CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO.COM
From Cyber Technicals to C-Levels Cyber Advisors.
The Most Complete Reference & News Site For The Global Cyber Community.
Cyber Security Stories & News
HOT & DAILY UPDATED
Cyber Security Stories & News
CISO´s Notepad & Pappers
MOST POPULAR
Attacks
Cyber Attacks
Data Breaches
Vulnerabilities
Malware
About US
Account Login
Register
Login
Password Reset
Home CISO2CISO
CISO2CISO Cyber Security Stories & News
The Hacker News
The Hacker News
Gootkit Malware Continues to Evolve with New Components and Obfuscations
30/01/2023
The Hacker News
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
30/01/2023
The Hacker News
Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
30/01/2023
The Hacker News
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
28/01/2023
The Hacker News
Microsoft Urges Customers to Secure On-Premises Exchange Servers
28/01/2023
The Hacker News
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
28/01/2023
The Hacker News
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
28/01/2023
The Hacker News
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
28/01/2023
The Hacker News
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
28/01/2023
The Hacker News
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
28/01/2023
The Hacker News
Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
28/01/2023
The Hacker News
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
28/01/2023
The Hacker News
Is Once-Yearly Pen Testing Enough for Your Organization?
26/01/2023
The Hacker News
Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group
26/01/2023
The Hacker News
Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA
26/01/2023
The Hacker News
Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
26/01/2023
The Hacker News
Guide: How MSSPs and vCISOs can extend their services into compliance readiness without increasing cost
26/01/2023
The Hacker News
Iranian Government Entities Under Attack by New Wave of BackdoorDiplomacy Attacks
26/01/2023
Threat Post Cyber Security News
threatpost
Google Patches Chrome’s Fifth Zero-Day of the Year
13/01/2023
threatpost
iPhone Users Urged to Update to Patch 2 Zero-Days
13/01/2023
threatpost
Fake Reservation Links Prey on Weary Travelers
13/01/2023
threatpost
Firewall Bug Under Active Attack Triggers CISA Warning
13/01/2023
threatpost
Twitter Whistleblower Complaint: The TL;DR Version
13/01/2023
threatpost
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
13/01/2023
threatpost
Ransomware Attacks are on the Rise
13/01/2023
threatpost
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
13/01/2023
threatpost
Watering Hole Attacks Push ScanBox Keylogger
13/01/2023
threatpost
Student Loan Breach Exposes 2.5M Records
13/01/2023
threatpost
Xiaomi Phone Bug Allowed Payment Forgery
20/08/2022
threatpost
U.K. Water Supplier Hit with Clop Ransomware Attack
20/08/2022
threatpost
APT Lazarus Targets Engineers with macOS Malware
20/08/2022
threatpost
APT Lazarus Targets Engineers with macOS Malware
18/08/2022
threatpost
Black Hat and DEF CON Roundup
15/08/2022
threatpost
Facebook’s In-app Browser on iOS Tracks ‘Anything You Do on Any Website’
13/08/2022
threatpost
Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
13/08/2022
threatpost
Cisco Confirms Network Breach Via Hacked Employee Google Account
12/08/2022
The Register News
The Register
Super Bock says ‘cyber’ nasty ‘disrupting computer services’
02/02/2023
The Register
Microsoft sweeps up after breaking .NET with December security updates
02/02/2023
The Register
Google boosts bounties for open source flaws found via fuzzing
02/02/2023
The Register
Attackers abuse Microsoft’s ‘verified publisher’ status to steal data
01/02/2023
The Register
Microsoft upgrades Defender to lock down Linux gear for its own good
01/02/2023
The Register
New year, new storage challenge
31/01/2023
The Register
Gootloader malware updated with PowerShell, sneaky JavaScript
31/01/2023
The Register
The wages of sin aren’t that great if you’re a developer choosing the dark side
31/01/2023
The Register
Chromebook SH1MMER exploit promises admin jailbreak
31/01/2023
The Register
South Korea makes crypto crackdown a national justice priority
31/01/2023
The Register
Amid FTX’s burning wreckage, Japanese outpost promises asset withdrawals in February
31/01/2023
The Register
JD Sports admits intruder accessed 10 million customers’ data
30/01/2023
theregister
Gee, tanks: Russian hackers DDoS Germany for aiding Ukraine
30/01/2023
theregister
We are the weakest link
30/01/2023
The Register
Gee, tanks: Russian hackers DDoS Germany for aiding Ukraine
30/01/2023
The Register
FBI catches up with infosec and crypto communities, blames Lazarus Group for $100 million heist
28/01/2023
The Register
FBI smokes ransomware Hive after secretly buzzing around gang’s network for months
28/01/2023
The Register
Google slays thousands of fake news vids posted by pro-China group Dragonbridge
28/01/2023
Graham Cluley Security Cyber News
Graham cluley
After data breach put their lives at risk, US releases 3000 immigrants seeking asylum
30/01/2023
Graham cluley
Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?
30/01/2023
Graham cluley
ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if...
