[
feature
### The dirty dozen: 12 worst ransomware groups active today
Ransomware is on the rise across all industries. Here are the criminal operations cybersecurity professionals must be aware of.
By John Leyden
05 Mar 202511 mins
Ransomware
](https://www.csoonline.com/article/3838121/the-dirty-dozen-12-worst-ransomware-groups-active-today.html)
[
feature
### 7 key trends defining the cybersecurity market today
By Neal Weinberg
04 Mar 20259 mins
Intrusion Detection SoftwareSecurity Information and Event Management SoftwareVenture Capital
](https://www.csoonline.com/article/3829666/7-key-trends-defining-the-cybersecurity-market-today.html)
[
feature
### Why cyber attackers are targeting your solar energy systems — and how to stop them
By Michael Nadeau
03 Mar 202513 mins
Critical InfrastructureSecurityUtilities Industry
](https://www.csoonline.com/article/3829736/why-attackers-target-companys-solar-energy-system-and-how-to-stop-them.html)
[
opinion
### Microsoft pushes a lot of products on users, but here’s one cybersecurity can embrace
By Susan Bradley
05 Mar 20256 mins
Access ControlData and Information SecurityWindows Security
](https://www.csoonline.com/article/3836778/microsoft-pushes-a-lot-of-products-on-users-but-heres-one-cybersecurity-can-embrace.html)
[
news
### Manufacturers still poorly prepared for cyberattacks as IT/OT converge
By Julia Mutzbauer
04 Mar 20253 mins
Manufacturing IndustrySecurity
](https://www.csoonline.com/article/3835943/cyber-attacks-manufacturing-industry-still-poorly-prepared.html)
[
news
### VMware ESXi gets critical patches for in-the-wild virtual machine escape attack
By Lucian Constantin
04 Mar 20254 mins
SecurityZero-Day Vulnerabilities
](https://www.csoonline.com/article/3837874/vmware-esxi-gets-critical-patches-for-in-the-wild-virtual-machine-escape-attack.html)
[
news
### CISOs should address identity management 'as fast as they can’ says CrowdStrike exec
By Howard Solomon
03 Mar 20255 mins
CyberattacksSecurity
](https://www.csoonline.com/article/3836917/cisos-should-address-identity-management-as-fast-as-they-can-says-crowdstrike-exec.html)
[
news
### US Cybercom, CISA retreat in fight against Russian cyber threats: reports
By Cynthia Brumfield
03 Mar 20256 mins
CyberattacksGovernment ITRansomware
](https://www.csoonline.com/article/3836775/us-cybercom-cisa-retreat-in-fight-against-russian-cyber-threats-reports-2.html)
[
feature
### Download the AI Risk Management Enterprise Spotlight
By CSOonline.com and CIO.com staff
03 Mar 20251 min
Risk Management
](https://us.resources.csoonline.com/resources/form?placement_id=53a519e1-60f7-47d5-88e0-f8512261f2e8&brand_id=32&locale_id=1)
More security news
------------------
[
news
### Badbox Android botnet disrupted through coordinated threat hunting
Human Security, in collaboration with Google, Shadowserver and others, has sinkholed C2 operations affecting 500,000 infected machines.
By Shweta Sharma
06 Mar 2025 4 mins
Android SecuritySecurity
](https://www.csoonline.com/article/3840157/badbox-android-botnet-disrupted-through-coordinated-threat-hunting.html)
[
news analysis
### 60% of cybersecurity pros looking to change employers
High salaries are not enough to discourage cybersecurity workers — including functional leaders — from keeping an eye out for better jobs in a competitive talent market.
By John Leyden
06 Mar 2025 5 mins
CareersIT Leadership
](https://www.csoonline.com/article/3839266/60-of-cybersecurity-pros-looking-to-change-employers.html)
[
opinion
### The risks of standing down: Why halting US cyber ops against Russia erodes deterrence
The threat from Russian bad actors is real; if the US government is halting offensive operations, it may fall to the private sector to take up the cause of disruption, argues Christopher Whyte.
By Christopher Whyte
06 Mar 2025 8 mins
Advanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management
](https://www.csoonline.com/article/3839098/the-risks-of-standing-down-why-halting-us-cyber-ops-against-russia-erodes-deterrence.html)
[
news
### Ransomware goes postal: US healthcare firms receive fake extortion letters
Fraudsters reportedly demanded up to $350,000 to cover up a fictitious data breach — but how can CSOs tell fake attacks from real ones in cybercrime’s hall of mirrors?
