Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
LATEST CYBER NEWS
07
/
12
:
8:03 pm
:
GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs – Source:thehackernews.com
07
/
12
:
8:03 pm
:
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub – Source:thehackernews.com
07
/
12
:
6:03 pm
:
Squid Dominated the Oceans in the Late Cretaceous – Source: www.schneier.com
07
/
12
:
10:03 am
:
McDonald’s AI hiring tool’s password ‘123456’ exposed data of 64M applicants – Source: www.csoonline.com
07
/
12
:
9:03 am
:
DoNot APT Hits European Ministry with New LoptikMod Malware – Source:hackread.com
07
/
12
:
9:03 am
:
McDonald’s AI Hiring Tool McHire Security Flaw Exposed Candidate Chat Data – Source:hackread.com
07
/
12
:
8:03 am
:
Athlete or Hacker? Russian basketball player accused in U.S. ransomware case – Source: securityaffairs.com
07
/
12
:
5:03 am
:
CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn – Source: go.theregister.com
07
/
12
:
5:03 am
:
UK Online Safety Act ‘not up to scratch’ on misinformation, warn MPs – Source: go.theregister.com
07
/
12
:
4:03 am
:
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel – Source: www.darkreading.com
07
/
12
:
4:03 am
:
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE – Source: www.darkreading.com
07
/
12
:
4:03 am
:
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience – Source: www.darkreading.com
07
/
12
:
4:03 am
:
Factoring Cybersecurity Into Finance’s Digital Strategy – Source: www.darkreading.com
07
/
12
:
4:03 am
:
Digital Fingerprints Test Privacy Concerns in 2025 – Source: www.darkreading.com
07
/
12
:
3:03 am
:
ISACA Addresses Experience Gap with CISA Associate Designation – Source: www.infosecurity-magazine.com
07
/
12
:
3:03 am
:
British Man Sentenced for Network Rail Wi-Fi Hack – Source: www.infosecurity-magazine.com
07
/
12
:
3:03 am
:
Indian Cyber Espionage Group Targets Italian Government – Source: www.infosecurity-magazine.com
07
/
12
:
3:03 am
:
Over Half of “Finfluencer” Victims Have Lost Money, Says TSB – Source: www.infosecurity-magazine.com
07
/
12
:
3:03 am
:
MPs Warn of “Significant” Iranian Cyber-Threat to UK – Source: www.infosecurity-magazine.com
07
/
12
:
3:03 am
:
Watchguard Analysis Surfaces Major Spike in Malware Detections – Source: securityboulevard.com
07
/
12
:
3:03 am
:
Spyware on Androids Soars – Source: securityboulevard.com
07
/
12
:
3:03 am
:
Rubio Impersonation Incident is Latest High-Profile Deepfake Scam – Source: securityboulevard.com
07
/
12
:
3:03 am
:
GTT Extends Palo Alto Networks Alliance to Add Managed SASE Service – Source: securityboulevard.com
07
/
11
:
8:03 pm
:
Leaked Shellter Elite Tool Now Fueling Infostealer Attacks Worldwide – Source:hackread.com
07
/
11
:
8:03 pm
:
FBI Seizes Major Sites Sharing Unreleased and Pirated Video Games – Source:hackread.com
07
/
11
:
8:03 pm
:
New Study Shows Google Tracking Persists Even With Privacy Tools – Source:hackread.com
07
/
11
:
8:03 pm
:
14 Arrested in Romania for £47 Million UK Tax Phishing Scam – Source:hackread.com
07
/
11
:
8:03 pm
:
Magento 2 Shipping Automation: Cut Costs While Enhancing Customer Experience – Source:hackread.com
07
/
11
:
8:03 pm
:
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) – Source:thehackernews.com
07
/
11
:
8:03 pm
:
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution – Source:thehackernews.com
07
/
11
:
8:03 pm
:
Securing Data in the AI Era – Source:thehackernews.com
07
/
11
:
8:03 pm
:
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild – Source:thehackernews.com
07
/
11
:
8:03 pm
:
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals – Source:thehackernews.com
07
/
11
:
8:02 pm
:
Taiwan NSB Alerts Public on Data Risks from Douyin, Weibo, and RedNote Over China Ties – Source:thehackernews.com
07
/
11
:
7:03 pm
:
Rowhammer Attack Demonstrated Against Nvidia GPU – Source: www.securityweek.com
07
/
11
:
5:03 pm
:
What is up with so many trying to hack TikTok? – Source:davinciforensics.co.za
07
/
11
:
5:03 pm
:
‘Hacking is assumed now’: experts raise the alarm about added risk of surveillance cameras in childcare centres – Source: www.theguardian.com
07
/
11
:
5:03 pm
:
Louis Vuitton says UK customer data stolen in cyber-attack – Source: www.theguardian.com
07
/
11
:
5:03 pm
:
Russian basketball player arrested in ransomware case despite being “useless with computers” – Source: www.bitdefender.com
07
/
11
:
5:03 pm
:
Paddy Power and BetFair have suffered a data breach – Source: grahamcluley.com
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
DEVSECOPS
CISO2CISO Advisors recomended posts
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
Microsoft
Microsoft Zero Trust Maturity Model
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Latest Published Posts
Marcos Jaimovich
Nuevo Firewall para IA , un Cacharro nuevo para nuestro SOC y los equipos de...
