Robuta

https://www.csoonline.com/article/3518733/ai-spm-buyers-guide-artificial-intelligence-security-posture-management-tools-compared.html AI-SPM buyer’s guide: 9 security posture management tools to protect your AI infrastructure | CSO... security posture managementai https://www.csoonline.com/video/508772/what-the-colonial-pipeline-ransomware-attack-suggests-about-critical-infrastructure-security.html What the Colonial Pipeline ransomware attack suggests about critical infrastructure security | CSO... colonial pipelineransomware https://www.csoonline.com/article/4033018/ransomware-goes-cloud-native-to-target-your-backup-infrastructure.html Ransomware goes cloud native to target your backup infrastructure | CSO Online Aug 20, 2025 - Moving beyond just endpoints, ransomware gangs are following the data, leading to more sophisticated cloud-native extortion attack chains. goes cloudinfrastructure cso https://www.csoonline.com/article/2119281/hijack-of-monitoring-devices-highlights-cyber-threat-to-solar-power-infrastructure.html Hijack of monitoring devices highlights cyber threat to solar power infrastructure | CSO Online Apr 25, 2025 - An attack on remote monitoring devices in Japan underscores an emerging cybersecurity threat to the rapidly growing solar component of the power grid.... monitoring devicessolar power https://www.csoonline.com/article/4109985/iranian-apt-prince-of-persia-returns-with-new-malware-and-c2-infrastructure.html Iranian APT Prince of Persia returns with new malware and C2 infrastructure | CSO Online Dec 19, 2025 - Once considered dormant, the threat group has been quite active in evolving its techniques and tools, with updated malware for reconnaissance and data... iranian aptprincepersianew https://www.csoonline.com/article/2514214/legacy-systems-are-the-achilles-heel-of-critical-infrastructure-cybersecurity.html Legacy systems are the Achilles’ heel of critical infrastructure cybersecurity | CSO Online May 30, 2025 - China and other nation-state bad actors are probing the defenses of critical infrastructure worldwide and legacy or outdated systems are prime targets. The... legacy systemsheelcritical https://www.csoonline.com/article/4099959/submarine-cable-cybersecurity-protecting-critical-infrastructure.html Submarine cable cybersecurity: protecting critical infrastructure | CSO Online Dec 4, 2025 - Submarine cables have revalued their status as critical infrastructure. Ensuring their integrity, both physical and cyber, is a major challenge. critical infrastructure cso https://www.csoonline.com/article/3992747/critical-infrastructure-under-attack-flaws-becoming-weapon-of-choice.html Critical infrastructure under attack: Flaws becoming weapon of choice | CSO Online May 23, 2025 - While phishing and stolen credentials remain frequent points of entry, overexposure and poor patch management of critical systems are increasingly fueling... critical infrastructureattack https://www.csoonline.com/article/567651/6-ways-cybercriminals-use-commercial-infrastructure.html 6 ways cybercriminals use commercial infrastructure | CSO Online Aug 26, 2019 - Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities. ways cybercriminalscso online https://www.csoonline.com/article/4110008/top-cyber-threats-to-your-ai-systems-and-infrastructure.html Top cyber threats to your AI systems and infrastructure | CSO Online Jan 8, 2026 - From data poisoning to prompt injection, threats against enterprise AI applications and foundations are beginning to move from theory to reality. cyber threatsai systemstopcso https://www.csoonline.com/article/2097026/biden-delivers-updated-take-on-security-for-critical-infrastructure.html Biden delivers updated take on security for critical infrastructure | CSO Online critical infrastructure cso