
How CISOs Should Wipe Windows PCs Before Disposal
Recommissioning or reselling enterprise Windows PCs? CISOs must enforce secure sanitization practices to prevent sensitive data leakage and maintain compliance.
Security vulnerabilities remain the most common entry point for cyber attacks. This section tracks newly discovered CVEs, zero-day vulnerabilities, and actively exploited flaws affecting enterprise infrastructure, cloud environments, and software supply chains.
63 articles

Recommissioning or reselling enterprise Windows PCs? CISOs must enforce secure sanitization practices to prevent sensitive data leakage and maintain compliance.

A global surge in LinkedIn job scams exposes enterprise attack surfaces. CISOs must understand phishing risks tied to fraudulent job offers and insider fraud.

LG’s latest laptops introduce an in-house ultralight material called Aerominum. CISOs should evaluate the durability, data handling, and potential risks of these emerging endpoints.

Equifax’s CISO for Continental Europe highlights the organization's transformation journey since the 2017 breach. Security is now embedded in both governance and operations.

A CVSS 10.0 flaw in React and Next.js, dubbed React2Shell, allowed unauthenticated RCE and was exploited within hours. Exploitation is ongoing across sectors.

A ferry in Italy was compromised by IoT malware likely deployed by someone physically onboard. This unusual breach reveals critical security blind spots in maritime and operational technology.

New Kaspersky findings reveal shifts in industrial malware activity in Q3 2025. CISOs must address growing OT threat diversity and regional variances.

A new Webrat campaign disguises malware as fake exploit code on GitHub, targeting junior security professionals. CISOs must act to defend exposed endpoints.

Operation Sentinel led to 574 arrests in 19 African nations, crippling cybercrime networks behind BEC, ransomware, and digital fraud. CISOs must understand the regional and global implications.

Criminal IP and Palo Alto Networks Cortex XSOAR have joined forces to deliver AI-powered exposure intelligence directly into automated incident workflows. CISOs should prepare for faster incident response and higher fidelity decision-making with this new integration.

Cisco's Secure Email appliances are under active zero-day exploitation by a China-linked APT. This article outlines critical response measures and threat implications.

Cisco Talos' latest research exposes critical vulnerabilities in Libbiosig, Grassroot DiCoM, and Smallstep step-ca—putting medical and certificate systems at risk.