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
CISO STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
CYBER ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
SOC CSIRT OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
CYBERSECURITY TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
CYBERSECURITY VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
CYBERSECURITY MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
CYBER ORGANIZATIONS
CCN-EU
CSA
CIS
CISA
DHS-US
ENISA
ISACA
INCIBE-EU
Mitre Att&ack
CISO2CISO STRATEGIC VALLEY
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
Microsoft Security
Three Steps for Protecting Your Data End-to-End with Microsoft Purview by Microsoft Security
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
CISO2CISO SOC OPERATIONS VALLEY
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
Fastercapital.com
How To Launch A Successful B2B Managed Security Services Provider MSSP Thinking like a CISO
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
PICUS
The Complete Active Directory Security Handbook – Exploitation – Detection and Migitation Strategies by PICUS
Kaspersky
Incident Response 2022 Report by Kaspersky
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
LATEST CYBER NEWS
The Hacker News
12/07/2025
GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs – Source:thehackernews.com
The Hacker News
12/07/2025
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub...
Schneier on Security
12/07/2025
Squid Dominated the Oceans in the Late Cretaceous – Source: www.schneier.com
CSO - Online
12/07/2025
McDonald’s AI hiring tool’s password ‘123456’ exposed data of 64M applicants – Source: www.csoonline.com
Hackread
12/07/2025
DoNot APT Hits European Ministry with New LoptikMod Malware – Source:hackread.com
Hackread
12/07/2025
McDonald’s AI Hiring Tool McHire Security Flaw Exposed Candidate Chat Data – Source:hackread.com
SecurityAffairs.com
12/07/2025
Athlete or Hacker? Russian basketball player accused in U.S. ransomware case – Source: securityaffairs.com
The Register Security
12/07/2025
CVSS 10 RCE in Wing FTP exploited within 24 hours, security researchers warn – Source:...
The Register Security
12/07/2025
UK Online Safety Act ‘not up to scratch’ on misinformation, warn MPs – Source: go.theregister.com
Dark Reading Security
12/07/2025
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel – Source: www.darkreading.com
Dark Reading Security
12/07/2025
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE – Source: www.darkreading.com
Dark Reading Security
12/07/2025
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience – Source: www.darkreading.com
Dark Reading Security
12/07/2025
Factoring Cybersecurity Into Finance’s Digital Strategy – Source: www.darkreading.com
Dark Reading Security
12/07/2025
Digital Fingerprints Test Privacy Concerns in 2025 – Source: www.darkreading.com
Infosecurity Magazine
12/07/2025
ISACA Addresses Experience Gap with CISA Associate Designation – Source: www.infosecurity-magazine.com
Infosecurity Magazine
12/07/2025
British Man Sentenced for Network Rail Wi-Fi Hack – Source: www.infosecurity-magazine.com
Infosecurity Magazine
12/07/2025
Indian Cyber Espionage Group Targets Italian Government – Source: www.infosecurity-magazine.com
Infosecurity Magazine
12/07/2025
Over Half of “Finfluencer” Victims Have Lost Money, Says TSB – Source: www.infosecurity-magazine.com
Infosecurity Magazine
12/07/2025
MPs Warn of “Significant” Iranian Cyber-Threat to UK – Source: www.infosecurity-magazine.com
Security Boulevard
12/07/2025
Watchguard Analysis Surfaces Major Spike in Malware Detections – Source: securityboulevard.com
Security Boulevard
12/07/2025
Spyware on Androids Soars – Source: securityboulevard.com
Security Boulevard
12/07/2025
Rubio Impersonation Incident is Latest High-Profile Deepfake Scam – Source: securityboulevard.com
Security Boulevard
12/07/2025
GTT Extends Palo Alto Networks Alliance to Add Managed SASE Service – Source: securityboulevard.com
Hackread
11/07/2025
Leaked Shellter Elite Tool Now Fueling Infostealer Attacks Worldwide – Source:hackread.com
Latest Published Posts
Marcos Jaimovich
Nuevo Firewall para IA , un Cacharro nuevo para nuestro SOC y los equipos de...
