Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Cyber Security Attacks & Incidents Notepads & resources
securityweek.com
Masimo Manufacturing Facilities Hit by Cyberattack – Source: www.securityweek.com
Security Boulevard
Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable – Source: securityboulevard.com
SecurityAffairs.com
Pro-Russia hacktivist group NoName057(16) is targeting Dutch organizations – Source: securityaffairs.com
securityweek.com
Canadian Electric Utility Hit by Cyberattack – Source: www.securityweek.com
Security Boulevard
Identity is the New Perimeter: CybeReady’s Analysis of IBM’s X-Force 2025 Threat Intelligence Index –...
Security Boulevard
NSFOCUS APT Monthly Briefing – March 2025 – Source: securityboulevard.com
securityweek.com
Cyberattack Knocks Texas City’s Systems Offline – Source: www.securityweek.com
Security Boulevard
Why the 2025 PyPI Attack Signals a New Era in Cloud Risk – Source: securityboulevard.com
Schneier on Security
China Sort of Admits to Being Behind Volt Typhoon – Source: www.schneier.com
The Register Security
Hacktivism resurges – but don’t be fooled, it’s often state-backed goons in masks – Source:...
cyberdefense magazine
The True Cost of Cybercrime: Why Global Damages Could Reach $1.2 – $1.5 Trillion by...
securityweek.com
A Guide to Security Investments: The Anatomy of a Cyberattack – Source: www.securityweek.com
Schneier on Security
Silk Typhoon Hackers Indicted – Source: www.schneier.com
Security Boulevard
Silk Typhoon Hackers Indicted – Source: securityboulevard.com
securityweek.com
Cyberattack Disrupts National Presto Industries Operations – Source: www.securityweek.com
securityweek.com
Polish Space Agency Hit by Cyberattack – Source: www.securityweek.com
securityweek.com
VC Firm Insight Partners Hacked – Source: www.securityweek.com
cyberdefense magazine
Why EPSS is a Game-Changer for Cybersecurity Risk Management – Source: www.cyberdefensemagazine.com
socprime.com
XE Group Activity Detection: From Credit Card Skimming to Exploiting CVE-2024-57968 and CVE-2025-25181 VeraCore Zero-Day...
securityweek.com
UK Engineering Giant IMI Hit by Cyberattack – Source: www.securityweek.com
Schneier on Security
On Generative AI Security – Source: www.schneier.com
The Register Security
Cyberattack on NHS causes hospitals to miss cancer care targets – Source: go.theregister.com
socprime.com
Lumma Stealer Detection: Sophisticated Campaign Using GitHub Infrastructure to Spread SectopRAT, Vidar, Cobeacon, and Other...
socprime.com
TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads...
securityweek.com
Smiths Group Scrambling to Restore Systems Following Cyberattack – Source: www.securityweek.com
Schneier on Security
CISA Under Trump – Source: www.schneier.com
securityweek.com
DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge – Source: www.securityweek.com
securityweek.com
Conduent Confirms Cyberattack After Government Agencies Report Outages – Source: www.securityweek.com
Security Boulevard
How to Stop Layer 7 DDoS Attacks in 2025 – Source: securityboulevard.com
socprime.com
CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains...
socprime.com
Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks – Source: socprime.com
socprime.com
CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC –...
Security Boulevard
Inside a 90-Minute Attack: Breaking Ground with All-New AI Defeating Black Basta Tactics – Source:...
socprime.com
EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the...
Schneier on Security
US Treasury Department Sanctions Chinese Company Over Cyberattacks – Source: www.schneier.com
socprime.com
NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a...
socprime.com
Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany...
securityweek.com
Japan Airlines Was Hit by a Cyberattack, Delaying Flights During the Year-End Holiday Season –...
socprime.com
UAC-0125 Attack Detection: Hackers Use Fake Websites on Cloudflare Workers to Exploit the “Army+” Application...
socprime.com
DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution – Source:...
socprime.com
UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware...
securityweek.com
Major Auto Parts Firm LKQ Hit by Cyberattack – Source: www.securityweek.com
socprime.com
UAC-0185 aka UNC4221 Attack Detection: Hackers Target the Ukrainian Defense Forces and Military-Industrial Complex –...
socprime.com
RevC2 and Venom Loader Detection: New Malware Strains Massively Deployed via MaaS in a Sophisticated...
socprime.com
SmokeLoader Malware Detection: Notorious Loader Reemerges to Target Companies in Taiwan – Source: socprime.com
securityweek.com
Two UK Hospitals Hit by Cyberattacks, One Postponed Procedures – Source: www.securityweek.com
socprime.com
HATVIBE and CHERRYSPY Malware Detection: Cyber-Espionage Campaign Conducted by TAG-110 aka UAC-0063 Targeting Organizations in...
