Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
LASTEST NEWS
10/06/2023 - 9:23 PM -
Friday Squid Blogging: Light-Emitting Squid – Source: www.schneier.com
10/06/2023 - 9:23 PM -
Online muggers make serious moves on unpatched Microsoft bugs – Source: go.theregister.com
10/06/2023 - 7:23 PM -
BSidesSF 2023 – Eric Chiang, Brandon Weeks – Scalable Security: How To Win Friends And Not Burn Out Everyone – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Holistic API Security Strategy for 2023 – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Digital Trust & Safety Roundup: New product features, insights from Sift’s CMO, and lessons from digital native companies – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Risk Registers: The Ultimate Guide with Examples & Template – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Coverage Advisory for CVE-2023-34362 MOVEit Vulnerability – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
BSidesSF 2023 – David Levitsky, Brian Maloney – To Normalized Logs, and Beyond – Building a Threat Detection Platform from Scratch – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Randall Munroe’s XKCD ‘UFO Evidence’ – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
How to Manage Risks Associated with Identity and Access Management? – Source: securityboulevard.com
10/06/2023 - 7:23 PM -
Securing Your CI/CD Pipeline: Exploring the Dangers of Self-Hosted Agents – Source: securityboulevard.com
10/06/2023 - 4:23 PM -
Passkeys See Fresh Momentum With New Pilot Programs – Source: www.darkreading.com
10/06/2023 - 3:23 PM -
Game changing talent acquisition strategies, talent-to-value framework – Source: www.cybertalk.org
10/06/2023 - 3:23 PM -
Barracuda: Immediately rip out and replace our security hardware – Source: grahamcluley.com
10/06/2023 - 1:23 PM -
MOVEit Discloses More Vulnerabilities, Issues Patch – Source: www.govinfosecurity.com
10/06/2023 - 1:23 PM -
New Entrants to Ransomware Unleash Frankenstein Malware – Source: www.govinfosecurity.com
10/06/2023 - 1:23 PM -
Threat Detection for ‘DEED’ Environments of Enterprises Today – Source: www.govinfosecurity.com
10/06/2023 - 1:23 PM -
US DOJ Charges Two Russian Nationals With Mt. Gox Hack – Source: www.govinfosecurity.com
10/06/2023 - 1:23 PM -
Reimagine Security Operations: Unlock Business Transformation with Modern Security Analytics – Source: www.govinfosecurity.com
10/06/2023 - 1:23 PM -
Point32Health, Harvard Pilgrim Facing 4 Data Breach Lawsuits – Source: www.govinfosecurity.com
Home
Pages: CISO2CISO Cyber Security Resources – Cyber Security Attacks & Incidents
Cyber Security Attacks & Incidents Notepads & resources
Security Boulevard
Cybercrime Predictions from an Industry Veteran: Dr. Chase Cunningham – Source: securityboulevard.com
Cyber Talk
CISO-approved strategies for innovation: Elevating your security (with AI) – Source: www.cybertalk.org
Security Boulevard
Two Years After Colonial Pipeline, What Have We Learned? – Source: securityboulevard.com
Security Boulevard
A New Ransomware Scam: Fraud by the Incident Responders – Source: securityboulevard.com
govinfosecurity.com
Cyberattack Diverts Patients From Rural Idaho Hospital – Source: www.govinfosecurity.com
Schneier on Security
Chinese Hacking of US Critical Infrastructure – Source: www.schneier.com
socprime.com
Detect SmokeLoader Malware: UAC-0006 Strikes Again to Target Ukraine in a Series of Phishing Attacks...