Cyberint
Retail Threat Landscape Report Q1-Q3 – November 2024 Summary by Cyberint a Check Point Company
Google Cloud
Perspectives on Security for the Board by Office of the CISO Series – Google Cloud.
Vendict
The 2024 CISO Burnout Report by Vendict
NCSC
Protecting Critical Supply Chains – A Guide to Securing your Supply Chain Ecosystem
Culture AI
Time to Adapt – The State of Human Risk Management in 2024 by Culture AI.
National Cyber Security Centre
Engaging with Boards to improve the management of cyber security risk.
Microsoft Security
2024 State of Multicloud Security Report by Microsoft Security
bugcrowd
Inside the Mind of a CISO 2024 The Evolving Roles of Security Leaders 2024 by...
Mohammad Alkhudari
Cybersecurity Strong Strategy step by step Guide collected by Mohammad Alkhudari 2024
Lacework
CISO’s Playbookto Cloud Security by Lacework
MITRE - Carson Zimmerman
Ten Strategies of a World-Class Cybersecurity Operations Center by MITRE
SILVERFRONT - AIG
Identity Has Become the Prime Target of Threat Actors by Silverfort AIG.
The Claroty Research Team
EVIL PLC ATTACK
EU AI Act – EU 2024/1689
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
CISO STRATEGICS
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Privacy
Risk & Compliance
Resilience
Social Engineering
Osint - Humint
CYBER ARCHITECTURE
IOT Security
MAC-OS Security
Metaverse Security
Mitre Att&ck
Mobile & 5G Security
Network Security
NIST Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT OPERATIONS
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Mallware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY TOOLS
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY VENDORS
Fortinet
Guardicore
IBM
Mcafee - Trellix
Mandiant
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY MSSP
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security
CYBER REGULATIONS
PCI - DSS
ISO 27001
SOX
CYBER ORGANIZATIONS
NSA
NIST
SANS
WEF
EVENTS & CONFERENCES
RSA Conference
Defcon
Blackhat
Cybertech
C1b3rwall
Ekoparty - Hispam
Segurinfo - Hispam
USERS MOST VOTED POST
Marcos Jaimovich
Nuevo Firewall para IA , un Cacharro nuevo para nuestro SOC y los equipos de...
Vendict
The 2024 CISO Burnout Report by Vendict
TENABLE RESEARCH
THE RANSOMWARE ECOSYSTEM BY TENABLE RESEARCH
WILEY
Modern Malware for Dummies
HADESS
Attacked From Behind Application using RCE for Exploit Public-Facing Application case study
RANK
Threat Hunting Playbook – Learn how to embrace a proactive security posture by Rank.
LetsDefend
SIEM FOR BEGINNERS PREPARED FOR SOC TEAMS BY LETSDEFEND
eForensics Magazine
Open Source Forensic Tools by eForensics Magazine
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
SYSDIG
Kubernetes Security Guide by Sysdig
Marcus P Zillman
Open Source Intelligence OSINT mini guide 2022 by Marcus P. Zillman
HUY KHA
Microsoft Active Directory – Security Self Assesment Guide 2022 by Huy Kha
CYBERUP
Legitimate Cyber Security Activities in the 21st Century by CyberUP
OAS & GLOBAL PARTNERS
National Cybersecurity Strategies – Lessons Learned and Reflections from the Americas and Other Regions by...
