News

CSO Online
csoonline.com > article > 4140221 > ai-powered-attack-kits-go-open-source-and-cyberstrikeai-may-be-just-the-beginning.html

AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning

2+ day, 3+ hour ago  (526+ words) AI is making it ever easier for bad actors to launch attacks, and a newly-identified open source platform, CyberStrikeAI, seems to be lowering the bar even further. The platform packages end-to-end attack automation into a single AI-native orchestration engine, and…...

CSO Online
csoonline.com > article > 4137580 > 7-factors-impacting-the-cyber-skills-gap.html

7 factors impacting the cyber skills gap

3+ day, 22+ hour ago  (854+ words) Individuals with strong cybersecurity skills are in high demand. That's no secret. What's most important is the fact that the shortage is preventing many enterprises from building sustainable cybersecurity talent pipelines. According to World Economic Forum statistics, only 14% of organizations…...

CSO Online
csoonline.com > article > 4138788 > security-hole-could-let-hackers-take-over-juniper-networks-ptx-core-routers.html

Security hole could let hackers take over Juniper Networks PTX core routers

6+ day, 12+ hour ago  (354+ words) Network admins with Juniper PTX series routers in their environments are being warned to patch immediately, because a newly-discovered critical vulnerability could lead to an unauthenticated threat actor running code with root privileges. This issue affects PTX routers running versions…...

CSO Online
csoonline.com > article > 4137880 > hacker-kompromittieren-immer-schneller.html

Hacker kompromittieren immer schneller

1+ week, 2+ day ago  (272+ words) Manfred Bremmer ist Editorial Manager der Marke COMPUTERWOCHE von Foundry in Deutschland. Nachdem er bereits w'hrend seines Studiums als freier Journalist f'r die CW t'tig war, stieg er Mitte 2001 fest als Online-Redakteur ein und blieb. Im Laufe der Jahre war…...

CSO Online
csoonline.com > article > 4136590 > hacker-knackt-600-firewalls-in-einem-monat-mit-ki.html

Hacker knackt 600 Firewalls in einem Monat – mit KI

1+ week, 2+ day ago  (239+ words) Bei dem Angriff wurden keine neuen Schwachstellen ausgenutzt " sondern alte Vers'umnisse bei Passwortsicherheit und Zugriffsschutz. Sicherheitsforscher von Amazon Web Services (AWS) berichten, dass es einem russischsprachigen Hacker gelungen ist, zwischen dem 11. Januar und dem 18. Februar 2026 mehr als 600 Fortigate-Firewalls zu kompromittieren....

CSO Online
csoonline.com > article > 4135199 > ki-und-komplexitat-als-brandbeschleuniger-fur-cyberkriminelle.html

KI und Komplexität als Brandbeschleuniger für Cyberkriminelle

2+ week, 27+ min ago  (393+ words) Der Einzug von KI hat den ben'tigten Zeitaufwand f'r Cyberattacken massiv verk'rzt, so dass menschliche Verteidiger nicht mehr mithalten k'nnen. So lautet das vielleicht wenig 'berraschende Ergebnis des 2026 Global Incident Response Report von Palo Alto Networks. F'r die Studie hat…...

CSO Online
csoonline.com > article > 4134419 > hackers-can-turn-grok-copilot-into-covert-command-and-control-channels-researchers-warn.html

Hackers can turn Grok, Copilot into covert command-and-control channels, researchers warn

2+ week, 1+ day ago  (676+ words) Enterprise security teams racing to enable generative AI tools may be overlooking a new risk: attackers can abuse web-based AI assistants such as Grok and Microsoft Copilot to quietly relay malware communications through domains that are often exempt from deeper…...

CSO Online
csoonline.com > article > 4131517 > the-democratization-of-ai-data-poisoning-and-how-to-protect-your-organization.html

The democratization of AI data poisoning and how to protect your organization

2+ week, 6+ day ago  (957+ words) John Bruggeman is the vCISO for CBTS and OnX, advising enterprise and midmarket organizations across the US and Canada on reducing cyber risk and strengthening security programs. With more than 25 years of experience across cybersecurity and IT, John works closely…...

CSO Online
csoonline.com > article > 4131789 > hackers-turn-bossware-against-the-bosses.html

Hackers turn bossware against the bosses

3+ week, 6+ hour ago  (665+ words) A threat actor is abusing an employee monitoring application and a remote monitoring and management platform in an attempt to deploy ransomware and steal cryptocurrency. According to researchers at Huntress, the unknown threat actor is leveraging NetworkLookout's Net Monitor for…...

CSO Online
csoonline.com > article > 4131506 > why-key-management-becomes-the-weakest-link-in-a-post-quantum-and-ai-driven-security-world.html

Why key management becomes the weakest link in a post-quantum and AI-driven security world

3+ week, 12+ hour ago  (812+ words) When people talk about cryptography, they usually talk about algorithms. RSA versus ECC. Classical versus post quantum. Encryption strength measured in bits and curves. In practice, none of that matters unless keys are created, stored, rotated and retired correctly. The…...