30/01/2023
Graham cluley
Hive ransomware leak site and decryption keys seized in police sting
30/01/2023
Graham cluley
Don’t click too quick! FBI warns of malicious search engine ads
23/12/2022
Graham cluley
Operation Power Off: 50 DDoS-services taken offline in international crackdown
22/12/2022
Graham cluley
Smashing Security podcast #302: Lensa AI, and a dog called Bob
22/12/2022
Graham cluley
Backup saves the day after crime author loses laptop in blizzard
22/12/2022
Graham cluley
Microsoft approved and digitally-signed malicious drivers used in ransomware attacks
22/12/2022
Graham cluley
Data breach at Social Blade confirmed. Hacker offers to sell database on underground website
22/12/2022
Graham cluley
Smashing Security podcast #303: Secret Roomba snaps, Christmas cab scams, and the future of AI
22/12/2022
Graham cluley
North Korean hackers exploit Seoul Halloween tragedy in zero-day attack
12/12/2022
Graham cluley
Smashing Security podcast #301: AI chatbot or the start of Skynet? Eufy privacy, and hot...
12/12/2022
Graham cluley
Metaparasites: The cybercriminals who rip each other off
12/12/2022
Graham cluley
Hive ransomware gang claims responsibility for attack on Intersport that left cash registers disabled
12/12/2022
Graham cluley
Rackspace customers rage following ransomware attack, as class-action lawsuits filed
12/12/2022
Graham cluley
Hacking cars remotely with just their VIN
06/12/2022
Graham cluley
Russian courts attacked by CryWiper malware that poses as ransomware
06/12/2022
Databreachtoday.com
Data Breach Today
The Troublemaker CISO: Defending Against Insider Threat
02/02/2023
Data Breach Today
‘No Pineapple’ Hacking Campaign Reveals North Korean Toolkit
02/02/2023
Data Breach Today
Ransomware Gang Stole Customer Data, Arnold Clark Confirms
02/02/2023
Data Breach Today
Okta Lays Off 300 Employees After Sales Execution Challenges
02/02/2023
Data Breach Today
FTC Hits Firm With $1.5M Fine in Health Data-Sharing Case
02/02/2023
Data Breach Today
Banner Year for North Korean Cryptocurrency Hacking
02/02/2023
Data Breach Today
Tanium Taps Tibco CEO Dan Streetman to Replace Orion Hindawi
02/02/2023
Data Breach Today
Ransomware Hit on ION Group Delays EU Derivatives Trades
02/02/2023
Data Breach Today
Radiant Logic Pursues Identity Governance With Brainwave Buy
01/02/2023
Data Breach Today
White House Mulls Banning Huawei’s Access to US Technology
01/02/2023
Data Breach Today
Will Hive Stay Kaput After FBI Busts Infrastructure?
01/02/2023
Data Breach Today
Live Webinar | The Payment Optimization Blueprint: Leveraging Data to Improve Performance and Boost the...
01/02/2023
Data Breach Today
Trellix CEO on Unifying Endpoint, SecOps and Data Protection
01/02/2023
Data Breach Today
OpenEMR Flaws Could Allow Attackers to Steal Data, More
01/02/2023
Data Breach Today
CISA to Set Up New Office for Supply Chain Security
01/02/2023
Data Breach Today
Skyrocketing Cyber Insurance Premium Growth May Slow
01/02/2023
Data Breach Today
Founder Sachin Nayyar Back as CEO of Identity Vendor Saviynt
31/01/2023
Data Breach Today
Russian Sandworm APT Adds New Wiper to Its Arsenal
31/01/2023
Data Breach Today
Are We Doomed? Not If We Focus on Cyber Resilience
31/01/2023
Data Breach Today
Tenable’s $25M Venture Capital Fund Seeks Early-Stage Firms
31/01/2023
Data Breach Today
HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals
31/01/2023
Data Breach Today
JD Sports Details Data Breach Affecting 10 Million Customers
30/01/2023
Data Breach Today
Ukraine Links Media Center Attack to Russian Intelligence
29/01/2023
Data Breach Today
Ransomware Profits Dip as Fewer Victims Pay Extortion
28/01/2023
SOC Prime Cyber Security News
socprime
Turla Activity Detection: russian Cyberespionage Group Targeting Ukraine Uses Decade-Old USB-Delivered Andromeda Malware to Spread...
30/01/2023
socprime
7Layers
30/01/2023
socprime
Raspberry Robin Malware Detection: Enhanced Worm-Like Version Attacking European Financial Institutions
30/01/2023
socprime
SOC Prime Threat Bounty — December 2022 Results
30/01/2023
socprime
CVE-2022-42475 Detection: Zero-Day Vulnerability in FortiOS SSL-VPN Exploited in Attacks Against Government Entities and Large...
30/01/2023
socprime
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part I
30/01/2023
socprime
Rhadamanthys Malware Detection: New Infostealer Spread via Google Ads & Spam Emails to Target Crypto...
30/01/2023
socprime
Detect CVE-2022-47966 Exploits: Critical Zoho ManageEngine RCE Vulnerability Under Active Exploitation
30/01/2023
socprime
CVE-2023-24055 Detection: Notorious Vulnerability in KeePass Potentially Exposing Cleartext Passwords
30/01/2023
socprime
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part II
30/01/2023
socprime
Driving Business Growth in Turbulent Times from CISO’s Perspective: Part II
26/01/2023
socprime
IcedID Botnet Detection: Malvertising Attacks Abusing Google Pay-Per-Click (PPC) Ads
28/12/2022
socprime
Trident Ursa aka Gamaredon APT Attack Detection: Russia-Backed Hackers Escalate Offensive Activity by Targeting a...