ONAPSIS
Four Best Practices to Align Your SAP Applications With the NIST Framework by ONAPSIS
Practical DevSecOps
The 4 Pillards of DevSecOps – CAMS: 1.Culture, 2.Automation, 3.Measurement and 4.Sharing) By Practical DevSecOps
SANS DFIR
Malware Analysis TIPS & TRICKS Poster by SANS DFIR
SOPHOS
The State of Ransomware in Retail 2022 by SOPHOS –
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
TACTICX
Offensive Microsoft Active Directory 101 – Security Holes Everywere by TACTICX – Active Directory Attack.
CIS
CIS Critical Security Controls Version 8 – Mapping to PCI Data Security Standar (PCI DSS)...
LATEST CYBER NEWS
Hackread
11/07/2025
FBI Seizes Major Sites Sharing Unreleased and Pirated Video Games – Source:hackread.com
Hackread
11/07/2025
New Study Shows Google Tracking Persists Even With Privacy Tools – Source:hackread.com
Hackread
11/07/2025
14 Arrested in Romania for £47 Million UK Tax Phishing Scam – Source:hackread.com
Hackread
11/07/2025
Magento 2 Shipping Automation: Cut Costs While Enhancing Customer Experience – Source:hackread.com
The Hacker News
11/07/2025
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) – Source:thehackernews.com
The Hacker News
11/07/2025
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution – Source:thehackernews.com
The Hacker News
11/07/2025
Securing Data in the AI Era – Source:thehackernews.com
The Hacker News
11/07/2025
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild – Source:thehackernews.com
The Hacker News
11/07/2025
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals – Source:thehackernews.com
The Hacker News
11/07/2025
Taiwan NSB Alerts Public on Data Risks from Douyin, Weibo, and RedNote Over China Ties...
securityweek.com
11/07/2025
Rowhammer Attack Demonstrated Against Nvidia GPU – Source: www.securityweek.com
Davinci Cybersecurity
11/07/2025
What is up with so many trying to hack TikTok? – Source:davinciforensics.co.za
The Guardian UK
11/07/2025
‘Hacking is assumed now’: experts raise the alarm about added risk of surveillance cameras in...
The Guardian UK
11/07/2025
Louis Vuitton says UK customer data stolen in cyber-attack – Source: www.theguardian.com
grahamcluley.com
11/07/2025
Russian basketball player arrested in ransomware case despite being “useless with computers” – Source: www.bitdefender.com
grahamcluley.com
11/07/2025
Paddy Power and BetFair have suffered a data breach – Source: grahamcluley.com
Schneier on Security
11/07/2025
Tradecraft in the Information Age – Source: www.schneier.com
CSO - Online
11/07/2025
McDonald’s AI hiring tool’s password? ‘123456’: Exposes data of 64M applicants – Source: www.csoonline.com
CSO - Online
11/07/2025
Prorussische Hacker greifen Sachsen-Anhalts Landesportal an – Source: www.csoonline.com
CSO - Online
11/07/2025
Anatomy of a Scattered Spider attack: A growing ransomware threat evolves – Source: www.csoonline.com
Dark Reading Security
11/07/2025
Customer, Employee Data Exposed in Nippon Steel Breach – Source: www.darkreading.com
Dark Reading Security
11/07/2025
Digital Fingerprints Tests Privacy Concerns in 2025 – Source: www.darkreading.com
Dark Reading Security
11/07/2025
eSIM Bug in Millions of Phones Enables Spying, Takeover – Source: www.darkreading.com
Dark Reading Security
11/07/2025
Ingram Micro Up and Running After Ransomware Attack – Source: www.darkreading.com
Latest Published Posts
ENISA
EUROPEAN CYBERSECURITY SKILLS FRAMEWORK (ECSF)
CYZEA.IO
Enterprise Information Security
ENISA
REMOTE IDPROOFING GOOD PRACTICES
Hiral Patel
ENCRYPTION,HASHING AND DIGITAL SIGNATURE
IGNITE Technologies
ENCRYPTED REVERSE
Rajneesh Gupta
Email Phishing Playbook
Federal Office for Information Security
El estado de la seguridad informática en Alemania en 2023
Bird&Bird
General Data Protection Regulation (GDPR) Guide
Microsoft
GDPR & Generative AI
GDPR
GDPR for Third-party Risk Management
European Union Agency for Fundamental Rights
GDPR IN PRACTICE
FS.ISAC
Navigating Cyber
KPMG
Fraud risk management
CYFIRMA
Fletchen Stealer
HADESS
Finding 0-day vulnerabilities in apps using the Red Team approach
IGNITE Technologies
FILE TRANSFER CHEAT SHEET
Thecyphere
How to Manage Cyber Incidents?
