News

CSO Online
csoonline.com > article > 4116527 > cisos-predictions-for-2026.html

CISO's predictions for 2026

CISO's predictions for 20261+ hour, 26+ min ago   (979+ words) Last year was defined by AI hype, new attack models, and intensifying global tensions. As 2026 begins, security teams are asking what the next phase will look like. Will AI continue to accelerate risk, or will controls and governance finally catch…...

CSO Online
csoonline.com > article > 4117454 > smarter-ddos-security-at-scale.html

Smarter DDoS security at scale

Smarter DDoS security at scale2+ day, 14+ hour ago   (167+ words) In today's digital landscape, encrypted traffic is the norm'not the exception. While encryption such as Transport Layer Security (TLS) 1.3 protects user privacy and data integrity, it also presents a growing challenge for security teams: How do you defend against threats…...

CSO Online
csoonline.com > article > 4117431 > netscout-recognized-for-leadership-in-network-detection-and-response.html

NETSCOUT recognized for leadership in network detection and response

NETSCOUT recognized for leadership in network detection and response2+ day, 14+ hour ago   (516+ words) We're proud to share that NETSCOUT has been recognized for industry-leading excellence in'network detection and response (NDR). This acknowledgment, from Quadrant Knowledge Solutions' 2025 SPARK Matrix" for NDR, highlights what our customers already know: NETSCOUT delivers unmatched visibility, precision, and forensic…...

CSO Online
csoonline.com > article > 4120997 > trivial-telnet-authentication-bypass-exposes-devices-to-complete-takeover.html

Trivial Telnet authentication bypass exposes devices to complete takeover

Trivial Telnet authentication bypass exposes devices to complete takeover3+ day, 2+ hour ago   (386+ words) Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability that allows attackers to bypass authentication. The Telnet remote access protocol has long been superseded by the more secure and encrypted SSH, but many…...

CSO Online
csoonline.com > article > 4121682 > fortinet-confirms-new-zero-day-attacks-against-customer-devices.html

Fortinet confirms new zero-day attacks against customer devices

Fortinet confirms new zero-day attacks against customer devices3+ day, 9+ hour ago   (490+ words) Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an unpatched issue to bypass authentication. The new attacks are different from a previous campaign seen in December that targeted two vulnerabilities related to FortiCloud…...

CSO Online
csoonline.com > article > 4120613 > actively-exploited-cisco-uc-bug-requires-immediate-version%e2%80%91specific-patching.html

Actively exploited Cisco UC bug requires immediate, version‑specific patching

Actively exploited Cisco UC bug requires immediate, version‑specific patching3+ day, 20+ hour ago   (587+ words) Cisco has released patches for a critical remote code execution vulnerability in its unified communications products that attackers are actively exploiting. The US Cybersecurity and Infrastructure Security Agency has added the flaw to its Known Exploited Vulnerabilities catalog, confirming the…...

CSO Online
csoonline.com > article > 4120607 > voidlink-malware-was-almost-entirely-made-by-ai.html

VoidLink malware was almost entirely made by AI

VoidLink malware was almost entirely made by AI3+ day, 20+ hour ago   (424+ words) VoidLink, the high-impact Linux malware framework disclosed last week, is back under scrutiny for claims that the bulk of its development was done by artificial intelligence (AI). According to the follow-up analysis from Check Point Research (CPR), which first disclosed…...

CSO Online
csoonline.com > article > 4120258 > misconfigured-demo-environments-are-turning-into-cloud-backdoors-to-the-enterprise.html

Misconfigured demo environments are turning into cloud backdoors to the enterprise

Misconfigured demo environments are turning into cloud backdoors to the enterprise4+ day, 1+ hour ago   (559+ words) Internal testing, product demonstrations, and security training are critical practices in cybersecurity, giving defenders and everyday users the tools and wherewithal to prevent and respond to enterprise threats. However, according to new research from Pentera Labs, when left in default…...

CSO Online
csoonline.com > article > 4120218 > 73-of-cisos-more-likely-to-consider-ai-enabled-security-solution.html

73% of CISOs more likely to consider AI-enabled security solution

73% of CISOs more likely to consider AI-enabled security solution4+ day, 4+ hour ago   (956+ words) CISO's are increasingly turning to AI-enabled security technologies to augment their organizations' cyber defense and extend the capabilities of their teams. According to Foundry's latest Security Priorities Study, 73% of security decision-makers are now more likely to consider a security solution…...

CSO Online
csoonline.com > article > 4120197 > oracle-releases-337-security-patches-including-fix-for-critical-apache-tika-flaw.html

Oracle releases 337 security patches, including fix for critical Apache Tika flaw

Oracle releases 337 security patches, including fix for critical Apache Tika flaw4+ day, 7+ hour ago   (557+ words) Oracle has handed security teams their first big patching workload of the year, with its latest quarterly update containing a hefty 337 security fixes across its product range, including 27 rated critical. This imposing number of patches won't surprise anyone whose job…...