23/12/2022
socprime
OWASSRF Exploit Detection: New Exploit Method Abuses Exchange Servers to Bypass ProxyNotShell (CVE-2022-41040 and CVE-2022-41082)...
23/12/2022
socprime
FateGrab/StealDeal Detection: Phishing Attacks by the UAC-0142 Group Against Ukrainian Government Entities Targeting DELTA Users
22/12/2022
socprime
SOC Prime Threat Bounty — November 2022 Results
15/12/2022
socprime
Detecting Fantasy Data Wiper Leveraged by Agrius APT in a Supply-Chain Attack
15/12/2022
socprime
AppleJeus Malware Detection: North Korea-Linked Lazarus APT Spreads Malicious Strains Masquerading as Cryptocurrency Apps
12/12/2022
Welive Cyber Security News
We Live Security
Why your data is more valuable than you may realize
30/01/2023
We Live Security
SwiftSlicer: New destructive wiper malware strikes Ukraine
30/01/2023
We Live Security
Are you in control of your personal data? – Week in security with Tony Anscombe
30/01/2023
We Live Security
Why your data is more valuable than you may realize
28/01/2023
We Live Security
APT group trojanizes Telegram app – Week in security with Tony Anscombe
26/01/2023
We Live Security
Hybrid commerce: Blurring the lines between business and pleasure
26/01/2023
We Live Security
Top 10 Venmo scams – and how to stay safe
26/01/2023
We Live Security
Tech support scammers are still at it: Here’s what to look out for in 2023
26/01/2023
We Live Security
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe
26/01/2023
We Live Security
Hybrid play: Leveling the playing field in online video gaming and beyond
26/01/2023
We Live Security
5 valuable skills your children can learn by playing video games
26/01/2023
We Live Security
Mastodon vs. Twitter: Know the differences
26/01/2023
We Live Security
10 tips to avoid Black Friday and Cyber Monday scams
13/01/2023
We Live Security
Know your payment options: How to shop and pay safely this holiday season
13/01/2023
We Live Security
Spyware posing as VPN apps – Week in security with Tony Anscombe
13/01/2023
We Live Security
RansomBoggs: New ransomware targeting Ukraine
13/01/2023
We Live Security
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin
13/01/2023
We Live Security
Top tips to save energy used by your electronic devices
13/01/2023
Naked Security News
naked security
Hive ransomware servers shut down at last, says FBI
28/01/2023
naked security
Dutch suspect locked up for alleged personal data megathefts
28/01/2023
naked security
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]
26/01/2023
naked security
Multi-million investment scammers busted in four-country Europol raid
26/01/2023
naked security
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]
26/01/2023
naked security
Serious Security: Unravelling the LifeLock “hacked passwords” story
26/01/2023
naked security
Apple patches are out – old iPhones get an old zero-day fix at last!
26/01/2023
naked security
Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security
26/01/2023
naked security
T-Mobile admits to 37,000,000 customer records stolen by “bad actor”
26/01/2023
naked security
GoTo admits: Customer cloud backups stolen together with decryption key
26/01/2023
naked security
Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond
13/01/2023
naked security
Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid
13/01/2023
naked security
PyTorch: Machine Learning toolkit pwned from Christmas to New Year
13/01/2023
naked security
S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text]
13/01/2023
naked security
Serious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches
13/01/2023
naked security
CircleCI – code-building service suffers total credential compromise
13/01/2023
naked security
RSA crypto cracked? Or perhaps not!
13/01/2023
naked security
Popular JWT cloud security library patches “remote” code execution hole
13/01/2023
Krebs on Security Cyber News
Krebs on Security
Happy 13th Birthday, KrebsOnSecurity!
26/01/2023
Krebs on Security
Identity Thieves Bypassed Experian Security to View Credit Reports
26/01/2023
Krebs on Security
Microsoft Patch Tuesday, January 2023 Edition
26/01/2023
Krebs on Security
Thinking of Hiring or Running a Booter Service? Think Again.
26/01/2023
Krebs on Security
New T-Mobile Breach Affects 37 Million Accounts
26/01/2023
Krebs on Security
Administrator of RSOCKS Proxy Botnet Pleads Guilty
26/01/2023
Krebs on Security
Experian Glitch Exposing Credit Files Lasted 47 Days
26/01/2023
Krebs on Security
Microsoft Patch Tuesday, December 2022 Edition
26/12/2022
Krebs on Security
Six Charged in Mass Takedown of DDoS-for-Hire Sites
26/12/2022
Krebs on Security
Hacked Ring Cams Used to Record Swatting Victims
26/12/2022
Krebs on Security
The Equifax Breach Settlement Offer is Real, For Now
26/12/2022
Krebs on Security
Hacked Ring Cams Used to Record Swatting Victims
22/12/2022
Krebs on Security
Hacked Ring Cams Used to Record Swatting Victims
20/12/2022
Krebs on Security
Six Charged in Mass Takedown of DDoS-for-Hire Sites
19/12/2022
Krebs on Security
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked
14/12/2022
Krebs on Security
New Ransom Payment Schemes Target Executives, Telemedicine
12/12/2022
Krebs on Security
ConnectWise Quietly Patches Flaw That Helps Phishers
05/12/2022
Krebs on Security
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
05/12/2022
Haxf4All Cyber Security News
Haxf4rall Security
SilentHound – Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.