Securesee
CYBER CRISIS INVESTIGATION AND MANAGEMENT
ACN
Guidelines for secure AI system development
UpGuard
A Complete Guide to Data Breaches
Incibe
Ciberseguridad en Smart Toys
INCIBE & SPAIN GOVERNMENT
Defensa de endpoints en sistemas de control industrial
Flashpoint
Global Threat Intelligence Report
HSBC
A new payments paradigm
WORLD BANK GROUP
Global Cybersecurity Capacity Program
LATEST CYBER NEWS
Dark Reading Security
11/07/2025
Agentic AI’s Risky MCP Backbone Opens Brand-New Attack Vectors – Source: www.darkreading.com
Dark Reading Security
11/07/2025
4 Arrested in UK Over M&S, Co-op, Harrods Hacks – Source: www.darkreading.com
The Hacker News
11/07/2025
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises – Source:thehackernews.com
Hackread
11/07/2025
McDonald’s AI Hiring Tool McHire Leaked Data of 64 Million Job Seekers – Source:hackread.com
The Register Security
11/07/2025
Security company hired a used car salesman to build a website, and it didn’t end...
The Register Security
11/07/2025
French cops cuff Russian pro basketball player on ransomware charges – Source: go.theregister.com
The Register Security
11/07/2025
Chinese censorship-busters claim Tencent is trying to kill its WeChat archive – Source: go.theregister.com
The Register Security
11/07/2025
Lovestruck US Air Force worker admits leaking secrets on dating app – Source: go.theregister.com
The Register Security
11/07/2025
Now everybody but Citrix agrees that CitrixBleed 2 is under exploit – Source: go.theregister.com
The Register Security
11/07/2025
Ex-ASML engineer who stole chip tech for Russia gets three years in Dutch prison –...
The Register Security
11/07/2025
Russia, hotbed of cybercrime, says nyet to ethical hacking bill – Source: go.theregister.com
SecurityAffairs.com
11/07/2025
U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog –...
SecurityAffairs.com
11/07/2025
UK NCA arrested four people over M&S, Co-op cyberattacks – Source: securityaffairs.com
SecurityAffairs.com
11/07/2025
PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda – Source: securityaffairs.com
SecurityAffairs.com
11/07/2025
Qantas data breach impacted 5.7 million individuals – Source: securityaffairs.com
Krebs On Security
11/07/2025
UK Arrests Four in ‘Scattered Spider’ Ransom Group – Source: krebsonsecurity.com
Infosecurity Magazine
11/07/2025
LLMs Fall Short in Vulnerability Discovery and Exploitation – Source: www.infosecurity-magazine.com
Infosecurity Magazine
11/07/2025
TikTok’s Handling of EU User Data in China Comes Under Scrutiny Again – Source: www.infosecurity-magazine.com
Infosecurity Magazine
11/07/2025
Four Arrested in Connection with April UK Retail Attacks – Source: www.infosecurity-magazine.com
Infosecurity Magazine
11/07/2025
Nippon Steel IT Subsidiary Hit by “Zero-Day Attack,” Causing Data Breach – Source: www.infosecurity-magazine.com
Infosecurity Magazine
11/07/2025
Tribunal Ruling Brings ICO’s £12.7m TikTok Fine Closer – Source: www.infosecurity-magazine.com
Infosecurity Magazine
11/07/2025
Qantas Confirms 5.7 Million Customers Hit by Data Breach – Source: www.infosecurity-magazine.com
Security Boulevard
11/07/2025
4 Arrests in Dawn Raid of Scattered-Spider Suspects – Source: securityboulevard.com
Security Boulevard
11/07/2025
Why your AppSec Tool Stack Is Failing in the Age of AI – Source: securityboulevard.com
Security Boulevard
11/07/2025
The Rise of Agentic AI: A New Frontier for API Security – Source: securityboulevard.com
Security Boulevard
11/07/2025
Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs) – Source: securityboulevard.com
Firewall
10/07/2025
Sophos Central firewall management update – Source: news.sophos.com
Adobe
10/07/2025
July Patch Tuesday offers 127 fixes – Source: news.sophos.com
The Last Watchdog
10/07/2025
News alert: INE Security debuts advanced eMAPT certification to close mobile security talent gap –...
securityweek.com
10/07/2025
AirMDR Raises $15.5 Million for MDR Solution – Source: www.securityweek.com
The Hacker News
10/07/2025
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads – Source:thehackernews.com
The Hacker News
10/07/2025
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord –...
