Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Register
Search
The Register Security
Millions at risk after attackers steal UK legal aid data dating back 15 years –...
The Register Security
IT chiefs of UK’s massive health service urge vendors to make public security pledge –...
The Register Security
China launches an AI cloud into orbit. 12 sats for now, 2,800 in coming years...
The Register Security
Eeek! p0wned Alabama hit by unspecified ‘cybersecurity event’ – Source: go.theregister.com
The Register Security
China launches an AI cloud into orbit -12 sats for now, 2,800 in coming years...
The Register Security
Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’ –...
The Register Security
Boffins devise technique that lets users prove location without giving it away – Source: go.theregister.com
The Register Security
Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting...
The Register Security
America’s consumer watchdog drops leash on proposed data broker crackdown – Source: go.theregister.com
The Register Security
Defamation case against DEF CON terminated with prejudice – Source: go.theregister.com
The Register Security
Broadcom employee data stolen by ransomware crooks following hit on payroll provider – Source: go.theregister.com
The Register Security
Good luck to Atos’ 7th CEO and its latest biz transformation – Source: go.theregister.com
The Register Security
From hype to harm: 78% of CISOs see AI attacks already – Source: go.theregister.com
The Register Security
Scammers are deepfaking voices of senior US government officials, warns FBI – Source: go.theregister.com
The Register Security
DoorDash scam used fake drivers, phantom deliveries to bilk $2.59M – Source: go.theregister.com
The Register Security
Cyber fiends battering UK retailers now turn to US stores – Source: go.theregister.com
The Register Security
Coinbase extorted for $20M. Support staff bribed. Customers scammed. One hell of a SNAFU –...
The Register Security
Socket buys Coana to tell you which security alerts you can ignore – Source: go.theregister.com
The Register Security
Snowflake CISO on the power of ‘shared destiny’ and ‘yes and’ – Source: go.theregister.com
The Register Security
Here’s what we know about the DragonForce ransomware that hit Marks & Spencer – Source:...
The Register Security
Metal maker meltdown: Nucor stops production after cyber-intrusion – Source: go.theregister.com
The Register Security
Why CVSS is failing us and what we can do about it – Source: go.theregister.com
The Register Security
Uncle Sam pulls $2.4B Leidos deal to support CISA after rival alleges foul play –...
The Register Security
Ivanti patches two zero-days under active attack as intel agency warns customers – Source: go.theregister.com
The Register Security
Meta’s still violating GDPR rules with latest plan to train AI on EU user data,...
The Register Security
VPN Secure parent company CEO explains why he had to axe thousands of ‘lifetime’ deals...
The Register Security
Go ahead and ignore Patch Tuesday – it might improve your security – Source: go.theregister.com
The Register Security
Everyone’s deploying AI, but no one’s securing it – what could go wrong? – Source:...
The Register Security
Ransomware scum have put a target on the no man’s land between IT and operations...
The Register Security
Apple patched one first, but Microsoft’s blasted five exploited flaws this Pa-Tu – Source: go.theregister.com
Posts navigation
1
…
3
4
5
…
82
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
hacking
CISO
STRATEGICS
CISO Strategics
CISO Learn & Leadership
Cybersecurity for C-Levels
Cybersecurity Trends & Insights
Cyberseurity Awareness
Cybercrimen Ecosystem
Cybersecurity Measure & Metrics
Cybersecurity Frameworks
Cybersecurity Policy & Standars
Fraud
Information Security
Osint - Humint
Privacy
Risk & Compliance
Resilience
Social Engineering
Supply Chain Security
CYBER
ARCHITECTURE
API Security
Application Security
Blockchain Security
Cloud Security
Data Security
Defense in Depth
DevSecOps
Endpoint Security
IA Security
IOT Security
MAC-OS Security
Metaverse Security
Micro segmentation
Mitre Att&ck
Mobile & 5G Security
Network Security
OT Security
OWASP Security
Perimeter Security
SAP Security
Telco & Carrier Security
Zero Trust Security
SOC CSIRT
OPERATIONS
Cyber Incidents & Attacks Notepad
CSIRT Operations
Data Leak & Breach Incidents Notepad
DDOS Attacks
DFIR - Forensics & Incident Response
Dark & Deep Web
SOC Operations
SIEM Use Cases & Playbooks
SOAR Authomation & Playbooks
Malware & Ransomware
Red - Blue & Purple Teams Operations
Threat Intelligence
Threat Hunting
Vulnerabilities
CYBERSECURITY
TOOLS
Anti DDOS
AWS Security
CASB
DLP
DNS Security
EDR - MDR - XDR
Firewalls
Google GCP Security
Hacking Tools
IAM - Identity
IPS
MFA-2FA
MS Azure Security
MS Office 365 Security
SIEM
SDWAN
SOAR
VPNs - Remote Access
WAF
CYBERSECURITY
VENDORS
Akamai
A10 Networks
Blackberry Cylance
Cisco
Cyberark
Cloudfare
Crowdstrike
Checkpoint
F5 Networks
FyreEye
Fortinet
Guardicore
IBM
Kaspersky
Mcafee - Trellix
Mandiant
Maltego
Microsoft
Netscope
Palo Alto Networks
RSA Security
Redhat
Splunk
Symantec
Tenable
Trendmicro
CYBERSECURITY
MSSP
Accenture
Attos
AT&T Cybersecurity
BT Security
BASE 4 - Hispam
Deloitte
Entelgy Security
KPMG
NTT Security
Novared - Hispam
Neosecure - Hispam
Orange Cyberdefense
PwC
Telefonica Tech
Thales
Verizon Security