By John E. Dunn
05 Mar 2025 6 mins
RansomwareSecurity
](https://www.csoonline.com/article/3839190/ransomware-goes-postal-us-healthcare-firms-receive-fake-extortion-letters.html)
[
news
### Critical vulnerabilities expose network security risks in Keysight's infrastructure
Multiple security flaws in network packet broker devices could lead to code execution and data compromise.
By Gyana Swain
05 Mar 2025 4 mins
SecurityVulnerabilities
](https://www.csoonline.com/article/3838980/critical-vulnerabilities-expose-network-security-risks-in-keysights-infrastructure.html)
[
news
### Chinese cyber espionage growing across all industry sectors
New and expanding China-backed threat groups are pushing a broader cyber strategy, likely with eventual reunification with Taiwan in mind, CrowdStrike security researchers say.
By Lucian Constantin
05 Mar 2025 6 mins
Advanced Persistent ThreatsCyberattacksThreat and Vulnerability Management
](https://www.csoonline.com/article/3838331/chinese-cyber-espionage-growing-across-all-industry-sectors-2.html)
[
news
### Polyglot files used to spread new backdoor
Proofpoint reports that a threat actor has used the tactic against critical infrastructure firms in the UAE, warns CISOs to watch for it elsewhere.
By Howard Solomon
04 Mar 2025 5 mins
MalwarePhishing
](https://www.csoonline.com/article/3837964/polyglot-files-used-to-spread-new-backdoor.html)
[
news
### Misconfigured access management systems expose global enterprises to security risks
Widespread AMS vulnerabilities threaten physical and data security across key industries.
By Gyana Swain
04 Mar 2025 4 mins
Access ControlIdentity and Access ManagementSecurity
](https://www.csoonline.com/article/3837531/misconfigured-access-management-systems-expose-global-enterprises-to-security-risks.html)
[
news analysis
### Ransomware access playbook: What Black Basta’s leaked logs reveal
Analyzing leaked internal communication logs, security researchers are piecing together how one of the most notorious ransomware groups infiltrates its victims.
By Lucian Constantin
03 Mar 2025 6 mins
Ransomware
](https://www.csoonline.com/article/3836040/ransomware-access-playbook-what-black-bastas-leaked-logs-reveal.html)
[
news
### Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards
The civil suit against four members of Storm-2139 underscores an emerging trend that blends stolen LLM credentials and AI jailbreaking to reap financial gains for cybercriminals and losses for companies they exploit.
By Lucian Constantin
28 Feb 2025 4 mins
CybercrimeGenerative AIThreat and Vulnerability Management
](https://www.csoonline.com/article/3835936/microsoft-files-lawsuit-against-llmjacking-gang-that-bypassed-ai-safeguards.html)
[
feature
### What is zero trust? The security model for a distributed and risky era
A zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach.
By Josh Fruhlinger
28 Feb 2025 10 mins
Access ControlIdentity and Access ManagementZero Trust
](https://www.csoonline.com/article/564201/what-is-zero-trust-a-model-for-more-effective-security.html)
[
feature
### The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
By CSO Staff
28 Feb 2025 10 mins
Application SecurityEventsTechnology Industry
](https://www.csoonline.com/article/559539/the-cso-guide-to-top-security-conferences.html)
Show more
Show less
Explore a topic
---------------
* [Generative AI](https://www.csoonline.com/generative-ai/)
* [Application Security](https://www.csoonline.com/application-security/)
* [Business Continuity](https://www.csoonline.com/business-continuity/)
* [Business Operations](https://www.csoonline.com/business-operations/)
* [Careers](https://www.csoonline.com/careers/)
* [Cloud Security](https://www.csoonline.com/cloud-security/)
* [Compliance](https://www.csoonline.com/compliance/)
* [Critical Infrastructure](https://www.csoonline.com/critical-infrastructure/)
* [Cybercrime](https://www.csoonline.com/cybercrime/)
* [Identity and Access Management](https://www.csoonline.com/identity-and-access-management/)
* [Industry](https://www.csoonline.com/industry/)
* [IT Leadership](https://www.csoonline.com/it-leadership/)
* [Network Security](https://www.csoonline.com/network-security/)
* [Physical Security](https://www.csoonline.com/physical-security/)
* View all topics
Browse all topics and categories below.