08/09/2022
Haxf4rall Security
ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
08/09/2022
Haxf4rall Security
Three Sentenced in the UK for Selling Drugs on the Darkweb
08/09/2022
Haxf4rall Security
ForceAdmin: Create infinite UAC prompts forcing a user to run as admin
08/09/2022
Haxf4rall Security
Woman Heads to Prison for Hiring a "Hitman” on the Darkweb
08/09/2022
Haxf4rall Security
CVE-2022-29154: Rsync client-side arbitrary file write vulnerability
08/09/2022
Haxf4rall Security
Security Scorecards v4.5 releases: OSS Security Scorecards
08/09/2022
Haxf4rall Security
Apache Tomcat Scanner: scan for Apache Tomcat server vulnerabilities
08/09/2022
Haxf4rall Security
Kage – Graphical User Interface For Metasploit Meterpreter And Session Handler
08/09/2022
Haxf4rall Security
Jersey Teen Sentenced for Buying Amphetamine on Darkweb
08/09/2022
Haxf4rall Security
Three Sentenced in the UK for Selling Drugs on the Darkweb
07/09/2022
Haxf4rall Security
SilentHound – Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.
07/09/2022
Haxf4rall Security
Woman Heads to Prison for Hiring a "Hitman” on the Darkweb
07/09/2022
Haxf4rall Security
ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
07/09/2022
Haxf4rall Security
CVE-2022-29154: Rsync client-side arbitrary file write vulnerability
07/09/2022
Haxf4rall Security
ForceAdmin: Create infinite UAC prompts forcing a user to run as admin
07/09/2022
Haxf4rall Security
Apache Tomcat Scanner: scan for Apache Tomcat server vulnerabilities
07/09/2022
Haxf4rall Security
Security Scorecards v4.5 releases: OSS Security Scorecards
07/09/2022
Bleeping Computer Cybersecurity News
The Last Watchdog
GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress
30/01/2023
Bleeping Computer
Massive Microsoft 365 outage caused by WAN router IP change
28/01/2023
Bleeping Computer
The Week in Ransomware – January 27th 2023 – ‘We hacked the hackers’
28/01/2023
Bleeping Computer
U.S. sues Google for abusing dominance over online ad market
26/01/2023
Bleeping Computer
Microsoft shares workaround for unresponsive Windows Start Menu
26/01/2023
Bleeping Computer
VMware fixes critical security bugs in vRealize log analysis tool
26/01/2023
Bleeping Computer
Ransomware access brokers use Google ads to breach your network
26/01/2023
Bleeping Computer
Microsoft 365 outage takes down Teams, Exchange Online, Outlook
26/01/2023
Bleeping Computer
New stealthy Python RAT malware targets Windows in attacks
26/01/2023
Bleeping Computer
Lessons Learned from the Windows Remote Desktop Honeypot Report
26/01/2023
Bleeping Computer
Malware exploited critical Realtek SDK bug in millions of attacks
26/01/2023
Bleeping Computer
Zacks Investment Research data breach affects 820,000 clients
26/01/2023
Bleeping Computer
Hackers auction alleged source code for League of Legends
26/01/2023
The Last Watchdog
NEW TECH: How I started a company to supply democratized pentests to immunize websites
26/01/2023
Bleeping Computer
CISA: Federal agencies hacked using legitimate remote desktop tools
26/01/2023
The Last Watchdog
NEW TECH: DigiCert unveils ‘Trust Lifecyle Manager’ to centralize control of digital certificates
26/01/2023
The Last Watchdog
GUEST ESSAY — How threat detection services for SMBs are continuing to evolve and improve
26/01/2023
The Last Watchdog
SHARED INTEL: Here’s why security analysts need to remain on high alert for fake bug...
26/01/2023
Info Security Magazine Cyber News
Info Security Magazine
Microsoft: Update On-Premises Exchange Server Now
28/01/2023
Info Security Magazine
Global Action “Dismantles” Hive Ransomware Group
28/01/2023
Info Security Magazine
Security is Key to Business Transformation, Say IT Chiefs
28/01/2023
Info Security Magazine
New ‘Pig Butchering’ Scam in West Africa Impersonates US Financial Advisors
28/01/2023
Info Security Magazine
Black Basta Deploys PlugX Malware in USB Devices With New Technique
28/01/2023
Info Security Magazine
Multiple Vulnerabilities Found In Healthcare Software OpenEMR
28/01/2023
Info Security Magazine
CISA Warns Against Malicious Use of Legitimate RMM Software
26/01/2023
Info Security Magazine
Zacks Investment Research Confirms Breach Affecting 820,000 Customers
26/01/2023
Info Security Magazine
Iranian Group Cobalt Sapling Targets Saudi Arabia With New Persona
26/01/2023
Info Security Magazine
FBI Confirms Lazarus Group Was Behind $100m Harmony Hack
26/01/2023
Info Security Magazine
DragonSpark Hackers Evade Detection With SparkRAT and Golang
26/01/2023
Info Security Magazine
Just Half of Firms Have Sufficient Cybersecurity Budget
26/01/2023
Info Security Magazine
New Cheats May Emerge After Riot Games Hack
26/01/2023
Info Security Magazine
Regulator Stress Test Highlights Cyber Insurance Concerns
26/01/2023
Info Security Magazine
Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales
