CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
LASTEST NEWS
08/06/2023 - 2:23 PM -
Japanese pharma giant Eisai discloses ransomware attack – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
Why cybersecurity needs a conference like mWISE – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
Royal ransomware gang adds BlackSuit encryptor to their arsenal – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
Barracuda says hacked ESG appliances must be replaced immediately – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
Honda API flaws exposed customer data, dealer panels, internal docs – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
VMware fixes critical vulnerabilities in vRealize network analytics tool – Source: www.bleepingcomputer.com
08/06/2023 - 2:23 PM -
IOTW: Clop ransomware gang threatens BBC, Boots and BA
08/06/2023 - 1:23 PM -
Key strategies for CISOs in a dynamic threat landscape – Source: www.cybertalk.org
08/06/2023 - 1:23 PM -
How hackers bypass Zero Trust and what you can do about it – Source: www.cybertalk.org
08/06/2023 - 1:23 PM -
RSAC Fireside Chat: Fusing ‘TIP’ and ‘SOAR’ to defend hybrid-cloud, multi-cloud networks – Source: www.lastwatchdog.com
08/06/2023 - 1:23 PM -
Interpol: Human Trafficking is Fueling Fraud Epidemic – Source: www.infosecurity-magazine.com
08/06/2023 - 1:23 PM -
Lazarus Group Blamed for Atomic Wallet Heist – Source: www.infosecurity-magazine.com
08/06/2023 - 1:23 PM -
Cyber Extortionists Seek Out Fresh Victims in LatAm and Asia – Source: www.infosecurity-magazine.com
08/06/2023 - 1:23 PM -
Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities – Source:thehackernews.com
08/06/2023 - 1:23 PM -
Kimsuky Targets Think Tanks and News Media with Social Engineering Attacks – Source:thehackernews.com
08/06/2023 - 1:23 PM -
Barracuda Urges Immediate Replacement of Hacked ESG Appliances – Source:thehackernews.com
08/06/2023 - 11:23 AM -
Smashing Security podcast #325: Rick Astley and the little birdie scam – Source: grahamcluley.com
08/06/2023 - 11:23 AM -
Now TikTok is even banned from US govt contractors’ personal smartphones – Source: www.bitdefender.com
08/06/2023 - 11:23 AM -
Cl0p gang tells MOVEit hack victims to contact it before June 14, or else… – Source: grahamcluley.com
08/06/2023 - 10:23 AM -
BioCatch Strengthens Collaboration With Microsoft Cloud for Financial Services – Source: www.darkreading.com
Home
Pages: CISO2CISO Cyber Security Attacks Notepad Series
CISO2CISO Cyber Security Attacks & Incidents Record Notepad Series
Security Boulevard
Two Years After Colonial Pipeline, What Have We Learned? – Source: securityboulevard.com
02/06/2023
Security Boulevard
A New Ransomware Scam: Fraud by the Incident Responders – Source: securityboulevard.com
02/06/2023
govinfosecurity.com
Cyberattack Diverts Patients From Rural Idaho Hospital – Source: www.govinfosecurity.com
31/05/2023
Schneier on Security
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
31/05/2023
socprime.com
Detect SmokeLoader Malware: UAC-0006 Strikes Again to Target Ukraine in a Series of Phishing Attacks...
30/05/2023
Security Boulevard
Ransomware: A Predictable Response to Market Forces – Source: securityboulevard.com
30/05/2023
Security Boulevard
Failure to Pay Ransom: Negligence? – Source: securityboulevard.com
30/05/2023
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
27/05/2023
Security Boulevard
Expeditionary Cyberspace Operations – Source: securityboulevard.com
26/05/2023
Security Boulevard
Understanding Cybercriminal Motivations Over Time – Source: securityboulevard.com
25/05/2023
Security Boulevard
It’s Time to Reevaluate Your Enterprise Remediation Strategy – Source: securityboulevard.com
25/05/2023
socprime.com
UAC-0063 Cyber-Espionage Activity Detection: Hackers Target Organizations in Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Izrael, and India...
