Laden...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
June 14, 2025
How to log and monitor PowerShell activity for suspicious scripts and commands
Attackers are increasingly abusing sanctioned tools to subvert automated defenses. Tracking your Windows fleetâs PowerShell use â especially consultant workstations â can provide early indications of nefarious activity.
Read more
FIN6 exploits HR workflows to breach corporate defenses
FIN6âs latest campaign combines professional rapport-building with cloud-hosted malware delivery to target sensitive HR operations.
8 things CISOs have learned from cyber incidents
CISOs who have been through cyber attacks share some of the enduring lessons that have changed their approach to cybersecurity.
Multicloud security automation is essential â but no silver bullet
Security experts say that automation can work, but works only if itâs implemented deliberately, monitored, and guided by humans.
Chrome extension privacy promises undone by hardcoded secrets, leaky HTTP
Chrome extensions were spotted leaking sensitive browser data like API keys, secrets, and tokens via unguarded HTTP transmissions and hardcoded spills.
CISOs reposition their roles for business leadership
As business risk takes center stage, CISOs are embracing elevated roles, transforming themselves into more integral business leaders for their organizations.
Cloud assets have 115 vulnerabilities on average â some several years old
The state of cloud security has reached a critical tipping point, as attackers increasingly turn attention to cloud environments that enterprises arenât doing enough to secure.
© 2025