News

CSO Online
csoonline.com > article > 4146915 > reco-targets-ai-agent-blind-spots-with-new-security-capability.html

Reco targets AI agent blind spots with new security capability

17+ hour, 4+ min ago  (393+ words) SaaS security platform Reco has decided to address the "agent sprawl" challenge from the increased adoption of AI-driven tools by enterprises. It argues that enterprises are faced with a security situation as numerous autonomous agents now traverse multiple systems, accessing…...

CSO Online
csoonline.com > article > 4146904 > bsi-moniert-software-sicherheit-im-gesundheitswesen-3.html

BSI moniert Software-Sicherheit im Gesundheitswesen

19+ hour, 26+ min ago  (120+ words) Daten zu Diagnosen und Behandlungen werden digital gespeichert und verarbeitet. Amtliche Sicherheitsexperten weisen auf Schwachstellen hin. Das Bundesamt f'r Sicherheit in der Informationstechnik (BSI) mahnt einen besseren Schutz sensibler Gesundheitsdaten in Computer-Anwendungen von Arztpraxen, Kliniken und in der Pflege an....

CSO Online
csoonline.com > article > 4146782 > clickfix-treibt-neue-infostealer-kampagnen-an.html

ClickFix treibt neue Infostealer-Kampagnen an

19+ hour, 40+ min ago  (174+ words) Auch die ClickFix-Taktiken entwickeln sich weiter. So identifizierte das Threat Intelligence Team von Microsoft eine Kampagne, bei der der klassische Ausf'hren-Dialog (Win+R) durch die Windows Terminal-App (Win+X) ersetzt wurde, um Befehle auszuf'hren. Betreiber von WordPress-Websites sollten sicherstellen, dass ihre Admin-Login-Bereiche…...

CSO Online
csoonline.com > article > 4146433 > can-you-prove-the-person-on-the-other-side-is-real.html

Can you prove the person on the other side is real?

2+ day, 17+ hour ago  (888+ words) In my role, I spend a lot of time thinking about what "trust" means when money, grief and identity collide. By 2026, the real competition in our space won't be who automates fastest or offers the most AI features. It will…...

CSO Online
csoonline.com > article > 4146429 > cybersecurity-and-privacy-priorities-for-2026-the-legal-risk-map.html

Cybersecurity and privacy priorities for 2026: The legal risk map

5+ day, 20+ hour ago  (462+ words) Escalating cybersecurity threats and growing privacy concerns lurk around every corner these days. Evolving technology and mounting regulations continue to present both the perils and solutions. All players " public and private, organizations and individuals alike " are to conquer the next…...

CSO Online
csoonline.com > article > 4143384 > cisos-rethink-their-data-protection-strategies.html

CISOs rethink their data protection strategies

1+ mon, 2+ week ago  (1240+ words) Scott Kopcha witnessed what CISOs everywhere are seeing: employees eager to use artificial intelligence, whether through public models or custom AI tools, accessing company data at a breathtaking rate and volume. Kopcha already had a mature data protection strategy in…...

CSO Online
csoonline.com > article > 4146299 > cyber-attacken-fluten-eon-netz-angriffe-verzehnfacht-2.html

Cyber-Attacken fluten Eon-Netz: Angriffe verzehnfacht

6+ day, 22+ hour ago  (136+ words) Eon meldet t'glich hunderte Cyberangriffe auf Stromnetze. Die Zahl hat sich binnen f'nf Jahren verzehnfacht. Der Marktf'hrer r'stet die digitale Abwehr nun massiv auf. Der Energiekonzern Eon sieht eine zunehmende Zahl von Cyberangriffen auf seine Energienetze. Mittlerweile seien t'glich mehrere…...

CSO Online
csoonline.com > article > 4146202 > aws-bedrocks-isolated-sandbox-comes-with-a-dns-escape-hatch.html

AWS Bedrock’s ‘isolated’ sandbox comes with a DNS escape hatch

1+ day, 22+ hour ago  (320+ words) AWS" promise of "complete isolation" for agentic AI workflows on Bedrock is facing scrutiny after researchers found its sandbox mode isn"t as sealed as advertised. "AWS Bedrock"s sandbox isolation failed at the most fundamental layer, DNS, and the…...

CSO Online
csoonline.com > article > 4145127 > runtime-the-new-frontier-of-ai-agent-security.html

Runtime: The new frontier of AI agent security

4+ day, 21+ hour ago  (1550+ words) AI agents are already operating inside enterprise networks, quietly doing some of the work employees once handled themselves " writing code, drafting emails, retrieving files, and connecting to internal systems. Sometimes they also make costly mistakes. At Meta, an employee asked…...

CSO Online
csoonline.com > article > 4145579 > open-vsx-extensions-hijacked-glassworm-malware-spreads-via-dependency-abuse.html

Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse

2+ day, 23+ hour ago  (331+ words) Threat actors are abusing extension dependency relationships in the Open VSX registry to indirectly deliver malware in a new phase of the GlassWorm supply-chain campaign. Researchers at Socket said they have identified at least 72 additional malicious Open VSX extensions linked…...