Laden...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
June 30, 2025
Beyond CVE: The hunt for other sources of vulnerability intel
Were the CVE program to be discontinued, security teams would have a hard time finding one resource that would function with the same impact across the board. Here are current issues of relying on CVE and some existing options to look into.
Read more
Cybercriminals take malicious AI to the next level
Fraudsters are optimizing illicit models with underground datasets, while criminal vendors roll out increasingly sophisticated deepfake generation and prompt engineering services.
Microsoft hints at revoking access to the Windows kernel â eventually
A new Microsoft announcement suggests it has found a way to deliver kernel-level visibility and capabilities to apps running in user mode. Experts conclude a ban on kernel access for cybersecurity tools could be forthcoming.
The rise of the compliance super soldier: A new human-AI paradigm in GRC
AI is reshaping GRC, demanding a new kind of archetype â forward-operating professionals who don't just manage governance; they engineer it.
Donât trust that email: It could be from a hacker using your printer to scam you
New research reveals a simple way threat actors are using Microsoft 365 Direct Send to phish employees, without even having to steal credentials.
Some Brother printers have a remote code execution vulnerability, and they canât fix it
An authentication bypass vulnerability in the printers, hardcoded at the factory, can be chained with another flaw for remote code execution on affected devices.
© 2025