### CSO Smart Answers
Smart Answers is a chatbot tool designed to help you discover content, answer questions, and go deep on the topics that matter to you. [Learn more](/smart-answers)
Ask
[](https://www.csoonline.com/risk-management/)
Popular topics
--------------
### Generative AI
[
news
### AI can kill banks: Cybersecurity’s disinformation gap
By Florian Maier
24 Feb 2025 2 mins
Financial Services IndustryGenerative AISecurity
](https://www.csoonline.com/article/3829738/ai-can-kill-banks.html)
[
opinion
### How to prevent AI-based data incidents
By Volker Sommer
19 Feb 2025 4 mins
Data BreachGenerative AISecurity
](https://www.csoonline.com/article/3827114/how-to-prevent-ai-based-data-incidents.html)
[
news
### Hacker allegedly puts massive OmniGPT breach data for sale on the dark web
By Shweta Sharma
12 Feb 2025 3 mins
Data BreachGenerative AI
](https://www.csoonline.com/article/3822911/hacker-allegedly-puts-massive-omnigpt-breach-data-for-sale-on-the-dark-web.html)
[View topic](https://www.csoonline.com/generative-ai/)
### Cybercrime
[
news
### Fake captcha attacks are increasing, say experts
By Howard Solomon
20 Feb 2025 6 mins
CyberattacksCybercrimeMalware
](https://www.csoonline.com/article/3829416/fake-captcha-attacks-are-increasing-say-experts.html)
[
news
### Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects
By Lucian Constantin
11 Feb 2025 3 mins
CybercrimeRansomware
](https://www.csoonline.com/article/3822338/authorities-seize-phobos-and-8base-ransomware-servers-arrest-4-suspects.html)
[
news
### Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
By Computerworld España
06 Feb 2025 2 mins
CybercrimeSecurity
](https://www.csoonline.com/article/3818751/police-arrest-cybercriminal-who-hacked-nato-and-numerous-spanish-institutions.html)
[View topic](https://www.csoonline.com/cybercrime/)
### Careers
[
feature
### Beyond the paycheck: What cybersecurity professionals really want
By Aimee Chanthadavong
12 Feb 2025 9 mins
CSO and CISOCareersIT Training
](https://www.csoonline.com/article/3813922/beyond-the-paycheck-what-cybersecurity-professionals-really-want.html)
[
events promotionSponsored by CSO Events
### CSO Award and Hall of Fame Nominations Open Now
By CSO Events
11 Feb 2025 3 mins
CareersIT LeadershipSecurity
](https://www.csoonline.com/article/1287827/submit-now-cso-hall-of-fame-nominations-open-for-first-time.html)
[
feature
### CISOs embrace rise in prominence — with broader business authority
By Esther Shein
13 Jan 2025 11 mins
Business IT AlignmentCSO and CISOIT Strategy
](https://www.csoonline.com/article/3626973/cisos-embrace-rise-in-prominence-with-broader-business-authority.html)
[View topic](https://www.csoonline.com/careers/)
### IT Leadership
[
opinion
### What CISOs need from the board: Mutual respect on expectations
By David Gee
26 Feb 2025 6 mins
Business IT AlignmentCSO and CISOCompliance
](https://www.csoonline.com/article/3829678/what-cisos-need-from-the-board-mutual-expectations-respect.html)
[
feature
### How to create an effective incident response plan
By Bob Violino
25 Feb 2025 11 mins
IT LeadershipIncident ResponseSecurity
](https://www.csoonline.com/article/3829684/how-to-create-an-effective-incident-response-plan.html)
[
feature
### Strategic? Functional? Tactical? Which type of CISO are you?
By Mary K. Pratt
24 Feb 2025 9 mins
CSO and CISOHuman ResourcesSecurity Practices
](https://www.csoonline.com/article/3830379/strategic-functional-tactical-which-type-of-ciso-are-you.html)
[View topic](https://www.csoonline.com/it-leadership/)
Upcoming Events
---------------
[
04/May-06/May
in-person event
### Work+ – The New Future of Work: AI, Emerging Tech & Where IT Can Lead
04 May 2025Loews Vanderbilt Hotel Nashville
EventsHuman Resources
](https://www.csoonline.com/event/3621252/work-the-new-future-of-work-ai-emerging-tech-where-it-can-lead-2.html)[
15/May
in-person event
### FutureIT Los Angeles
15 May 2025The Biltmore
Data and Information SecurityEvents
](https://event.ciofutureit.com/futureit-la-2025/)[
25/Jun
in-person event
### FutureIT Dallas
25 Jun 2025Union Station
Application SecurityArtificial IntelligenceEvents
](https://event.ciofutureit.com/futureit-dallas/)
[View all events](https://www.csoonline.com/events/)
In depth
--------
[
Feature
### Who owns your data? SaaS contract security, privacy red flags
Companies looking to use SaaS solutions should involve the security team in the procurement process and pay attention to contract language.
