cisos-embrace-rise-in-prominence-with-broader-business-authority.html)

[View topic](https://www.csoonline.com/careers/)

### IT Leadership

[

opinion

### What CISOs need from the board: Mutual respect on expectations

By David Gee

26 Feb 2025 6 mins

Business IT AlignmentCSO and CISOCompliance

](https://www.csoonline.com/article/3829678/what-cisos-need-from-the-board-mutual-expectations-respect.html)

[

feature

### How to create an effective incident response plan

By Bob Violino

25 Feb 2025 11 mins

IT LeadershipIncident ResponseSecurity

](https://www.csoonline.com/article/3829684/how-to-create-an-effective-incident-response-plan.html)

[

feature

### Strategic? Functional? Tactical? Which type of CISO are you?

By Mary K. Pratt

24 Feb 2025 9 mins

CSO and CISOHuman ResourcesSecurity Practices

](https://www.csoonline.com/article/3830379/strategic-functional-tactical-which-type-of-ciso-are-you.html)

[View topic](https://www.csoonline.com/it-leadership/)

Upcoming Events

---------------

[

04/May-06/May

in-person event

### Work+ – The New Future of Work: AI, Emerging Tech & Where IT Can Lead

04 May 2025Loews Vanderbilt Hotel Nashville

EventsHuman Resources

](https://www.csoonline.com/event/3621252/work-the-new-future-of-work-ai-emerging-tech-where-it-can-lead-2.html)[

15/May

in-person event

### FutureIT Los Angeles

15 May 2025The Biltmore

Data and Information SecurityEvents

](https://event.ciofutureit.com/futureit-la-2025/)[

25/Jun

in-person event

### FutureIT Dallas

25 Jun 2025Union Station

Application SecurityArtificial IntelligenceEvents

](https://event.ciofutureit.com/futureit-dallas/)

[View all events](https://www.csoonline.com/events/)

In depth

--------

[

Feature

### Who owns your data? SaaS contract security, privacy red flags

Companies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.

By Andrada Fiscutean

27 Mar 202410 mins

Data and Information Security

](https://www.csoonline.com/article/2071601/who-owns-your-data-what-to-look-for-when-signing-a-new-saas-provider.html)

[Read the Article](https://www.csoonline.com/article/2071601/who-owns-your-data-what-to-look-for-when-signing-a-new-saas-provider.html)

Podcasts

--------

[

podcastsSponsored by Microsoft Security

### Strengthen and Streamline Your Security

This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.

4 episodes

Data and Information Security

](https://www.csoonline.com/podcasts/strengthen-streamline-security/)

*   [

    Ep. 03

    ### Episode 3: The Zero Trust Model

    25 Mar 202115 mins

    CSO and CISOMultifactor AuthenticationRemote Work

    ](https://www.csoonline.com/podcast/508641/episode-3-the-zero-trust-model.html)

*   [

    Ep. 04

    ### Episode 4: Reduce SOC burnout

    29 Mar 202115 mins

    CSO and CISOPhishingRemote Work

    ](https://www.csoonline.com/podcast/508640/episode-4-reduce-soc-burnout.html)

Show me more

------------

LatestArticlesPodcastsVideos

[

brandpost Sponsored by CyberNewsWire

### Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation

By Cyber NewsWire – Paid Press Release

05 Mar 20255 mins

CyberattacksSecurity

](https://www.csoonline.com/article/3838211/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation.html)

[

brandpost Sponsored by CyberNewsWire

### Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032

By Cyber NewsWire – Paid Press Release

03 Mar 20254 mins

CyberattacksSecurity

](https://www.csoonline.com/article/3837127/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032-2.html)

[

how-to

### Download the UEM vendor comparison chart, 2025 edition

By Bob Violino and vpotter

03 Mar 20251 min

Endpoint ProtectionEnterprise Buyer’s GuidesMobile Security

](https://us.resources.csoonline.com/resources/download-our-unified-endpoint-management-uem-vendor-comparison-chart-2/)

[

podcast

### CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers

12 Feb 202527 mins

Security

](https://www.csoonline.com/podcast/3823540/cso-executive-sessions-how-cybersecurity-impacts-company-ratings-a-fey-factor-for-investors-and-consumers.html)

[

podcast

### CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe

07 Aug 202417 mins

CSO and CISO

](https://www.csoonline.com/podcast/3484298/cso-executive-sessions-guardians-of-the-games-how-to-keep-the-olympics-and-other-major-events-cyber-safe.html)

[

podcast

### CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)

17 Jul 202417 mins

CSO and CISO

](https://www.csoonline.com/podcast/2518505/cso-executive-session-india-with-dr-susil-kumar-meher-head-health-it-aiims-new-delhi.html)

[

video

### CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers

12 Feb 202527 mins

Security

](https://www.csoonline.com/video/3823524/cso-executive-sessions-how-cybersecurity-impacts-company-ratings-a-fey-factor-for-investors-and-consumers.html)

[

video

### CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe?

26 Jan 202518 mins

Security

](https://www.csoonline.com/video/3810004/cso-executive-sessions-how-should-software-solution-providers-keep-themselves-and-their-enterprise-clients-safe.html)

[

video

### CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2)

14 Nov 202415 mins

Critical InfrastructureIT GovernanceSupply Chain

](https://www.csoonline.com/video/3604971/cso-executive-sessions-open-source-institutes-eric-nguyen-on-supply-chain-risks-to-critical-infrastructure-part-2.html)

Sponsored Links

*   [Optimum Business | Ensure continuity with Business Connection Backup.](http://pubads.g.doubleclick.net/gampad/clk?id=6904536916&iu=/8456/IDG.G_B2B_CSOOnline.com)

*   [Secure AI by Design: Unleash the power of AI and keep applications, usage and data secure.](http://pubads.g.doubleclick.net/gampad/clk?id=6856108221&iu=/8456/IDG.G_B2B_CSOOnline.com)