The Hacker News
10/07/2025
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods – Source:thehackernews.com
The Hacker News
10/07/2025
What Security Leaders Need to Know About AI Governance for SaaS – Source:thehackernews.com
The Hacker News
10/07/2025
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App – Source:thehackernews.com
The Hacker News
10/07/2025
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs – Source:thehackernews.com
Hackread
10/07/2025
UK Arrests Woman and Three Men for Cyberattacks on M&S Co-op and Harrods – Source:hackread.com
AT&T Cybersecurity
10/07/2025
LevelBlue Momentum Continues with Two Acquisitions – Source:levelblue.com
Dark Reading Security
10/07/2025
SIM Swap Fraud Is Surging — and That’s a Good Thing – Source: www.darkreading.com
Dark Reading Security
10/07/2025
Browser Exploits Wane as Users Become the Attack Surface – Source: www.darkreading.com
Latest Published Posts
CSA Singapure
GUIDE TO CYBER THREAT MODELLING
HADESS
Hacker Culture
Open Sec
HACKING API
Quuensland Govermment
RISK ASSESSMENT PROCESS HANDBOOK
Ministry of MOS Security
HIPAA SIMPLIFIED
ALPEREN UGURLU
Hospital Security is at Risk Penetration Tests
Hacker Combat
How Are Passwords Cracked?
PURPLESEC
How To Plan & Develop An Effective Cyber Security Strategy
CIS - Center for Internet Security
How to Plan a Cybersecurity Roadmap in Four Steps
Ministry of MOS Security
INFOSEC AWARENESS POSTERS
ACSC Australia
Information Security Manual
Kaspersky
Incident Response Playbook: Dark Web Breaches
Incident Handling Process (HTB)
ninjaOne
Endpoint Hardening Checklist
OWASP
Firmware Security Testing Methodology
HADESS
Important Active Directory Attribute
TALLIN UNIVERSITY OF TECHNOLOGY
Implementing a SOAR Solution in a Security Operations Center on the Example of Cybers
ISA GLOBAL CYBERSECURITY ALLIANCE
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards
CheatSheet
Communication Protocols inIndustrial Control System/Operational Technology
Rajneesh Gupta
IAM Security CHECKLIST
BIS
Generative artificial intelligence and cyber securityin central banking
sqrrl
Hunt Evil
Centre for Cyber Security Belgium
HOW TO RESPOND TO A RANSOMWARE ATTACK IN 12 STEPS
Searchinform
How to protect personal data and comply with regulations
Giuseppe Manco
Threat Intelligence Platforms
DOYENSEC
Exploiting Client-Side Path Traversal
CSA Cloud Security Alliance
Hardware Security Module(HSM) as a Service
IGNITE Technologies
CREDENTIAL DUMPING FAKE SERVICES
Azhar Ghafoor
Creating a Threat Hunting Lab with Wazuh and Google Cloud Platform
IGNITE Technologies
A Detailed Guide on Covenant
CIS - Center for Internet Security
CIS Critical Security Controls
NIST
Computer Security Incident Handling Guide
IGNITE Technologies
COMPREHENSIVE GUIDE ON SSH TUNNELING
IGNITE Technologies
DIGITAL FORENSIC FTK IMAGER
Accedere
Cloud Security Assessment
DAN ELLIOTT
Crack the Code
YL VENTURES
CISO Reporting Landscape 2024
CYBER LEADERSHIP INSTITUTE
CISO PLAY BOOK
CISO Edition
Reporting Cyber Risk to Boards
certnz
MODERN APPROACHES TO NETWORK ACCESS SECURITY
CIOB
CIOB Artificial Intelligence (AI) Playbook 2024
LABCIBE
ESTADO DE LA CIBERSEGURIDAD EN COSTA RICA 2023
Views: 19237