Schneier on Security
Race Condition Attacks against LLMs – Source: www.schneier.com
Security TechRepublic
Starbucks, Supermarkets Targeted in Ransomware Attack – Source: www.techrepublic.com
socprime.com
BlackSuit Ransomware Detection: Ignoble Scorpius Escalates Attacks, Targets 90+ Organizations Worldwide – Source: socprime.com
securityweek.com
Cyberattack Disrupts Systems of Gambling Giant IGT – Source: www.securityweek.com
socprime.com
BianLian Ransomware Detection: AA23-136A Joint Cybersecurity Advisory Details on TTPs Leveraged by BianLian Operators in...
socprime.com
Fickle Stealer Malware Detection: New Rust-Based Stealer Disguises as Legitimate Software to Steal Data from...
socprime.com
New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant – Source:...
socprime.com
Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant – Source: socprime.com
securityweek.com
Ahold Delhaize Cybersecurity Incident Impacts Giant Food, Hannaford – Source: www.securityweek.com
Security Boulevard
DDoS Attacks Targeting ISPs are Different – Here’s How – Source: securityboulevard.com
Schneier on Security
Prompt Injection Defenses Against LLM Cyberattacks – Source: www.schneier.com
securityweek.com
Cyberattack on Microlise Disables Tracking in Prison Vans, Courier Vehicles – Source: www.securityweek.com
securityweek.com
Cyberattack Blamed for Statewide Washington Courts Outage – Source: www.securityweek.com
socprime.com
Stealthy Strela Stealer Detection: Info-Stealing Malware Resurfaces with Enhanced Capabilities to Target Central and Southwestern...
socprime.com
UAC-0001 aka APT28 Attack Detection: Leveraging PowerShell Command in Clipboard as Initial Entry Point –...
socprime.com
CVE-2024-47575 Detection: FortiManager API Vulnerability Exploited in Zero-Day Attacks – Source: socprime.com
socprime.com
UAC-0218 Attack Detection: Adversaries Steal Files Using HOMESTEEL Malware – Source: socprime.com
Security TechRepublic
Threat Actors Are Exploiting Vulnerabilities Faster Than Ever – Source: www.techrepublic.com
socprime.com
MEDUZASTEALER Detection: Hackers Distribute Malware Masquerading the Sender as Reserve+ Technical Support via Telegram Messaging...
socprime.com
UAC-0050 Attack Detection: russia-Backed APT Performs Cyber Espionage, Financial Crimes, and Disinformation Operations Against Ukraine...
socprime.com
Earth Simnavaz (aka APT34) Attack Detection: Iranian Hackers Leverage Windows Kernel Vulnerability to Target UAE...
Cyber Talk
Global data breach costs hit all-time high – Source: www.cybertalk.org
Security TechRepublic
Fidelity Data Breach Exposes Data of Over 77,000 Customers – Source: www.techrepublic.com
Schneier on Security
China Possibly Hacking US “Lawful Access” Backdoor – Source: www.schneier.com
socprime.com
Shrouded#Sleep Campaign Detection: North Korean Hackers Linked to the APT37 Group Use New VeilShell Malware...
socprime.com
Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT – Source: socprime.com
Data Breach Today
CISA Confirms Cyberattack on Critical Chemical Security Tool – Source: www.databreachtoday.com
Cyber Talk
How the Internet of Things (IoT) became a dark web target – and what to...
Security Boulevard
Hackers Use Fake DocuSign Templates to Scam Organizations – Source: securityboulevard.com
Schneier on Security
New Attack Against Self-Driving Car AI – Source: www.schneier.com
Schneier on Security
New Attack on VPNs – Source: www.schneier.com
cyberdefense magazine
What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform –...
