Laden...
CSO Security Leadership
The day's top cybersecurity news and in-depth coverage
July 16, 2025
7 obsolete security practices that should be terminated immediately
Bad habits can be hard to break. Yet when it comes to security, an outdated practice is not only useless, but potentially dangerous.
Read more
How defenders use the dark web
Gathering threat intelligence, finding the perpetrators of cyber attacks and bringing down whole ransomware gangs are some of the ways the dark web is used by defenders.
AI poisoning and the CISOâs crisis of trust
The CISOâs role has always been to protect the organization from threats it does not yet understand. AI poisoning requires CISOs to rethink risk, architecture, relationships, and shared responsibility.
How phishers are weaponizing SVG images in zero-click, evasive campaigns
Seemingly harmless SVGs are packed with malicious JavaScript for a phishing redirect to actor-controlled URLs.
New Grok-4 AI breached within 48 hours using âwhisperedâ jailbreaks
Just days after launch, Elon Muskâs Grok-4 is compromised by researchers using a stealthy blend of Echo Chamber and Crescendo techniques, exposing deep flaws in AI safety systems.
CIO100: Grow, Connect, Lead
The event isn't just for the celebrated; it's for the driven. Join us in Scottsdale.
Register Now
© 2025