Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
CSH CYBER SECURITY HUB
CSH CYBER SECURITY HUB
The state of Cloud configuration security practices by Olivia Powel – CSHUB – Find out where organizations need to focus their efforts to secure their cloud applications as revealed by the results of Cyber Security Hub’s Cloud Configuration Security Practices survey.
https://www.cshub.com/cloud/articles/the-state-of-cloud-configuration-security-practices-2 The use of the cloud is set to grow exponentially throughout 2022. The Cloud Configuration...
CSH CYBER SECURITY HUB
IOTW: Latitude Financial data breach affects 14 million people
IOTW: Latitude Financial data breach affects 14 million people The data stolen included personal information such...
CSH CYBER SECURITY HUB
The role of API inventory in SBOM and cyber security
The role of API inventory in SBOM and cyber security This article explores the importance of...
CSH CYBER SECURITY HUB
Twitter source code leaked via GitHub
Twitter source code leaked via GitHub Twitter issued an DMCA takedown notice to GitHub to get...
CSH CYBER SECURITY HUB
SHEIN fined US$1.9mn over data breach affecting 39 million customers
SHEIN fined US$1.9mn over data breach affecting 39 million customers The fast fashion brand failed to...
CSH CYBER SECURITY HUB
How carding can affect your business
How carding can affect your business An exploration of the carding threat vector and why ecommerce...
CSH CYBER SECURITY HUB
Banking Trojan apocalypse: how hackers are stealing millions
Banking Trojan apocalypse: how hackers are stealing millions A guide to what Trojan malware is and...
CSH CYBER SECURITY HUB
How does CISO strategy prevent threats?
How does CISO strategy prevent threats? Explore about the challenges CISO was facing to protect the...
CSH CYBER SECURITY HUB
How to foster secure and efficient data practices
How to foster secure and efficient data practices Discover how to apply secure file transfer practices...
CSH CYBER SECURITY HUB
Cybercriminals are using ChatGPT to create malware
Cybercriminals are using ChatGPT to create malware How malicious parties are using AI chatbots to help...
CSH CYBER SECURITY HUB
IOTW: Malicious actors gain access to GitHub source code
IOTW: Malicious actors gain access to GitHub source code A hacker has cloned repositories associated with...
CSH CYBER SECURITY HUB
The dangerous vulnerabilities caused by weak email security
The dangerous vulnerabilities caused by weak email security Why email security is integral to protecting your...
CSH CYBER SECURITY HUB
What is business email compromise?
What is business email compromise? Cyber Security Hub investigates a threat vector that specifically targets employees...
CSH CYBER SECURITY HUB
The ultimate guide to malware
The ultimate guide to malware This all-encompassing guide explores what malware is, how attacks using this...
CSH CYBER SECURITY HUB
Google suspends Pinduoduo app over malware concerns
Google suspends Pinduoduo app over malware concerns The app has been suspended for failing to be...
CSH CYBER SECURITY HUB
IOTW: Source code stolen in Reddit phishing attack
IOTW: Source code stolen in Reddit phishing attack Compromised employee credentials allowed the hacker to access...
CSH CYBER SECURITY HUB
We are less than a year away from a cyber attack credited to ChatGPT
We are less than a year away from a cyber attack credited to ChatGPT Director of...
CSH CYBER SECURITY HUB
IOTW: Russian hackers target NATO sites with DDoS attack
IOTW: Russian hackers target NATO sites with DDoS attack The cyber attack has reportedly affected NATOs...
CSH CYBER SECURITY HUB
German airports hit with DDoS attack
German airports hit with DDoS attack The suspected attack took the websites of seven airports offlineLeer...
CSH CYBER SECURITY HUB
How Covid-19 impacted cyber security challenges, focus and spends
How Covid-19 impacted cyber security challenges, focus and spends Practitioner insight on how cyber security challenges,...
CSH CYBER SECURITY HUB
Top seven hacks and cyber security threats in APAC
Top seven hacks and cyber security threats in APAC Cyber Security Hub explores some of the...
CSH CYBER SECURITY HUB
Why healthcare providers are focusing on cyber resilience
Why healthcare providers are focusing on cyber resilience Cyber Security Hub interviews Jojo Nufable, group IT...
CSH CYBER SECURITY HUB
IOTW: US Marshals Service suffers ransomware attack
IOTW: US Marshals Service suffers ransomware attack The cyber attack saw confidential information held by the...
CSH CYBER SECURITY HUB
What are DDoS attacks?
What are DDoS attacks? Cyber Security Hub explores how and why malicious actors launch DDoS attacksLeer...
CSH CYBER SECURITY HUB
IOTW: Ransomware gang allegedly hacks Ring doorbells
IOTW: Ransomware gang allegedly hacks Ring doorbells Amazon has not yet confirmed that allegations of a...
CSH CYBER SECURITY HUB
What is phishing?
What is phishing? Cyber Security Hub explores what phishing attacks are, why they are launched and...
CSH CYBER SECURITY HUB
IOTW: BreachForums shuts down after FBI arrests its top admin
IOTW: BreachForums shuts down after FBI arrests its top admin BreachForums, a dark web hacking forum,...
CSH CYBER SECURITY HUB
Why do hackers target cryptocurrencies?
Why do hackers target cryptocurrencies? Cyber Security Hub explores why cryptocurrencies are an ever-growing target for...
CSH CYBER SECURITY HUB
Have your say: the global state of cyber security
Have your say: the global state of cyber security Cyber Security Hub’s annual survey offers cyber...
CSH CYBER SECURITY HUB
The benefits of automating enterprise cyber security
The benefits of automating enterprise cyber security Insights on perspectives on automation imperatives, inhibitors, talent and...
Posts navigation
1
2
Latest News
The Register Security
This is not just any ‘cyber incident’ … this is an M&S ‘cyber incident’ – Source: go.theregister.com
23/04/2025
The Register Security
UN says Asian scam call center epidemic expanding globally amid political heat – Source: go.theregister.com
23/04/2025
securityweek.com
Terra Security Raises $8M for Agentic AI Penetration Testing Platform – Source: www.securityweek.com
23/04/2025
securityweek.com
Cyberattack Knocks Texas City’s Systems Offline – Source: www.securityweek.com
23/04/2025
securityweek.com
Many Malware Campaigns Linked to Proton66 Network – Source: www.securityweek.com
23/04/2025
securityweek.com
Legacy Google Service Abused in Phishing Attacks – Source: www.securityweek.com
23/04/2025