Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
China
Search
The Register Security
Why is China deep in US networks? ‘They’re preparing for war,’ HR McMaster tells lawmakers...
securityweek.com
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries – Source: www.securityweek.com
Schneier on Security
Chinese-Owned VPNs – Source: www.schneier.com
The Register Security
China approves rules for national ‘online number’ ID scheme – Source: go.theregister.com
SecurityAffairs.com
Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks – Source:...
SecurityAffairs.com
China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks – Source: securityaffairs.com
The Register Security
China launches an AI cloud into orbit. 12 sats for now, 2,800 in coming years...
SecurityAffairs.com
Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide –...
The Register Security
China launches an AI cloud into orbit -12 sats for now, 2,800 in coming years...
Schneier on Security
Communications Backdoor in Chinese Power Inverters – Source: www.schneier.com
Schneier on Security
Chinese AI Submersible – Source: www.schneier.com
The Register Security
RSA Conf wrap: AI and China on everything, everywhere, all at once – Source: go.theregister.com
The Register Security
RSAC wrap: AI and China on everything, everywhere, all at once – Source: go.theregister.com
Security Boulevard
Homeland Secretary Noem Vows to Put CISA ‘Back to Focusing on its Core Mission’ –...
The Register Security
China now America’s number one cyber threat – US must get up to speed –...
The Register Security
China is using AI to sharpen every link in its attack chain, FBI warns –...
The Guardian UK
‘Source of data’: are electric cars vulnerable to cyber spies and hackers? – Source: www.theguardian.com
securityweek.com
Man Helped Individuals in China Get Jobs Involving Sensitive US Government Projects – Source: www.securityweek.com
securityweek.com
Chinese APT Mustang Panda Updates, Expands Arsenal – Source: www.securityweek.com
securityweek.com
Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild – Source: www.securityweek.com
The Register Security
China names alleged US snoops over Asian Winter Games attacks – Source: go.theregister.com
securityweek.com
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games – Source: www.securityweek.com
Schneier on Security
China Sort of Admits to Being Behind Volt Typhoon – Source: www.schneier.com
The Register Security
China reportedly admitted directing cyberattacks on US infrastructure – Source: go.theregister.com
securityweek.com
China Admitted to Volt Typhoon Cyberattacks on US Critical Infrastructure: Report – Source: www.securityweek.com
securityweek.com
Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs – Source: www.securityweek.com
The Register Security
China cracks down on personal information collection. No, seriously – Source: go.theregister.com
The Register Security
China’s FamousSparrow flies back into action, breaches US org after years off the radar –...
securityweek.com
FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US – Source: www.securityweek.com
The Register Security
China bans compulsory facial recognition and its use in private spaces like hotel rooms –...
Posts navigation
1
2
…
7
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
hacking
CISO
STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Osint - Humint
Privacy
Risk & Compliance
Resilience
Social Engineering
Supply Chain Security
CYBER
ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
IOT Security
MAC-OS Security
Metaverse Security
Micro segmentation
Mitre Att&ck
Mobile & 5G Security
Network Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT
OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Malware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY
TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY
VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY
MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security