CSO·Insight

  • Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability

    CVE-2025-6554 is a Type Confusion vulnerability in the Google Chrome V8 JavaScript engine. Type Confusion is a common class of memory corruption vulnerabilities that can lead to unsafe memory operations when a program incorrectly interprets one data type as another, allowing an attacker to execute arbitrary code on the victim's system.

    July 2, 2025
    09.6K0
  • Industrial Control System Security Vulnerability Analysis Report 2025

    In 2025, industrial control system security will face unprecedented challenges, mainly in the form of two-way risks of technological innovation and theft, double hazards brought about by the coexistence of old and new technologies, intensified supply chain security crises, as well as zero-day loopholes and stealth strategy failures

    July 2, 2025
    09.0K0
  • Global DevSecOps Status Survey Report 2024

    The Global State of DevSecOps Survey Report 2024 reveals key trends and challenges in the DevSecOps space, based on a survey of more than 1,000 global developers, security, and operations personnel, with key data highlights

    82% organizations use 6-20 security tools.
    Test results for 60% contain noise from 21%-60%.
    Only 24% of respondents were "extremely confident" in AI code protection.
    Organizations in 86% believe that security testing slows down development.

    February 13, 2025
    09.3K0
  • "Volt Typhoon" III - Decoding the U.S. Government's Implementation of Cyber Espionage and Disinformation Operations

    This report provides an in-depth analysis of cyber espionage and disinformation operations conducted by the U.S. federal government and its intelligence agencies around the world, and reveals the true extent of the massive surveillance and data theft that has been carried out by the U.S. federal government and its intelligence agencies through a variety of tactics, including Advanced Persistent Threats (APTs), supply chain attacks, and Operation False Flag, targeting cyber infrastructures and critical organizations in China, Germany, Japan, and other countries. The report points out that the NSA (U.S. National Security Agency) has been conducting large-scale surveillance and data theft against cyber infrastructure and key organizations in China, Germany, Japan and other countries. The report points out that the U.S. National Security Agency (NSA) and the Central Intelligence Agency (CIA) have been working together to take advantage of the technological superiority of the "Five Eyes Coalition" countries to control the world's important undersea fiber-optic cables and set up a full range of listening stations to carry out indiscriminate surveillance of Internet users around the world.

    With regard to disinformation operations, the United States intelligence agencies have implemented "false flag operations" through the framework of "Operation Influence", in which they create and disseminate false information to mislead the traceability and attribution, cover up their own cyberattacks, and frame other countries. In addition, the report describes in detail the UpStream and Prism programs, which enable the NSA to obtain user data from major U.S. Internet companies, further expanding its intelligence-gathering capabilities.

    The report also reveals that the U.S. Office of Specific Intrusion Operations (TAO) has launched covert cyber intrusion operations around the world, implanting espionage programs to infiltrate critical network systems in target countries. At the same time, the report reveals that the U.S. has abused Section 702 of the Foreign Intelligence Surveillance Act (FISA) internally to conduct illegal wiretapping and data collection of global Internet users, including U.S. citizens.

    In terms of countermeasures, the report calls for strengthening international cooperation, upgrading cybersecurity protection capabilities, improving information monitoring and governance mechanisms, and formulating and improving relevant laws and regulations, so as to effectively respond to the cyber-hegemonic behavior of the United States and its allies. Finally, the report emphasizes the importance of global collaboration on cybersecurity and calls on all countries to work together to build a secure, stable and trustworthy Internet environment, and to prevent and curb the threats of cyber espionage and disinformation.

    October 18, 2024
    013.2K0
  • National security: cyberwarfare methodology and case studies

    In the context of evolving modern conflicts, cyberwarfare methodologies have become a powerful tool in the arsenal of states, hacktivists and cybercriminals. This paper provides a comprehensive analysis of the methodologies employed in the field of cyber warfare. By delving into techniques, strategies and tactics, we aim to reveal the multifaceted nature of cyber warfare.

    February 10, 2024
    012.9K0
  • Global DevSecOps Status Report 2023

    This report provides an overview of the current state of global DevSecOps practices, strategies, tools usage and their impact on software security in 2023. It covers the results of a survey of 1,000 IT and AppSec professionals from various professional backgrounds, from the US, UK, France, Finland, Germany, China, Singapore and Japan.

    January 8, 2024
    012.5K0
  • Data security: How does generative AI deal with security risks and challenges?

    The development and application of AI are having a major impact on the scientific and technological field and may trigger a new productivity revolution. As a powerful technology, AI gives computer systems the ability to generate human language content.

    December 8, 2023
    012.8K0
  • U.S. think tanks’ construction and enlightenment on my country’s cyber security issues

    In today's globalized world, network security has become an important factor affecting national security. In recent years, the construction and enlightenment of China-related cybersecurity issues by Western think tanks has become an important research field. This article mainly analyzes the research results of six major American think tanks on China’s cyber security issues...

    November 11, 2023
    016.5K0
  • Cybersecurity emergency response analysis report for the first half of 2023

    Main points: Government departments, public institutions and the financial industry are the industries with the highest incidence of cybersecurity emergency response incidents in the first half of 2023. This highlights the serious threat that cybersecurity issues pose to the data security of important sectors. The vast majority of government and enterprise organizations are engaged in network security…

    November 7, 2023
    011.5K0
  • China Cyber Security Industry Analysis Report (2023)

    "China Cybersecurity Industry Analysis Report (2023)" Contents 1. New Situation Facing 2. Basic Industry Situation 3. Enterprise Competitiveness and Industrial Structure 4. Capital Market Analysis 5. Industry Hotspot Analysis 6. Industry Development Outlook…

    September 20, 2023
    011.2K0