Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
hacking
Page 38
hacking
SecurityAffairs.com
Tax preparation and e-file service eFile.com compromised to serve malware
SecurityAffairs.com
HP would take up to 90 days to fix a critical bug in some business-grade...
SecurityAffairs.com
CISA JCDC Will Focus on Energy Sector
SecurityAffairs.com
Law enforcement seized the Genesis Market cybercrime marketplace
SecurityAffairs.com
STYX Marketplace emerged in Dark Web focused on Financial Fraud
SecurityAffairs.com
ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs
SecurityAffairs.com
Rorschach ransomware has the fastest file-encrypting routine to date
SecurityAffairs.com
CISA adds Zimbra bug exploited in attacks against NATO countries to its Known Exploited Vulnerabilities...
SecurityAffairs.com
3CX Supply chain attack allowed targeting cryptocurrency companies
Schneier on Security
North Korea Hacking Cryptocurrency Sites with 3CX Exploit
SecurityAffairs.com
UK outsourcing services provider Capita suffered a cyber incident
SecurityAffairs.com
Western Digital took its services offline due to a security breach
SecurityAffairs.com
Microsoft fixed Azure AD bug that led to Bing.com results manipulation and account takeover
SecurityAffairs.com
Moobot botnet spreads by targeting Cacti and RealTek flaws
SecurityAffairs.com
Security Affairs newsletter Round 413 by Pierluigi Paganini – International edition
SecurityAffairs.com
Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal
The Guardian UK
Cyberwarfare leaks show Russian army is adopting mindset of secret police
The Guardian UK
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
Schneier on Security
Russian Cyberwarfare Documents Leaked
Schneier on Security
Hacks at Pwn2Own Vancouver 2023
Schneier on Security
Mass Ransomware Attack
SecurityAffairs.com
LockBit leaks data stolen from the South Korean National Tax Service
SecurityAffairs.com
Italy’s Data Protection Authority temporarily blocks ChatGPT over privacy concerns
SecurityAffairs.com
CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog
SecurityAffairs.com
Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin
SecurityAffairs.com
Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33M
SecurityAffairs.com
Russian APT group Winter Vivern targets email portals of NATO and diplomats
SecurityAffairs.com
Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE
SecurityAffairs.com
New AlienFox toolkit harvests credentials for tens of cloud services
SecurityAffairs.com
3CX voice and video conferencing software victim of a supply chain attack
Posts navigation
1
…
37
38
39
Latest Cyber News
The Hacker News
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo – Source:thehackernews.com
13/05/2024
Krebs On Security
How Did Authorities Identify the Alleged Lockbit Boss? – Source: krebsonsecurity.com
13/05/2024
The Register Security
Ransomware negotiator weighs in on the extortion payment debate with El Reg – Source: go.theregister.com
12/05/2024
The Register Security
Critical infrastructure security will stay poor until everyone pulls together – Source: go.theregister.com
12/05/2024
The Hacker News
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT – Source:thehackernews.com
11/05/2024
Data Breach Today
ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Hackers Steal Credit Card Data of Deal-Seeking Shoppers – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Live Webinar | Correcting your Cyber Security Posture with the Board: Data, Metrics and Lessons from 2023 – Source: www.databreachtoday.com
11/05/2024
Data Breach Today
Solving the Fractured Data Problem in Exposure Management – Source: www.databreachtoday.com
11/05/2024