Security Boulevard
Ransomware: A Predictable Response to Market Forces – Source: securityboulevard.com
Security Boulevard
Failure to Pay Ransom: Negligence? – Source: securityboulevard.com
Schneier on Security
Expeditionary Cyberspace Operations – Source: www.schneier.com
Security Boulevard
Expeditionary Cyberspace Operations – Source: securityboulevard.com
Security Boulevard
Understanding Cybercriminal Motivations Over Time – Source: securityboulevard.com
Security Boulevard
It’s Time to Reevaluate Your Enterprise Remediation Strategy – Source: securityboulevard.com
socprime.com
UAC-0063 Cyber-Espionage Activity Detection: Hackers Target Organizations in Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Izrael, and India...
Cyber Talk
Healthcare attacks are increasing: Why zero trust will prevent care disruptions – Source: www.cybertalk.org
Security Boulevard
Which Cyberattack Vectors Were Most Pervasive in 2022? (Part 2) – Source: securityboulevard.com
Security Boulevard
War, Hunh. Yeah. What is it Good For? Reducing Insurer Liability for Cyberattacks – Source:...
socprime.com
Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks – Source: socprime.com
socprime.com
SmokeLoader Malware Detection: UAC-0006 Group Reemerges to Launch Phishing Attacks Against Ukraine Using Financial Subject...
Cyber Talk
Ransomware gang hijacks university’s emergency alert system, threatens students – Source: www.cybertalk.org
SecurityAffairs.com
Pro-Russia group NoName took down multiple France sites, including the French Senate one – Source:...
ANALYST1
The Ransomware Diaries – Volume 1 by ANALYST1
Cyber Talk
Hacktivism and the new age of cyber warfare – Source: www.cybertalk.org
Security Boulevard
The AI Takeover: Cybersecurity Tool or Terminator? – Source: securityboulevard.com
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
socprime.com
APT28 aka UAC-0001 Group Leverages Phishing Emails Disguised As Instructions for OS Updates Targeting Ukrainian...
help net security
PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates – Source: www.helpnetsecurity.com
SecurityAffairs.com
Pro-Russia hacking group executed a disruptive attack against a Canadian gas pipeline – Source: securityaffairs.com
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
SecurityAffairs.com
Pro-Russia hackers launched a massive attack against the EUROCONTROL agency – Source: securityaffairs.com
Security TechRepublic
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
Schneier on Security
Swatting as a Service
socprime.com
Detect CVE-2023-28252 & CVE-2023-21554 Exploitation Attempts: Windows Zero-Day Actively Used in Ransomware Attacks and a...
Cybertalk.org
ChatGPT Security Risks -A Guide for Cyber Security Professionals by Cybertalk.org
SecurityAffairs.com
A cyber attack hit the water controllers for irrigating fields in the Jordan Valley
Security TechRepublic
More phishing campaigns are using IPFS network protocol
Cyber Talk
AI and cyber security: Trends, challenges and future prospects
Security TechRepublic
DDoS attacks rise as pro-Russia groups attack Finland, Israel
socprime.com
DarkCrystal RAT Malware Detection: UAC-0145 Hackers Exploit Unlicensed Microsoft Office Software as the Initial Attack Vector
Security TechRepublic
Ransomware attacks skyrocket as threat actors double down on U.S., global attacks
Security TechRepublic
With political ‘hacktivism’ rising, Google offers Project Shield to fight DDoS attacks
Schneier on Security
Mass Ransomware Attack
socprime.com
3CXDesktopApp Supply Chain Attack Detection: Active Intrusion Campaign Targeting Millions of 3CX Customers
socprime.com
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to...
socprime.com
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild...
socprime.com
ScrubCrypt Attack Detection: 8220 Gang Applies Novel Malware in Cryptojacking Operations Exploiting Oracle WebLogic Servers
socprime.com
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting...
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
CSH CYBER SECURITY HUB
Twitter source code leaked via GitHub
CSH CYBER SECURITY HUB
SHEIN fined US$1.9mn over data breach affecting 39 million customers
CSH CYBER SECURITY HUB
How carding can affect your business
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
CSH CYBER SECURITY HUB
How does CISO strategy prevent threats?