Cyber Talk
Ransomware attack causes city street lights to “misbehave” – Source: www.cybertalk.org
Security Boulevard
3 Ways File Integrity Monitoring Identifies Zero-Day Attacks – Source: securityboulevard.com
Dark Reading Security
Cyberattack Takes Frontier Communications Offline – Source: www.darkreading.com
cyberdefense magazine
Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions. – Source: www.cyberdefensemagazine.com
Cyber Talk
Mastering the CISO role: Navigating the leadership landscape – Source: www.cybertalk.org
cyberdefense magazine
Smart Traffic Signals Security in the Era of AI and Smart Cars – Source: www.cyberdefensemagazine.com
The Register Security
Cyberattack hits Omni Hotels systems, taking out bookings, payments, door locks – Source: go.theregister.com
Cyber Talk
7 strategic ransomware remediation tactics for enterprise resilience – Source: www.cybertalk.org
Dark Reading Security
Cyberattack Shutters Some Operations at Japanese Lens Manufacturer – Source: www.darkreading.com
Cyber Talk
Streamlining supply chains | The impact of IoT on transportation and logistics – Source: www.cybertalk.org
Cyber Talk
U.S. Treasury warns financial sector, AI threats “outpacing” security – Source: www.cybertalk.org
Security Boulevard
A(nother) Ransomware Saga with a Twist – Source: securityboulevard.com
Schneier on Security
Lessons from a Ransomware Attack against the British Library – Source: www.schneier.com
Cyber Talk
Why do hackers love Linux? The 7 deeply unsettling realities – Source: www.cybertalk.org
Cyber Talk
AWS zero trust: A CISO’s path to improved cloud visibility & control – Source: www.cybertalk.org
Dark Reading Security
Cyberattack Targets Regulator Database in South Africa – Source: www.darkreading.com
The Register Security
Capita says 2023 cyberattack costs a factor as it reports staggering £100M+ loss – Source:...
Schneier on Security
A Cyber Insurance Backstop – Source: www.schneier.com
The Register Security
Cyberattack downs pharmacies across America – Source: go.theregister.com
Dark Reading Security
Cyberattack Disrupts German Battery-Production Lines – Source: www.darkreading.com
SecurityAffairs.com
Ukraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’ – Source:...
SecurityAffairs.com
Pro-Ukraine hackers wiped 2 petabytes of data from Russian research center – Source: securityaffairs.com
SecurityAffairs.com
Russia-linked Midnight Blizzard APT hacked Microsoft corporate emails – Source: securityaffairs.com
Security Boulevard
Stupid Human Tricks: Top 10 Cybercrime Cases of 2023 – Source: securityboulevard.com
Schneier on Security
On IoT Devices and Software Liability – Source: www.schneier.com
Security Boulevard
Netskope Report Surfaces Raft of Cybersecurity Challenges – Source: securityboulevard.com
securityweek.com
Lebanon Airport Screens Display Anti-Hezbollah Message After Being Hacked – Source: www.securityweek.com
securityweek.com
Palestinian Hackers Hit 100 Israeli Organizations in Destructive Attacks – Source: www.securityweek.com
Data Breach Today
New Cyberattack Wave Targets Albanian Parliament, Telecom – Source: www.databreachtoday.com
Data Breach Today
Cyberattack Tempo Ratchets Up in Israel – Source: www.databreachtoday.com
Dark Reading Security
Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024 – Source:...
Schneier on Security
Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists – Source: www.schneier.com
SecurityAffairs.com
Pro-Israel Predatory Sparrow hacker group disrupted services at around 70% of Iran’s fuel stations –...
govinfosecurity.com
Iran Hit by Major Cyberattack Targeting Nation’s Fuel Supply – Source: www.govinfosecurity.com
securityweek.com
VF Corp Disrupted by Cyberattack, Online Operations Impacted – Source: www.securityweek.com
Microsoft Security
Azure Defenses for Ransomware Attack by Microsoft Security
NCSC & NCA
Ransomware, extorsion and the cyber crime ecosystem by NCSC & NCA
InstaSafe
10 Ways CHATGPT and Generative AI can strenghthen ZERO TRUST by InstaSafe
CSO - AKAMAI
From Bad Bots to Malcious Scripts – The Effectiveness of Specialized Defense by CSO –...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
securityweek.com
Red Cross Publishes Rules of Engagement for Hacktivists During War – Source: www.securityweek.com
Cyber Talk
The 10 best phishing email templates to send to employees – Source: www.cybertalk.org
SecurityAffairs.com
A cyberattack disrupted Lyca Mobile services – Source: securityaffairs.com
Security TechRepublic
This Top-Rated Ad Blocker is Just $25 Through October 15th – Source: www.techrepublic.com
Dark Reading Security
Russian Hacktivism Takes a Toll on Organizations in Ukraine, EU, US – Source: www.darkreading.com
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
esset
ESSET THREAT REPORT T2 2022
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
ANALYST1
The Ransomware Diaries – Volume 1 by ANALYST1
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
Splunk
Top 50 Security Threats by Splunk
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta –...