26/01/2023
Info Security Magazine
Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022
26/01/2023
Info Security Magazine
North Korean Group TA444 Shows ‘Startup’ Culture, Tries Numerous Infection Methods
26/01/2023
Info Security Magazine
Lloyds Bank Warns of 80% Surge in Advance Fee Scams
26/01/2023
Cyber Talk Cybersecurity News
Cyber Talk
Do you use OneDrive or Google Drive? Watch out for this malware
30/01/2023
Cyber Talk
5 ways private cloud enhances data privacy for businesses
30/01/2023
Cyber Talk
Unconsidered benefits of a consolidation strategy every CISO should know
30/01/2023
Cyber Talk
10 data privacy tips to protect your organization this year
28/01/2023
Cyber Talk
Account takeovers increasing and diversifying – but there’s a solution
28/01/2023
Cyber Talk
Eye-opening data privacy trends and statistics (2023 and beyond)
28/01/2023
Cyber Talk
How a fast-changing threat landscape catalyzed a cyber pandemic
28/01/2023
Cyber Talk
A step-by-step guide: How to create a data collection policy
28/01/2023
Cyber Talk
AI + ChatGPT applied to mainstream, hybrid meetings
28/01/2023
Cyber Talk
10 data privacy tips to protect your organization this year
26/01/2023
Cyber Talk
Amazing little-known ways to drive sustainability, IT and security growth
13/01/2023
Cyber Talk
You don’t choose your battles, they choose you
13/01/2023
Cyber Talk
OpenAI’s ChatGPT bot: The hazardous malware that it easily spits out
13/01/2023
Cyber Talk
Cyber security: The counterweight to cyber insurance
13/01/2023
Cyber Talk
Rising crypto fraud: How to protect yourself in the new year
13/01/2023
Cyber Talk
How to detect & prevent malicious bot traffic (2023)
13/01/2023
Cyber Talk
Rewiring global thinking around resilience, equity and sustainability
13/01/2023
Cyber Talk
Dangerous cyber threats you should expect in 2023
13/01/2023
Security on Tech Republic News
Security TechRepublic
Recent rise in SEO poisoning attacks compromise brand reputations
28/01/2023
Security TechRepublic
How hackers stole the personal data of 37 million T-Mobile customers
28/01/2023
Security TechRepublic
The risks of 5G security
28/01/2023
Security TechRepublic
Learn cutting-edge ethical hacking techniques for just $39.99
28/01/2023
Security TechRepublic
Survey: Cybersecurity budgets aren’t matching cybersecurity challenges
28/01/2023
Security TechRepublic
How to force Portainer to use HTTPS and upload your SSL certificates for heightened security
28/01/2023
Security TechRepublic
Securing IoT with Microsoft Defender for IoT sensors
28/01/2023
Security TechRepublic
Here’s how IT budgets should fill cybersecurity moats in 2023
28/01/2023
Security TechRepublic
How to use Microsoft KQL for SIEM insight
28/01/2023
Security TechRepublic
FBI takes down Hive ransomware group
28/01/2023
Security TechRepublic
Cloud email services bolster encryption against hackers
13/01/2023
Security TechRepublic
How to configure an SMTP server in a self-hosted instance Passbolt
13/01/2023
Security TechRepublic
Recent 2022 cyberattacks presage a rocky 2023
13/01/2023
Security TechRepublic
Security risk assessment checklist
13/01/2023
Security TechRepublic
BCDR Buyer’s Guide For MSPs
13/01/2023
Security TechRepublic
Business Continuity and Disaster Recovery Solutions Built For Managed Service Providers
13/01/2023
Security TechRepublic
SIRIS Business Continuity and Disaster Recovery
13/01/2023
Security TechRepublic
Ransomware attacks are decreasing, but companies remain vulnerable
13/01/2023
CSO Online Cybersecurity News
csonline
Timeline of the latest LastPass data breaches
30/01/2023
csonline
The CSO guide to top security conferences
30/01/2023
csonline
Economic headwinds could deepen the cybersecurity skills shortage
30/01/2023
csonline
How to survive below the cybersecurity poverty line
30/01/2023
csonline
FBI takes down Hive ransomware group in an undercover operation
28/01/2023
csonline
Hackers abuse legitimate remote monitoring and management tools in attacks
28/01/2023
csonline
US Maritime Administrator to study port crane cybersecurity concerns
26/01/2023
csonline
European data protection authorities issue record €1.65 billion in GDPR fines
26/01/2023
csonline
DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services
26/01/2023
csonline
How attackers might use GitHub Codespaces to hide malware delivery
26/01/2023
csonline
Remote.it takes steps toward zero trust with ‘single line of code’ provisioning
26/01/2023
csonline
Why it’s time to review your on-premises Microsoft Exchange patch status
26/01/2023
csonline
Perception Point launches Advanced Threat Protection for Zendesk
26/01/2023
csonline
Trustwave relaunches Advanced Continual Threat Hunting with human-led methodology
26/01/2023
csonline
QuSecure launches quantum-computing based security for endpoints
26/01/2023
csonline
