
Third-party risk management is broken — but not beyond repair
Robust cybersecurity frameworks are critically important, and third-party risk management (TPRM) was once a central component […]

Shifting from Reactive to Proactive Cybersecurity Defense Strategy
In today’s digital landscape, the importance of adopting a proactive approach to cybersecurity, which involves predictive […]

Asana’s MCP AI connector could have exposed corporate data, CSOs warned
CSOs with Asana’s Model Context Protocol (MCP) server in their environment should scour their logs and […]

CSO30 Australia Awards 2025: Nominations deadline extended
Nominations are officially open for the 2025 CSO30 Australia Awards, celebrating the country’s most effective and […]

5 security secrets of elite defenders
Nation-state actors and well-funded criminal organizations employ advanced persistent threat (APT) methodologies designed specifically to evade […]

Critical flaw in AI agent dev tool Langflow under active exploitation
Researchers from security firm Trend Micro warn that a critical remote code execution vulnerability patched in […]

Overwhelmed by security alerts? XDR service providers offer a powerful solution
Cybersecurity professionals are under siege. In 2024, relentless cyberattacks (1636 per week on average) and soaring […]

OT Asset Discovery Using XDR: From Blind Spots to Full Visibility
Operational Technology (OT) environments are increasingly under pressure from evolving cyber threats. With digital transformation accelerating […]

Scania von Datenleck betroffen
Der Hersteller für Nutzfahrzeuge Scania wurde von Cyberkriminellen angegriffen. Art Konovalov – shutterstock.com Der schwedische Hersteller […]

WormGPT returns: New malicious AI variants built on Grok and Mixtral uncovered
Two new variants of WormGPT, the malicious large language model (LLM) from July 2023 that operated […]