By Andrada Fiscutean
27 Mar 202410 mins
Data and Information Security
](https://www.csoonline.com/article/2071601/who-owns-your-data-what-to-look-for-when-signing-a-new-saas-provider.html)
[Read the Article](https://www.csoonline.com/article/2071601/who-owns-your-data-what-to-look-for-when-signing-a-new-saas-provider.html)
Podcasts
--------
[
podcastsSponsored by Microsoft Security
### Strengthen and Streamline Your Security
This podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We’ll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.
4 episodes
Data and Information Security
](https://www.csoonline.com/podcasts/strengthen-streamline-security/)
* [
Ep. 03
### Episode 3: The Zero Trust Model
25 Mar 202115 mins
CSO and CISOMultifactor AuthenticationRemote Work
](https://www.csoonline.com/podcast/508641/episode-3-the-zero-trust-model.html)
* [
Ep. 04
### Episode 4: Reduce SOC burnout
29 Mar 202115 mins
CSO and CISOPhishingRemote Work
](https://www.csoonline.com/podcast/508640/episode-4-reduce-soc-burnout.html)
Show me more
------------
LatestArticlesPodcastsVideos
[
brandpost Sponsored by CyberNewsWire
### Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation
By Cyber NewsWire – Paid Press Release
05 Mar 20255 mins
CyberattacksSecurity
](https://www.csoonline.com/article/3838211/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation.html)
[
brandpost Sponsored by CyberNewsWire
### Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032
By Cyber NewsWire – Paid Press Release
03 Mar 20254 mins
CyberattacksSecurity
](https://www.csoonline.com/article/3837127/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032-2.html)
[
how-to
### Download the UEM vendor comparison chart, 2025 edition
By Bob Violino and vpotter
03 Mar 20251 min
Endpoint ProtectionEnterprise Buyer’s GuidesMobile Security
](https://us.resources.csoonline.com/resources/download-our-unified-endpoint-management-uem-vendor-comparison-chart-2/)
[
podcast
### CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers
12 Feb 202527 mins
Security
](https://www.csoonline.com/podcast/3823540/cso-executive-sessions-how-cybersecurity-impacts-company-ratings-a-fey-factor-for-investors-and-consumers.html)
[
podcast
### CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe
07 Aug 202417 mins
CSO and CISO
](https://www.csoonline.com/podcast/3484298/cso-executive-sessions-guardians-of-the-games-how-to-keep-the-olympics-and-other-major-events-cyber-safe.html)
[
podcast
### CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi)
17 Jul 202417 mins
CSO and CISO
](https://www.csoonline.com/podcast/2518505/cso-executive-session-india-with-dr-susil-kumar-meher-head-health-it-aiims-new-delhi.html)
[
video
### CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers
12 Feb 202527 mins
Security
](https://www.csoonline.com/video/3823524/cso-executive-sessions-how-cybersecurity-impacts-company-ratings-a-fey-factor-for-investors-and-consumers.html)
[
video
### CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe?
26 Jan 202518 mins
Security
](https://www.csoonline.com/video/3810004/cso-executive-sessions-how-should-software-solution-providers-keep-themselves-and-their-enterprise-clients-safe.html)
[
video
### CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2)
14 Nov 202415 mins
Critical InfrastructureIT GovernanceSupply Chain
](https://www.csoonline.com/video/3604971/cso-executive-sessions-open-source-institutes-eric-nguyen-on-supply-chain-risks-to-critical-infrastructure-part-2.html)
Sponsored Links
* [Optimum Business | Ensure continuity with Business Connection Backup.](http://pubads.g.doubleclick.net/gampad/clk?id=6904536916&iu=/8456/IDG.G_B2B_CSOOnline.com)
* [Secure AI by Design: Unleash the power of AI and keep applications, usage and data secure.](http://pubads.g.doubleclick.net/gampad/clk?id=6856108221&iu=/8456/IDG.G_B2B_CSOOnline.com)