How CISOs can manage the cybersecurity of high-level executives
26/01/2023
csonline
Chinese hackers targeted Iranian government entities for months: Report
26/01/2023
csonline
Many ICS flaws remain unpatched as attacks against critical infrastructure rise
26/01/2023
Schneier on Security Cyber News
Schneier on Security
Kevin Mitnick Hacked California Law in 1983
30/01/2023
Schneier on Security
A Guide to Phishing Attacks
30/01/2023
Schneier on Security
Friday Squid Blogging: Squid-Inspired Hydrogel
30/01/2023
Schneier on Security
NIST Is Updating Its Cybersecurity Framework
30/01/2023
Schneier on Security
The FBI Identified a Tor User
26/01/2023
Schneier on Security
AI and Political Lobbying
26/01/2023
Schneier on Security
Security Analysis of Threema
26/01/2023
Schneier on Security
Real-World Steganography
26/01/2023
Schneier on Security
Publisher’s Weekly Review of A Hacker’s Mind
26/01/2023
Schneier on Security
Friday Squid Blogging: Another Giant Squid Captured on Video
26/01/2023
Schneier on Security
No-Fly List Exposed
26/01/2023
Schneier on Security
Bulk Surveillance of Money Transfers
26/01/2023
Schneier on Security
US Cyber Command Operations During the 2022 Midterm Elections
26/01/2023
Schneier on Security
On Alec Baldwin’s Shooting
26/01/2023
Schneier on Security
LastPass Breach
28/12/2022
Schneier on Security
Arresting IT Administrators
28/12/2022
Schneier on Security
Friday Squid Blogging: Injured Giant Squid and Paddleboarder
26/12/2022
Schneier on Security
Hacking the JFK Airport Taxi Dispatch System
23/12/2022
The Last Watchdog Cybersecurity News
The Last Watchdog
GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress
30/01/2023
The Last Watchdog
NEW TECH: How I started a company to supply democratized pentests to immunize websites
26/01/2023
The Last Watchdog
NEW TECH: DigiCert unveils ‘Trust Lifecyle Manager’ to centralize control of digital certificates
26/01/2023
The Last Watchdog
SHARED INTEL: Here’s why security analysts need to remain on high alert for fake bug...
26/01/2023
The Last Watchdog
GUEST ESSAY — How threat detection services for SMBs are continuing to evolve and improve
26/01/2023
The Last Watchdog
FIRESIDE CHAT: Can ‘MLSecOps’ do for MLOps, what DevSecOps is doing for DevOps?
26/01/2023
The Last Watchdog
GUEST ESSAY: These common myths and misconceptions make online browsing very risky
13/01/2023
The Last Watchdog
GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks
13/01/2023
The Last Watchdog
GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue
13/01/2023
The Last Watchdog
GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance
13/01/2023
The Last Watchdog
GUEST ESSAY: Achieving trust — in a tumultuous 2023 that’s likely to come — can...
23/12/2022
The Last Watchdog
GUEST ESSAY: ‘Initial access brokers’ — IABs — specialize in enabling surreptitious access
19/12/2022
The Last Watchdog
MY TAKE: Poll shows consumers won’t patronize companies that fail to assure ‘digital trust’
15/12/2022
The Last Watchdog
GUEST ESSAY: Why ‘continuous pentesting’ is high among the trends set to accelerate in 2023
15/12/2022
The Last Watchdog
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream
12/12/2022
The Last Watchdog
MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruition
12/12/2022
The Last Watchdog
GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity
12/12/2022
The Last Watchdog
GUEST ESSAY: ‘Nag attacks’ — this new phishing variant takes full advantage of notification fatigue
01/12/2022
Security Boulevard News
Security Boulevard
VMware vRealize Log Insight VMSA-2023-0001 IOCs
28/01/2023
Security Boulevard
USENIX Security ’22 – R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav...
28/01/2023
Security Boulevard
Kevin Mitnick Hacked California Law in 1983
28/01/2023
Security Boulevard
CBA AND FIDO: One, Other, or Both?
28/01/2023
Security Boulevard
There’s No There There….Or is There? You Won’t Find Out With DLP
28/01/2023
Security Boulevard
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and...
28/01/2023
Security Boulevard
Gartner® Report: Prioritizing Security Controls for Enterprise Servers and End-User Endpoints
28/01/2023
Security Boulevard
Threat Hunting: The Cost-Effective Way to Protect Your Organization’s Bottom Line (and Keep the Hackers...
26/01/2023
Security Boulevard
Cybersecurity is Facing a Cataclysmic Problem
26/01/2023
Security Boulevard
Public Groups Identify Tesla Terrorist After Unexplained Police Delay
26/01/2023
Security Boulevard
Flexible Metal NASA Robot Tires Now Available for Bicycles
26/01/2023
Security Boulevard
Announcing a stable release of sigstore-python
14/01/2023
Security Boulevard
ManageEngine CVE-2022-47966 IOCs
14/01/2023
Security Boulevard
USENIX Security ’22 – Theresa Stadler, Bristena Oprisanu, Carmela Troncoso ‘Synthetic Data – Anonymisation Groundhog...
