The CISO Online

  • Home
  • The CISO Online

The CISO Online Cybersecurity News and Resources

Tools and techniques to be as anonymous as possible online.
13/09/2020

Tools and techniques to be as anonymous as possible online.

How to be anonymous online . Tools and techniques for the protection of your identity online. Be as anonymous as possible. Protect your personal data.

https://theciso.online/all-data-breaches-in-2019-2020/
29/04/2020

https://theciso.online/all-data-breaches-in-2019-2020/

All data which are exposed online are potentially in danger of also being exposed to unauthorized parties. Data breaches happen regularly exposing personal information such as email addresses, usernames & passwords, bank account numbers and other sensitive information. Many organizations, big and sm...

Learn to Google search like a hacker!https://theciso.online/what-is-google-dorking/
27/04/2020

Learn to Google search like a hacker!
https://theciso.online/what-is-google-dorking/

For normal users, Google is the most famous search engine in the world. For those who know how to perform advanced Google searches it can also become a very useful and powerful hacking tool. WHAT IS GOOGLE DORKING Google Dork or Google Dorking is a great resource for security research. It has been a...

27/04/2020

Hackers were spotted exploiting a vulnerability on Sophos XG firewalls which lead to the abuse of the firewall configuration, exposing information such as usernames and passwords. The vulnerability is and SQL Injection Vulnerability and the company issued a hotfix which when applied informs the admi...

25/04/2020

Attacks & BreachesCloudCybersecurityNews 160,000 Nintendo Player Accounts Hacked By TheCISO - April 25, 2020 0 4 Facebook Twitter Pinterest WhatsApp WHAT KIND OF DATA WERE EXPOSED? Recently a data breach of Nintendo systems exposed data of 160,000 people. The hackers exploited a weakness in the Nint...

https://theciso.online/devsecops-why-you-should-put-sec-in-devops/
24/04/2020

https://theciso.online/devsecops-why-you-should-put-sec-in-devops/

Application SecuritySecurityArticlesCloudCybersecurity DevSecOps: Why You Should Put “Sec” in DevOps. By Dimitris Gkoutzamanis - April 24, 2020 0 6 Facebook Twitter Pinterest WhatsApp In a short period of time, a span of less than a decade the IT infrastructures have undergone huge changes. We s...

https://theciso.online/docker-security-practices/
23/04/2020

https://theciso.online/docker-security-practices/

Application SecuritySecurityArticlesCloudCybersecurity Docker Security Practices By Dimitris Gkoutzamanis - April 23, 2020 0 4 Facebook Twitter Pinterest WhatsApp Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. As all tech...

https://theciso.online/personal-data-of-267-million-users-sold-by-hackers/
21/04/2020

https://theciso.online/personal-data-of-267-million-users-sold-by-hackers/

Attacks & BreachesNews Personal Data of 267 Million Users Sold by Hackers By TheCISO - April 21, 2020 0 8 Facebook Twitter Pinterest WhatsApp Hackers have sold personal data from 267 Million Facebook users causing another major reputation blow on the tech giant. The data included email addresses, na...

Address


Alerts

Be the first to know and let us send you an email when The CISO Online posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Shortcuts

  • Address
  • Alerts
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share