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
CSH CYBER SECURITY HUB
Cybercriminals are using ChatGPT to create malware
CSH CYBER SECURITY HUB
IOTW: Malicious actors gain access to GitHub source code
CSH CYBER SECURITY HUB
The dangerous vulnerabilities caused by weak email security
CSH CYBER SECURITY HUB
What is business email compromise?
CSH CYBER SECURITY HUB
The ultimate guide to malware
CSH CYBER SECURITY HUB
Google suspends Pinduoduo app over malware concerns
CSH CYBER SECURITY HUB
IOTW: Source code stolen in Reddit phishing attack
CSH CYBER SECURITY HUB
We are less than a year away from a cyber attack credited to ChatGPT
CSH CYBER SECURITY HUB
IOTW: Russian hackers target NATO sites with DDoS attack
CSH CYBER SECURITY HUB
German airports hit with DDoS attack
CSH CYBER SECURITY HUB
How Covid-19 impacted cyber security challenges, focus and spends
CSH CYBER SECURITY HUB
Top seven hacks and cyber security threats in APAC
CSH CYBER SECURITY HUB
Why healthcare providers are focusing on cyber resilience
CSH CYBER SECURITY HUB
IOTW: US Marshals Service suffers ransomware attack
CSH CYBER SECURITY HUB
What are DDoS attacks?
CSH CYBER SECURITY HUB
IOTW: Ransomware gang allegedly hacks Ring doorbells
CSH CYBER SECURITY HUB
What is phishing?
CSH CYBER SECURITY HUB
IOTW: BreachForums shuts down after FBI arrests its top admin
PICUS
The RED REPORT 2023 – The Top 10 Most Prevalent MITRE ATT&ACK Techniques Used by...
Tushar Subhra Dutta
Top 10 Cyber Attack Maps to See Digital Threats 2022 by Tushar Subhra Dutta –...
Wallarm
DevOps Tools and Insfrastructure Under Attack by Wallarm
esset
ESSET THREAT REPORT T2 2022
HornetSecurity
THE 2022 HORNETSECURITY RANSOMWARE ATTACKS ANALYSIS
CRC Press
DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS – Classification, Attacks, Challenges and Countermeasures – CRC Press...
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
HADESS
TALE OF PHIHING – Some Phishing Techniques & Awareness by HADESS.IO
Cynalytica
5 Targets Hackers Look for When Attacking an OT Network by Cynalytica
Victoria Beckman - Microsoft
Ransomware as a service (RaaS) – An explainer guide to cybercrime´s newest business model
odaseva
The State of SaaS Ransomware Attack Preparedness – A survey of cloud data decision makers...
BARRACUDA
The State of Industrial Security in 2022 by Barracuda – Insecure remote access, lack of...
Europol
DeepFakes Attacks – Facing reality Law enforcement and the challenge of deepfakes by EUROPOL
CSBS.ORG
Cybersecurity 101 – A Resource Guide for BANK EXECUTIVES – Executive Leadership of Cybersecurity
Kaspersky
The Nature of cyber incidents – Based on cyberattack investigations conducted by Kaspersky Global Emergency...
Hidecybersecurity.com
Social Engineering and its menace by Hidecybersecurity.com
ThreatLabz Team
2022 ThreatLabz Research Team – State of Ransomware Report by Zscaler
CLOUDSEK
Increased Cyber Attacks on the Global Health Sector by CloudSEK
CYFIRMA
HTML smuggling: A Stealthier Approach to Deliver Malware by CYFIRMA
SecurityScorecard
A Deep Dive into Black Basta Ransomware by SecurityScorecard
Inperva
DDoS Threat Landscape Report Q2 2022 by Imperva
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
VIRUSTOTAL
Ransomware in a Global Context Report 2021 by Virustotal
Kaspersky
Common TTPs of modern ransomware groups by Kaspersky Crimeware
WILEY
Threat Hunting for Dummies
CyberRes
A Guide to Insider Threats Infographics and How to Prevent Then by CyberRes
Benjamin Eidam
The 116 Best Cybersecurity Tools & Tactics 2021
Splunk
Top 50 Security Threats by Splunk
The Last Watchdog
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally
The Hacker News
thehackernews – FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
CISOMAG
cisomag – Global Affairs Canada Hit by Cyberattack
CISO MAG
cisomag – 3 Common IoT Attacks that Compromise Security
The Register
theregister – Viasat, Rosneft hit by cyberattacks as Ukraine war spills online
The Hacker News
thehackernews – Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords
help net security
helpnetsecurity – Cloud computing market to reach $1,554.94 billion by 2030
help net security
helpnetsecurity – How to contain a privileged access breach and make sure it doesn’t happen...