14/01/2023
Security Boulevard
Yikes, Control Web Panel has Critical RCE — Patch NOW
14/01/2023
Security Boulevard
Randall Munroe’s XKCD ‘Washing Machine Settings’
14/01/2023
Security Boulevard
Control Web Panel Vulnerability, CVE-2022-44877, Actively Exploited in the Wild
14/01/2023
Security Boulevard
Sonatype Nexus Lifecycle Boosts Open Source Security and Dependency Management
14/01/2023
McAfee Security News
McAfee
Myth-busting Antivirus Software Assumptions
30/01/2023
McAfee
How To Recognize An Online Scam
30/01/2023
McAfee
Start the New Year Right With This 3-Step Digital Detox
30/01/2023
McAfee
Celebrate National Download Day With This Safe Downloading Checklist
30/01/2023
McAfee
Everything You Need to Know About Identity Remediation
30/01/2023
McAfee
40 Years of the Internet – Tips for Staying Safe Online in 2023
30/01/2023
McAfee
Protecting Your Privacy This Year
30/01/2023
McAfee
Your Guide to Protecting Your Credit
30/01/2023
McAfee
3 Tools to Round Out Your Privacy Protection Toolbox
30/01/2023
McAfee
The Big Difference Between Online Protection Software and Antivirus
30/01/2023
McAfee
New Year, New You: Start Fresh With McAfee Protection Score
30/01/2023
McAfee
The Case for Your Security at CES 2023
30/01/2023
McAfee
Protecting the Universal Remote Control of Your Life—Your Smartphone
30/01/2023
McAfee
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
30/01/2023
McAfee
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
30/01/2023
McAfee
The Rise and Risks of AI Art Apps
30/01/2023
McAfee
Can Apple Macs get Viruses?
30/01/2023
McAfee
What Should You Do if Your Identity Has Been Stolen?
30/01/2023
The Guardian Cybersecurity News
The Guardian UK
Medibank hacker says ransom demand was US$10m as purported abortion health records posted
30/01/2023
The Guardian UK
Is it worth taking out personal cyber insurance in case you are caught up in...
30/01/2023
The Guardian UK
Medibank hackers announce ‘case closed’ and dump huge data file on dark web
30/01/2023
The Guardian UK
Password app LastPass hit by cybersecurity breach but says data remains safe
30/01/2023
The Guardian UK
I am a Medibank customer. Am I affected by the cyber-attack? What can I do...
30/01/2023
The Guardian UK
Telstra sorry for publishing up to 130,000 customers’ details online
30/01/2023
The Guardian UK
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
30/01/2023
The Guardian UK
What is LockBit ransomware and how does it operate?
30/01/2023
The Guardian UK
Clare O’Neil on national security amid cyber hacks and threats to democracy
30/01/2023
The Guardian UK
MP calls for action on crime in ‘under siege’ town – as it happened
30/01/2023
The Guardian UK
US authorities seize servers for Hive ransomware group
30/01/2023
The Guardian UK
Australia to consider European-style right to be forgotten privacy laws
30/01/2023
The Guardian UK
Fake text messages on the rise, but experts warn Australians most losses are from more...
30/01/2023
The Guardian UK
JD Sports hit by cyber-attack that leaked 10m customers’ data
30/01/2023
The Guardian UK
Can I tell you a secret? Episode five: a mother’s love
13/01/2023
The Guardian UK
Can I tell you a secret? Episode four: a reckoning
13/01/2023
The Guardian UK
Can I tell you a secret? Episode six: the winding clock | podcast
13/01/2023
The Guardian UK
Can I tell you a secret? Episode seven: an update – podcast
13/01/2023
CSH Cyber Security Hub Cybersecurity News
CSH CYBER SECURITY HUB
Prevent advanced ransomware attacks with good email security
30/01/2023
CSH CYBER SECURITY HUB
The top XDR investment decisions for CISOs
28/01/2023
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
28/01/2023
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
28/01/2023
CSH CYBER SECURITY HUB
Why good email security is essential for every business
28/01/2023
CSH CYBER SECURITY HUB
Adopting GRC and cyber security to help facilitate enterprise risk management
28/01/2023
CSH CYBER SECURITY HUB
Are smart devices cyber secure?
28/01/2023
CSH CYBER SECURITY HUB
Top tips for employee cyber security training
28/01/2023
CSH CYBER SECURITY HUB
CISO strategies and tactics for incident response
28/01/2023
CSH CYBER SECURITY HUB
The most dangerous cyber security threats of 2023
28/12/2022
CSH CYBER SECURITY HUB
Impact of cloud configuration security practices
22/12/2022
CSH CYBER SECURITY HUB
How carding can affect your business
22/12/2022
CSH CYBER SECURITY HUB
Why Privileged Access Management is a priority task
20/12/2022
CSH CYBER SECURITY HUB
The global state of DevSecOps
20/12/2022
CSH CYBER SECURITY HUB
Why Privileged Access Management is a priority task
15/12/2022
CSH CYBER SECURITY HUB
The global state of the cyber security industry 2022
12/12/2022
CSH CYBER SECURITY HUB
The biggest data breaches and leaks of 2022
12/12/2022
CSH CYBER SECURITY HUB
Revising your backup strategy in 2023
24/11/2022
Heimdal Security Cyber News
heimdal security
How Hackers Used Legitimate Software to Breach U.S. Federal Agencies
30/01/2023
heimdal security
Killnet Russian Hacking Group Launches DDoS Attacks on German Websites
30/01/2023
heimdal security
What Is an SEO Poisoning Attack and How Does It Affect Network Security?
30/01/2023
heimdal security
Explaining Vulnerability Scanning: Definition, Types, Best Practices
30/01/2023
heimdal security
How to Choose Between Access Control Models? RBAC vs. ABAC vs. PBAC
30/01/2023
heimdal security
FBI Closes Down Hive Ransomware Gang: What Does This Mean for the Security Landscape?