WILEY
Threat Hunting for Dummies
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
esset
ESSET THREAT REPORT T2 2022
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
ANALYST1
The Ransomware Diaries – Volume 1 by ANALYST1
SANS
SANS Offensive Operations – ChatGPT for Offensive Security – What is ChatGPT and how can...
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
Cyber Talk
6 steps to stop ransomware from taking you hostage – Source: www.cybertalk.org
Dark Reading Security
MGM, Caesars Cyberattack Responses Required Brutal Choices – Source: www.darkreading.com
Cyber Talk
International Criminal Court attacked by cyber criminals – Source: www.cybertalk.org
securelist.com
Overview of IoT threats in 2023 – Source: securelist.com
SecurityAffairs.com
Pro-Russia hacker group NoName launched a DDoS attack on Canadian airports causing severe disruptions –...
securityweek.com
Clorox Blames Damaging Cyberattack for Product Shortage – Source: www.securityweek.com
SecurityAffairs.com
Caesars Entertainment paid a ransom to avoid stolen data leaks – Source: securityaffairs.com
Dark Reading Security
MGM Resorts Cyberattack Hobbles Las Vegas Strip Operations – Source: www.darkreading.com
SecurityAffairs.com
Anonymous Sudan launched a DDoS attack against Telegram – Source: securityaffairs.com
Infosecurity Magazine
MGM Resorts Hit By Cyber-Attack, Systems Down – Source: www.infosecurity-magazine.com
Dark Reading Security
MinIO Cyberattack Showcases Fresh Corporate Cloud Vector – Source: www.darkreading.com
Cyber Talk
Mystery hacking group targets space telescopes – Source: www.cybertalk.org
Schneier on Security
Remotely Stopping Polish Trains – Source: www.schneier.com
Cyber Talk
10 top corporate account takeover prevention strategies – Source: www.cybertalk.org
Infosecurity Magazine
Cyber-Attack on Australian Utility Firm Energy One Spreads to UK Systems – Source: www.infosecurity-magazine.com
Cyber Talk
10 top corporate account takeover prevention strategies – Source: www.cybertalk.org
SecurityAffairs.com
#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific –...
Cyber Talk
What is trap phishing? (2023) – Source: www.cybertalk.org
Schneier on Security
UK Electoral Commission Hacked – Source: www.schneier.com
Security Boulevard
Barracuda Networks Ransomware Report Surfaces Attack Surge – Source: securityboulevard.com
Cyber Talk
Catch rates: 5% can cost you $1.3M in risk per week – Source: www.cybertalk.org
Dark Reading Security
EvilProxy Cyberattack Flood Targets Execs via Microsoft 365 – Source: www.darkreading.com
Cyber Talk
How ransomware attacks can be a test of leadership – Source: www.cybertalk.org
Dark Reading Security
Hacktivist Group ‘Mysterious Team Bangladesh’ Goes on DDoS Rampage – Source: www.darkreading.com
Data Breach Today
Modern-Day Hacktivist Chaos: Who’s Really Behind the Mask? – Source: www.databreachtoday.com
govinfosecurity.com
Modern-Day Hacktivist Chaos: Who’s Really Behind the Mask? – Source: www.govinfosecurity.com
Infosecurity Magazine
Hacktivist Collective “Mysterious Team Bangladesh” Revealed – Source: www.infosecurity-magazine.com
Security Boulevard
Cado Security Report Surfaces Most Common Cyberattack Vectors – Source: securityboulevard.com
Schneier on Security
New SEC Rules around Cybersecurity Incident Disclosures – Source: www.schneier.com
Infosecurity Magazine
Cyber-Attack Strikes Norwegian Government Ministries – Source: www.infosecurity-magazine.com
Schneier on Security
Google Reportedly Disconnecting Employees from the Internet – Source: www.schneier.com
SecurityAffairs.com
Anonymous Sudan claims to have stolen 30 million Microsoft’s customer accounts – Source: securityaffairs.com
Security Boulevard
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches – Source: securityboulevard.com
Dark Reading Security
Russian Hacktivist Platform ‘DDoSia’ Grows Exponentially – Source: www.darkreading.com
ChatGPT & Haci Dasgin
Malware Analisys 101 – created by ChatGPT in 20 minutes
Joas Antonio
ChatGPT for Cybersecurity 1 by Joas Dos Santos
Security Boulevard
Microsoft Repeatedly Burned in ‘Layer 7’ DDoS – Source: securityboulevard.com
SecurityAffairs.com
Microsoft: June Outlook and cloud platform outages were caused by DDoS – Source: securityaffairs.com
Security Boulevard
MOVEit Attack Strikes US and State Governments – Source: securityboulevard.com
Security TechRepublic
DDoS threats and defense: How certain assumptions can lead to an attack – Source: www.techrepublic.com
Security Boulevard
Cybercrime Predictions from an Industry Veteran: Dan Schaupner – Source: securityboulevard.com
SecurityAffairs.com
Pro-Ukraine Cyber Anarchy Squad claims the hack of the Russian telecom provider Infotel JSC –...
