Laden...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
January 31, 2025
How law enforcement agents gain access to encrypted devices
From traditional investigative methods to zero-day exploits, authorities have a range of techniques at their disposal, including digital searches at borders, which could present concerns for CISOs.
Read more
Sponsored by CyberArk: The rise of the machines and the growing AI identity attack surface
Attackers always use trust to their advantage. Three emerging techniques will soon allow them to target chatbots, virtual assistants, and other AI-powered machine identities directly.
DeepSeek leaks one million sensitive records in a major data breach
Chinese AI startup DeepSeek left critical user data and internal secrets unprotected, raising alarms over security risks in the AI industry.
FBI takes down Cracked.to and Nulled.to in a global law enforcement operation
FBI-led Operation Talent has reportedly seized domains of cracked.to, nulled.to, and others, the sites involved in cybercriminal activities.
North Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systems
Attackers from the Lazarus group used social engineering tactics to impersonate recruiters and gain access to systems in a well-coordinated campaign over several months.
What is Magecart? How this hacker group steals payment card data
Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.
The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual â CSO Onlineâs calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
© 2025