help net security
helpnetsecurity – 150+ HP multifunction printers open to attack (CVE-2021-39237, CVE-2021-39238)
help net security
helpnetsecurity – Alarming rise in cyberattacks against healthcare facilities, 68 attacks in Q3 2021 only
help net security
helpnetsecurity – The ripple effect: Why protection against supply chain attacks is a must
CISO MAG
cisomag – Vestas Cyberattack Impacts Internal IT Systems
DARKReading
darkreading – Is It OK to Take Your CEO Offline to Protect the Network?
HAMILTONPOLICE
hamiltonpolice – Arrest Made in $46 Million Dollar Cryptocurrency Theft
DARKReading
darkreading – How Attackers Weigh the Pros and Cons of BEC Techniques
techrepublic
techrepublic – 8 advanced threats Kaspersky predicts for 2022
Bleeping Computer
bleepingcomputer – Microsoft Exchange servers hacked in internal reply-chain attacks
help net security
helpnetsecurity – How to improve your SaaS security posture and reduce risk
BARRACUDA
barracuda – Threat Spotlight: Bait attacks
NCSC
ncsc – NCSC Annual Review 2021
CISO MAG
cisomag – Cybersecurity is a Low Priority for India’s Private Sector
help net security
helpnetsecurity – Businesses are forced to adopt new cybersecurity measures
security affairs
securityaffairs – Threat actors hacked email servers of the FBI to distribute spam email impersonating...
UPU
upu – When the .POST Group (DPG) was launched back in 2012, partnerships were at...
crunchbase
news.crunchbase – Why Latin America Needs To Build A Cybersecurity Fortress ASAP
The Register
theregister – FBI spams thousands after ‘software misconfiguration’
CheckPoint
checkpoint – Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities in 2022
help net security
helpnetsecurity – Why are we still asking KBA questions to authenticate identity?
threatpost
threatpost – Magecart Credit Card Skimmer Avoids VMs to Fly Under the Radar
help net security
helpnetsecurity – Surge in cyber attacks confirms the need for zero trust security
help net security
helpnetsecurity – The ultimate SaaS Security Posture Management (SSPM) checklist
help net security
helpnetsecurity – Organizations can save $1.9 million using workforce passwordless authentication
help net security
helpnetsecurity – Surge in cyber attacks confirms the need for zero trust security
naked security
nakedsecurity – Banking scam uses Docusign phish to thieve 2FA codes
The Hacker News
thehackernews – Mekotio Banking Trojan Resurfaces with New Attacking and Stealth Techniques
The Register
theregister – Your data is wider and deeper than ever – and so are the...
help net security
helpnetsecurity – Active Directory control: How adversaries score even bigger goals via attack paths
help net security
helpnetsecurity – Stand up your SOC with Crystal Eye XDR: Lift your security monitoring and...
DARKReading
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
UnaAlDia
unaaldia – Múltiples fraudes en certificación de la vacunación de la COVID-19 del Servicio Nacional...