23/05/2023
Security Boulevard
Which Cyberattack Vectors Were Most Pervasive in 2022? (Part 2) – Source: securityboulevard.com
18/05/2023
Security Boulevard
War, Hunh. Yeah. What is it Good For? Reducing Insurer Liability for Cyberattacks – Source:...
15/05/2023
socprime.com
Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks – Source: socprime.com
10/05/2023
socprime.com
SmokeLoader Malware Detection: UAC-0006 Group Reemerges to Launch Phishing Attacks Against Ukraine Using Financial Subject...
10/05/2023
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
05/05/2023
ANALYST1
The Ransomware Diaries – Volume 1 by ANALYST1
05/05/2023
help net security
PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates – Source: www.helpnetsecurity.com
27/04/2023
Security TechRepublic
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
19/04/2023
Schneier on Security
Swatting as a Service
18/04/2023
socprime.com
Detect CVE-2023-28252 & CVE-2023-21554 Exploitation Attempts: Windows Zero-Day Actively Used in Ransomware Attacks and a...
13/04/2023
Security TechRepublic
DDoS attacks rise as pro-Russia groups attack Finland, Israel
07/04/2023
socprime.com
DarkCrystal RAT Malware Detection: UAC-0145 Hackers Exploit Unlicensed Microsoft Office Software as the Initial Attack Vector
05/04/2023
Security TechRepublic
Ransomware attacks skyrocket as threat actors double down on U.S., global attacks
02/04/2023
Security TechRepublic
With political ‘hacktivism’ rising, Google offers Project Shield to fight DDoS attacks
02/04/2023
Security TechRepublic
How to prevent fork bombs on your Linux development servers
02/04/2023
Schneier on Security
Mass Ransomware Attack
02/04/2023
socprime.com
3CXDesktopApp Supply Chain Attack Detection: Active Intrusion Campaign Targeting Millions of 3CX Customers
02/04/2023
socprime.com
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to...
02/04/2023
socprime.com
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild...
02/04/2023
socprime.com
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers
02/04/2023
socprime.com
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting...
02/04/2023
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
30/03/2023
CSH CYBER SECURITY HUB
Twitter source code leaked via GitHub
29/03/2023
CSH CYBER SECURITY HUB
SHEIN fined US$1.9mn over data breach affecting 39 million customers
27/03/2023
CSH CYBER SECURITY HUB
How carding can affect your business
27/03/2023
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
27/03/2023
CSH CYBER SECURITY HUB
How does CISO strategy prevent threats?
27/03/2023
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
27/03/2023
CSH CYBER SECURITY HUB
Cybercriminals are using ChatGPT to create malware
27/03/2023
CSH CYBER SECURITY HUB
IOTW: Malicious actors gain access to GitHub source code
27/03/2023
CSH CYBER SECURITY HUB
The dangerous vulnerabilities caused by weak email security
27/03/2023
CSH CYBER SECURITY HUB
What is business email compromise?
27/03/2023
CSH CYBER SECURITY HUB
The ultimate guide to malware
27/03/2023
CSH CYBER SECURITY HUB
Google suspends Pinduoduo app over malware concerns
27/03/2023
CSH CYBER SECURITY HUB
IOTW: Source code stolen in Reddit phishing attack
27/03/2023
CSH CYBER SECURITY HUB
We are less than a year away from a cyber attack credited to ChatGPT
27/03/2023
CSH CYBER SECURITY HUB
IOTW: Russian hackers target NATO sites with DDoS attack
27/03/2023
CSH CYBER SECURITY HUB
German airports hit with DDoS attack
27/03/2023
CSH CYBER SECURITY HUB
How Covid-19 impacted cyber security challenges, focus and spends
27/03/2023
CSH CYBER SECURITY HUB
Top seven hacks and cyber security threats in APAC
27/03/2023
CSH CYBER SECURITY HUB
Why healthcare providers are focusing on cyber resilience
27/03/2023
CSH CYBER SECURITY HUB
IOTW: US Marshals Service suffers ransomware attack
27/03/2023
CSH CYBER SECURITY HUB
What are DDoS attacks?
27/03/2023
CSH CYBER SECURITY HUB
IOTW: Ransomware gang allegedly hacks Ring doorbells
27/03/2023
CSH CYBER SECURITY HUB
What is phishing?
27/03/2023
CSH CYBER SECURITY HUB
IOTW: BreachForums shuts down after FBI arrests its top admin
27/03/2023
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
12/03/2023
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta –...
02/12/2022
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
18/11/2022
esset
ESSET THREAT REPORT T2 2022
17/11/2022
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
17/11/2022
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
27/10/2022
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
08/10/2022
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
08/10/2022
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
04/10/2022
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
04/10/2022
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
28/09/2022
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access, lack of...
23/09/2022
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
22/09/2022
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
13/09/2022
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
07/09/2022
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
06/09/2022
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
05/09/2022
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
01/09/2022
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
31/08/2022
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
21/08/2022
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
12/08/2022
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
12/08/2022
VIRUSTOTAL
Ransomware in a Global Context Report 2021 by Virustotal
06/08/2022
Kaspersky
Common TTPs of modern ransomware groups by Kaspersky Crimeware
02/08/2022
WILEY
Threat Hunting for Dummies
19/07/2022
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
19/07/2022
Benjamin Eidam
The 116 Best Cybersecurity Tools & Tactics 2021
18/07/2022
Splunk
Top 50 Security Threats by Splunk
17/07/2022
The Last Watchdog
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally
04/07/2022
The Hacker News
thehackernews – FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
17/03/2022
CISOMAG
cisomag – Global Affairs Canada Hit by Cyberattack
17/03/2022
CISO MAG
cisomag – 3 Common IoT Attacks that Compromise Security
17/03/2022
The Register
theregister – Viasat, Rosneft hit by cyberattacks as Ukraine war spills online
15/03/2022
The Hacker News
thehackernews – Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords
15/03/2022
help net security
helpnetsecurity – Cloud computing market to reach $1,554.94 billion by 2030
15/03/2022
help net security
helpnetsecurity – How to contain a privileged access breach and make sure it doesn’t happen...
15/03/2022
help net security
helpnetsecurity – 150+ HP multifunction printers open to attack (CVE-2021-39237, CVE-2021-39238)
01/12/2021
help net security
helpnetsecurity – Alarming rise in cyberattacks against healthcare facilities, 68 attacks in Q3 2021 only
01/12/2021
help net security
helpnetsecurity – The ripple effect: Why protection against supply chain attacks is a must
01/12/2021
CISO MAG
cisomag – Vestas Cyberattack Impacts Internal IT Systems
25/11/2021
DARKReading
darkreading – Is It OK to Take Your CEO Offline to Protect the Network?
25/11/2021
HAMILTONPOLICE
hamiltonpolice – Arrest Made in $46 Million Dollar Cryptocurrency Theft
24/11/2021
DARKReading
darkreading – How Attackers Weigh the Pros and Cons of BEC Techniques
24/11/2021
techrepublic
techrepublic – 8 advanced threats Kaspersky predicts for 2022
24/11/2021
Bleeping Computer
bleepingcomputer – Microsoft Exchange servers hacked in internal reply-chain attacks
24/11/2021
help net security
helpnetsecurity – How to improve your SaaS security posture and reduce risk
24/11/2021
BARRACUDA
barracuda – Threat Spotlight: Bait attacks
20/11/2021
NCSC
ncsc – NCSC Annual Review 2021
20/11/2021
CISO MAG
cisomag – Cybersecurity is a Low Priority for India’s Private Sector
18/11/2021
help net security
helpnetsecurity – Businesses are forced to adopt new cybersecurity measures
17/11/2021