30/01/2023
heimdal security
Security Flaws Disclosed in Samsung’s Galaxy Store App for Android
30/01/2023
heimdal security
Aurora Infostealer Malware Deploys Shapeshifting Tactics
30/01/2023
heimdal security
What Is Spyware, What It Does, and How to Block It?
30/01/2023
heimdal security
What Is Kerberos Authentication?
30/01/2023
heimdal security
Threat Detection and Response (TDR) – An Overview
30/01/2023
heimdal security
40 Windows CMD Commands that Will Make You Feel Like a Real Hacker
30/01/2023
heimdal security
Identity Reveal: Threat Actor Behind Golden Chicken Malware Service Exposed
30/01/2023
heimdal security
SwiftSlicer New Data-Wiping Malware Attacks Windows Operating Systems
30/01/2023
heimdal security
New Mimic Ransomware Uses Windows Search Engine to Find and Encrypt Files
30/01/2023
heimdal security
How Hackers Used Legitimate Software to Breach U.S. Federal Agencies
26/01/2023
heimdal security
Facebook to Pay $725 Million to Settle Lawsuit Over Data Leak
28/12/2022
heimdal security
Cryptocurrency Exchange BTC.com Suffers Massive Cyber Attack
28/12/2022
Security affairs Cyber News
security affairs
Sandworm APT group hit Ukrainian news agency with five data wipers
30/01/2023
security affairs
CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack
28/01/2023
security affairs
Hacker accused of having stolen personal data of all Austrians and more
28/01/2023
security affairs
Patch management is crucial to protect Exchange servers, Microsoft warns
28/01/2023
security affairs
FBI confirms that North Korea-linked Lazarus APT is behind Harmony Horizon Bridge $100 million cyber...
26/01/2023
security affairs
GoTo revealed that threat actors stole customers’ backups and encryption key for some of them
26/01/2023
security affairs
Pakistan hit by nationwide power outage, is it the result of a cyber attack?
26/01/2023
security affairs
VMware warns of critical code execution bugs in vRealize Log Insight
26/01/2023
security affairs
DragonSpark threat actor avoids detection using Golang source code Interpretation
26/01/2023
security affairs
French rugby club Stade Français leaks source code
26/01/2023
security affairs
North Korea-linked TA444 group turns to credential harvesting activity
26/01/2023
security affairs
Google Chrome 109 update addresses six security vulnerabilities
26/01/2023
security affairs
Zacks Investment Research data breach impacted hundreds of thousands of customers
26/01/2023
security affairs
Experts warn of a surge of attacks exploiting a Realtek Jungle SDK RCE (CVE-2021-35394)
26/01/2023
security affairs
GuLoader implements new evasion techniques
28/12/2022
security affairs
Facebook (Meta) to settle Cambridge Analytica data leak for $725M
28/12/2022
security affairs
Uncovering the link between PrivateLoader PPI service and RisePro stealer
28/12/2022
security affairs
Crooks impersonate brands using search engine advertisement services
28/12/2022
Helpnet Security Cyber News
help net security
50% of organizations exceed their budgeted spend on cloud storage
28/01/2023
help net security
Open source skills continue to be in high demand
28/01/2023
help net security
3 business application security risks businesses need to prepare for in 2023
28/01/2023
help net security
New infosec products of the week: January 27, 2023
28/01/2023
help net security
OneSpan acquires ProvenDB to address customers’ secure vaulting needs
28/01/2023
help net security
ThreatConnect Platform 7.0 enables organizations to modernize security operations
26/01/2023
help net security
Halo Security unveils KEV feature to improve attack surface visibility
26/01/2023
help net security
PK Secure Email helps users discover sensitive information in email communication
26/01/2023
help net security
Lupovis Prowl reduces time wasted investigating false positives
26/01/2023
help net security
SpyCloud Compass identifies infected devices accessing critical workforce apps
26/01/2023
help net security
Perimeter 81’s malware protection defends users from internet-borne threats
26/01/2023
help net security
Supply chain attacks caused more data compromises than malware
26/01/2023
help net security
ChatGPT is a bigger threat to cybersecurity than most realize
26/01/2023
help net security
How businesses can bolster their cybersecurity defenses with open source
26/01/2023
help net security
Attackers use portable executables of remote management software to great effect
26/01/2023
help net security
Cyberpion expands management team and appoints Marc Gaffan as CEO
13/01/2023
help net security
Critical vulnerabilities in Siemens PLC devices could allow bypass of protected boot features (CVE-2022-38773)
13/01/2023
help net security
Scott Harrell joins Infoblox as CEO
13/01/2023
Cisco Security Blog Cyber News
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
18/12/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
18/12/2022
Cisco Security Blog
Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled...
09/11/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled...
27/10/2022
Cisco Security Blog
Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication
22/09/2022
Cisco Security Blog
Cisco Event Response: August 2022 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication
25/08/2022
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
12/08/2022
Cisco Security Blog
Cisco Event Response: Corporate Network Security Incident
11/08/2022
Cisco Security Blog
blogs.cisco – What you see is what you get … to protect
03/09/2021
Cisco Security Blog
Cisco Security Blog – Anatomy of a Breach: Preventing the Next Advanced Attack by Nirav...
13/07/2021
Cisco Security Blog
Cisco Security Blog – The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control
13/07/2021
threatpost
threatpost – Cisco BPA, WSA Bugs Allow Remote Cyberattacks
10/07/2021