CyberSecurityNews
cybersecuritynews – Destapan la campaña de estafa global de SMS Premium «UltimaSMS», presente en Google...
bitglass
bitglass – On the Dark Web, Hackers Eager to Share Tactics
AVTEST
av-test – 19 soluciones para empresas puestas a prueba con Windows
DARKReading
darkreading – Password Reuse Problems Persist Despite Known Risks
DARKReading
darkreading – The New Security Basics: 10 Most Common Defensive Actions
security affairs
securityaffairs – Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in...
The Register
theregister – Ethereum dev admits helping North Korea mine crypto-bucks, faces 20 years jail
DARKReading
darkreading – Windows 11 Available: What Security Pros Should Know
security affairs
securityaffairs – WhatsApp made available end-to-end encrypted chat backups
DARKReading
darkreading – Aerospace, Telecommunications Companies Victims of Stealthy Iranian Cyber-Espionage Campaign
The Register
theregister – ASUS patches ROG Armoury Crate app after researcher spots all-too-common flaw
security affairs
securityaffairs – Boffins devise a new side-channel attack affecting all AMD CPUs
The Hacker News
thehackernews – Apple now requires all apps to make it easy for users to delete...
DARKReading
darkreading – Microsoft: 58% of Nation-State Cyberattacks Come From Russia
help net security
helpnetsecurity – BitTitan Migration Discovery Solution offers tenant-to-tenant migration assessments for MSPs
DARKReading
darkreading – North American Orgs Hit With an Average of 497 Cyberattacks per Week
DARKReading
darkreading – Google Launches Security Advisory Service, Security to Workspaces
The Register
theregister – Attacks against Remote Desktop Protocol endpoints have exploded this year, warns ESET’s latest...
security affairs
securityaffairs – Russia-Linked TA505 targets financial institutions in a new malspam campaign
The Register
theregister – Revealed: How to steal money from victims’ contactless Apple Pay wallets
security affairs
securityaffairs – Ecuador’s Banco Pichincha has yet to recover after recent cyberattack
threatpost
threatpost – Twitch Leak Included Emails, Password: Researcher
The Register
theregister – Google to auto-enroll 150m users, 2m YouTubers with two-factor authentication
security affairs
securityaffairs – Twitch security breach had minimal impact, the company states
naked security
nakedsecurity – How to steal money via Apple Pay using the “Express Transit” feature
threatpost
threatpost – Office 365 Spy Campaign Targets US Military Defense
help net security
helpnetsecurity – IoT investment to overtake other Industry 4.0 tech in the near future
naked security
nakedsecurity – Serious Security: Let’s Encrypt gets ready to go it alone (in a good...
DARKReading
darkreading – 10 Hot Red Team Tools Set to Hit Black Hat Europe
threatpost
threatpost – Windows Zero-Day Actively Exploited in Widespread Espionage Campaign
help net security
helpnetsecurity – WFH is here to stay: Five tactics to improve security for remote teams
CISO MAG
cisomag – Web Application Risks You Are Likely to Face
help net security
helpnetsecurity – Multi-factor authentications soar as enterprises move away from passwords to secure hybrid workers
naked security
nakedsecurity – Cybersecurity awareness month: Fight the phish!
threatpost
threatpost – Mandating a Zero-Trust Approach for Software Supply Chains
CISO MAG
cisomag – Market Trends Report: Cloud Forensics in Today’s World
The Hacker News
thehackernews – CISA Issues Warning On Cyber Threats Targeting Water and Wastewater Systems
The Register
theregister – Microsoft says Azure fended off what might just be the world’s biggest-ever DDoS...
help net security
Compliance does not equal security !!
The Hacker News
thehackernews – Windows 10, Linux, iOS, Chrome and Many Others at Hacked Tianfu Cup 2021
The Register
theregister – Ad-blocking browser extension actually adds ads, say Imperva researchers
CISOMAG
cisomag – OpenSea NFT Marketplace Bug Allows Hackers to Steal Crypto Wallets
help net security
helpnetsecurity – Recommendations for improving DEI in cybersecurity teams
naked security
nakedsecurity – LANtenna hack spies on your data from across the room! (Sort of)
help net security
helpnetsecurity – The CISO’s guide to evaluating third-party security platforms
CSRC
csrc – Cybersecurity Framework Profile for Ransomware Risk Management
ZDNET
zdnet – FBI decision to withhold Kaseya ransomware decryption keys stirs debate
CISO MAG
cisomag – Immutable Backups are Key to Becoming Resilient Against Ransomware: Veeam
CISO MAG
cisomag – What are Credential Stuffing Attacks and How to Prevent Them
cyberdefense magazine
cyberdefensemagazine – Defeat Ransomware with Immutable Backup Data and Encryption
The Hacker News
thehackernews – Google to Auto-Reset Unused Android App Permissions for Billions of Devices
naked security
nakedsecurity – Windows zero-day MSHTML attack – how not to get booby trapped!
The Hacker News
thehackernews – Microsoft Warns of Cross-Account Takeover Bug in Azure Container Instances
We Live Security
welivesecurity – BladeHawk group: Android espionage against Kurdish ethnic group
We Live Security
welivesecurity – ProtonMail forced to log user’s IP address after an order from Swiss authorities
The Hacker News
thehackernews – Mēris Botnet Hit Russia’s Yandex With Massive 22 Million RPS DDoS Attack
The Hacker News
thehackernews – Russian Ransomware Group REvil Back Online After 2-Month Hiatus
The Hacker News
thehackernews – Hackers Leak VPN Account Passwords From 87,000 Fortinet FortiGate Devices
DARKReading
DARKreading – FragAttacks Foil 2 Decades of Wireless Security
The Hacker News
thehackernews – Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server
The Hacker News
thehackernews – Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group
naked security
nakedsecurity – Poisoned proxy PACs! The NPM package with a network-wide security hole…
threatpost
threatpost – Ragnar Locker Gang Warns Victims Not to Call the FBI
The Hacker News
thehackernews – New 0-Day Attack Targeting Windows Users With Microsoft Office Documents
The Hacker News
thehackernews – What is AS-REP Roasting attack, really?
The Hacker News
thehackernews – ProtonMail Shares Activist’s IP Address With Authorities Despite Its “No Log” Claims
CSO Online
CSOonline – The T-Mobile data breach: A timeline
DARKReading
DARKreading – DDoS Attacks Hitting Victims in High-Bandwidth ‘Bursts’
The Hacker News
thehackernews – FIN7 Hackers Using Windows 11 Themed Documents to Drop Javascript Backdoor
naked security
nakedsecurity – Skimming the CREAM – recursive withdrawals loot $13M in cryptocash
The Hacker News
thehackernews – Chinese Authorities Arrest Hackers Behind Mozi IoT Botnet Attacks
threatpost
threatpost – Lazarus Targets Job-Seeking Engineers with Malicious Documents
threatpost
threatpost – Volkswagen Vendor Exposed Data of 3.3m Drivers
The Hacker News
The Hacker News – Instagram Bug Allowed Anyone to View Private Accounts Without Following Them...
The Hacker News
The Hacker News – Chinese Hackers Believed to be Behind Second Cyberattack on Air India
The Hacker News
The Hacker News – 7-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
threatpost
threatpost – ‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts
threatpost
threatpost – DarkSide Pwned Colonial With Old VPN Password
The Hacker News
The Hacker News – New TLS Attack Lets Attackers Launch Cross-Protocol Attacks Against Secure Sites
threatpost
threatpost – REvil Ransomware Gang Spill Details on US Attacks
threatpost
threatpost – Cyberattack Suspected in Cox TV and Radio Outages
The Hacker News
The Hacker News – 120 Compromised Ad Servers Target Millions of Internet Users
DARKReading
DARKReading – Pandemic Pushes Bot Operators to Redirect Efforts
The Hacker News
The Hacker News – US Sanctions Russia and Expels 10 Diplomats Over SolarWinds Cyberattack
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS