Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Pages: CISO2CISO Cyber Security Resources – Vulnerabilities & Zero Day – 0 day
VULNERABILITIES Notepads & resources
Security TechRepublic
New GoFetch Vulnerability in Apple’s M Chips Allows Secret Keys Leak on Compromised Computers –...
Security TechRepublic
Newly Discovered Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems –...
securelist.com
Operation Triangulation: The last (hardware) mystery – Source: securelist.com
Security TechRepublic
ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence...
Security Boulevard
Unraveling the Struts2 security vulnerability: A deep dive – Source: securityboulevard.com
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #4 – CVE-2023-23376) – Source:...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #3 – October 2022) –...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #2 – September 2022) –...
securelist.com
Windows CLFS and five exploits used by ransomware operators – Source: securelist.com
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #1 – CVE-2022-24521) – Source:...
securelist.com
Windows CLFS and five exploits used by ransomware operators (Exploit #5 – CVE-2023-28252) – Source:...
Prancer
Developer´s Guide to OWASP – Top 10 API Security vulnerabilities & MITRE ATT&ACK framework relation...
Security Boulevard
iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain – Source: securityboulevard.com
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
Security TechRepublic
How to add the Docker Scout feature to the Docker CLI – Source: www.techrepublic.com
Security TechRepublic
Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America – Source: www.techrepublic.com
threatpost
iPhone Users Urged to Update to Patch 2 Zero-Days – Source: threatpost.com
threatpost
Google Patches Chrome’s Fifth Zero-Day of the Year – Source: threatpost.com
securelist.com
Nokoyawa ransomware attacks with Windows zero-day – Source: securelist.com
Security TechRepublic
IBM launches QRadar Security Suite for accelerated threat detection and response – Source: www.techrepublic.com
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
Security TechRepublic
Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities
SecurityAffairs.com
Google fixed the first Chrome zero-day of 2023
Security TechRepublic
Phishing from threat actor TA473 targets US and NATO officials
The Hacker News
thehackernews – CISA Adds Single-Factor Authentication to the List of Bad Practices
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS