CSOonline Profile Banner
CSOonline Profile
CSOonline

@CSOonline

Followers
63K
Following
13K
Media
1K
Statuses
28K

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of growing threats & defend against cyberattacks.

New York City area
Joined March 2009
Don't wanna be here? Send us removal request.
@CSOonline
CSOonline
3 days
Blockchain: The Missing Link in Cloud Security. Cloud computing powers our digital world—but are we trusting it too much?.Sayali Paseband explores the fragile trust model behind cloud services and why blockchain’s transparency and decentralization offer a better path forward. A
Tweet media one
0
3
1
@CSOonline
CSOonline
11 hours
MCP is fueling agentic AI — and introducing new security risks.
0
0
1
@CSOonline
CSOonline
11 hours
AMD discloses new CPU flaws that can enable data leaks via timing attacks.
0
0
0
@CSOonline
CSOonline
1 day
Trend Micro flags BERT: A rapidly growing ransomware threat.
0
0
0
@CSOonline
CSOonline
1 day
Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures.
0
1
0
@CSOonline
CSOonline
2 days
The trust crisis in the cloud…and why blockchain deserves a seat at the table.
0
0
2
@CSOonline
CSOonline
2 days
How a 12-year-old bug in Sudo is still haunting Linux users.
0
0
0
@CSOonline
CSOonline
3 days
Ingram Micro confirms ransomware attack after days of downtime.
0
0
2
@CSOonline
CSOonline
3 days
NightEagle hackers exploit Microsoft Exchange flaw to spy on China’s strategic sectors.
0
0
2
@CSOonline
CSOonline
4 days
Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks.
0
3
3
@CSOonline
CSOonline
4 days
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems.
0
1
0
@CSOonline
CSOonline
5 days
5 multicloud security challenges — and how to address them.
0
1
3
@CSOonline
CSOonline
5 days
Third-party risk management: How to avoid compliance disaster.
1
1
7
@CSOonline
CSOonline
6 days
Cybersecurity in the supply chain: strategies for managing fourth-party risks.
0
0
1
@CSOonline
CSOonline
6 days
Verified, but vulnerable: Malicious extensions exploit IDE trust badges.
0
0
1
@CSOonline
CSOonline
7 days
Hardcoded root credentials in Cisco Unified CM trigger max-severity alert.
1
0
2
@CSOonline
CSOonline
7 days
Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang.
0
0
1
@CSOonline
CSOonline
8 days
Sixfold surge of ClickFix attacks threatens corporate defenses.
0
0
0
@CSOonline
CSOonline
8 days
North Korean crypto thieves deploy custom Mac backdoor.
0
1
1
@CSOonline
CSOonline
9 days
Download the ‘AI-ready data centers’ spotlight report.
1
0
1