Security Boulevard
Cybercrime Predictions from an Industry Veteran: Dr. Chase Cunningham – Source: securityboulevard.com
Cyber Talk
CISO-approved strategies for innovation: Elevating your security (with AI) – Source: www.cybertalk.org
Security Boulevard
Two Years After Colonial Pipeline, What Have We Learned? – Source: securityboulevard.com
Security Boulevard
A New Ransomware Scam: Fraud by the Incident Responders – Source: securityboulevard.com
govinfosecurity.com
Cyberattack Diverts Patients From Rural Idaho Hospital – Source: www.govinfosecurity.com
Schneier on Security
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
Security Boulevard
Ransomware: A Predictable Response to Market Forces – Source: securityboulevard.com
Security Boulevard
Failure to Pay Ransom: Negligence? – Source: securityboulevard.com
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
Security Boulevard
Expeditionary Cyberspace Operations – Source: securityboulevard.com
Security Boulevard
Understanding Cybercriminal Motivations Over Time – Source: securityboulevard.com
Security Boulevard
It’s Time to Reevaluate Your Enterprise Remediation Strategy – Source: securityboulevard.com
Cyber Talk
Healthcare attacks are increasing: Why zero trust will prevent care disruptions – Source: www.cybertalk.org
Security Boulevard
Which Cyberattack Vectors Were Most Pervasive in 2022? (Part 2) – Source: securityboulevard.com
Security Boulevard
War, Hunh. Yeah. What is it Good For? Reducing Insurer Liability for Cyberattacks – Source:...
Cyber Talk
Ransomware gang hijacks university’s emergency alert system, threatens students – Source: www.cybertalk.org
SecurityAffairs.com
Pro-Russia group NoName took down multiple France sites, including the French Senate one – Source:...
Cyber Talk
Hacktivism and the new age of cyber warfare – Source: www.cybertalk.org
Security Boulevard
The AI Takeover: Cybersecurity Tool or Terminator? – Source: securityboulevard.com
SecurityAffairs.com
Pro-Russia hacking group executed a disruptive attack against a Canadian gas pipeline – Source: securityaffairs.com
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
SecurityAffairs.com
Pro-Russia hackers launched a massive attack against the EUROCONTROL agency – Source: securityaffairs.com
Security TechRepublic
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
Schneier on Security
Swatting as a Service
SecurityAffairs.com
A cyber attack hit the water controllers for irrigating fields in the Jordan Valley
Security TechRepublic
More phishing campaigns are using IPFS network protocol
Cyber Talk
AI and cyber security: Trends, challenges and future prospects
Security TechRepublic
DDoS attacks rise as pro-Russia groups attack Finland, Israel
Security TechRepublic
Ransomware attacks skyrocket as threat actors double down on U.S., global attacks
Security TechRepublic
With political ‘hacktivism’ rising, Google offers Project Shield to fight DDoS attacks
Schneier on Security
Mass Ransomware Attack
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
CSH CYBER SECURITY HUB
Twitter source code leaked via GitHub
CSH CYBER SECURITY HUB
SHEIN fined US$1.9mn over data breach affecting 39 million customers
CSH CYBER SECURITY HUB
How carding can affect your business
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
CSH CYBER SECURITY HUB
How does CISO strategy prevent threats?
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
CSH CYBER SECURITY HUB
Cybercriminals are using ChatGPT to create malware
CSH CYBER SECURITY HUB
IOTW: Malicious actors gain access to GitHub source code
CSH CYBER SECURITY HUB
The dangerous vulnerabilities caused by weak email security
CSH CYBER SECURITY HUB
What is business email compromise?
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS
Views: 9