Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Infosecurity Magazine
Infosecurity Magazine
Canadian Government Data Stolen By Chinese Hackers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: At least 20 Canadian government networks have been compromised by Chinese state-sponsored...
Infosecurity Magazine
North Korean Hackers Collaborate with Play Ransomware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Written by A North Korean-backed hacking group has engaged in a ransomware...
Infosecurity Magazine
Government Sector Suffers 236% Surge in Malware Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Global threat actors have been ramping up attacks on government targets, with...
Infosecurity Magazine
Over 80% of US Small Businesses Have Been Breached – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A growing number of US small businesses are taking preventative security measures,...
Infosecurity Magazine
LiteSpeed Cache Plugin Vulnerability Poses Admin Access Risk – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A vulnerability in the LiteSpeed Cache plugin for WordPress, which has over...
Infosecurity Magazine
Updated FakeCall Malware Targets Mobile Devices with Vishing – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A newly evolved form of malware called FakeCall, known for its advanced...
Infosecurity Magazine
Apple Rolls Out Major Security Update to Patch macOS and iOS Vulnerabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Apple has released security patches for 90 of its services and operating...
Infosecurity Magazine
CISA Launches First International Cybersecurity Plan – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The US Cybersecurity and Infrastructure Security Agency (CISA) has published its first...
Infosecurity Magazine
Over Half of US County Websites “Could Be Spoofed” – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Security experts have sounded another US election warning after claiming that the...
Infosecurity Magazine
Midnight Blizzard Spearphishing Campaign Targets Thousands with RDP Files – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Microsoft has warned of an ongoing infostealing campaign from notorious Russian APT...
Infosecurity Magazine
New LightSpy Spyware Targets iOS with Enhanced Capabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A newer version of the LightSpy spyware, known for targeting iOS devices,...
Infosecurity Magazine
Chenlun’s Evolving Phishing Tactics Target Trusted Brands – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: An ongoing, sophisticated phishing campaign has been observed targeting individuals with text...
Infosecurity Magazine
Law Enforcement Operation Takes Down Redline and Meta Infostealers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A global law enforcement operation has disrupted infrastructure for the Redline and...
Infosecurity Magazine
NIS2 Compliance Puts Strain on Business Budgets – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Meeting compliance requirements with the EU’s Network and Information Security (NIS)2 Directive...
Infosecurity Magazine
Suspicious Social Media Accounts Deployed Ahead of COP29 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A network of 71 suspicious accounts on X has been deployed ahead...
Infosecurity Magazine
Five Eyes Agencies Launch Startup Security Initiative – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The UK, US, Canada, New Zealand and Australian governments have launched a...
Infosecurity Magazine
ICO: 55% of UK Adults Have Had Data Lost or Stolen – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The UK’s privacy watchdog has issued a stern warning to the nation’s...
Infosecurity Magazine
Evasive Panda’s CloudScout Toolset Targets Taiwan – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A newly documented toolset, CloudScout, developed by the advanced persistent threat (APT)...
Infosecurity Magazine
New Type of Job Scam Targets Financially Vulnerable Populations – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A surge in online job scams targeting financially vulnerable individuals has been...
Infosecurity Magazine
Russian Malware Campaign Targets Ukrainian Recruits Via Telegram – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Russian threat actors are targeting the devices of Ukrainian military recruits in...
Infosecurity Magazine
Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A team from Vietnam scooped the top prize at the very first...
Infosecurity Magazine
AI-Powered BEC Scams Zero in on Manufacturers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Business email compromise (BEC) threats are on the rise and now account...
Infosecurity Magazine
Change Healthcare Breach Affects 100 Million Americans – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The Change Healthcare ransomware attack has impacted the personal information of 100...
Infosecurity Magazine
Ukraine Warns of Mass Phishing Campaign Targeting Citizens Data – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Ukrainian authorities have warned of a mass phishing attack aimed at stealing...
Infosecurity Magazine
Lazarus Group Exploits Google Chrome Flaw in New Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: A recently discovered cyber-attack by the notorious Lazarus Group, including its BlueNoroff...
Infosecurity Magazine
Penn State Settles for $1.25M Over Cybersecurity Violations – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Pennsylvania State University (Penn State) has agreed to pay $1.25m to resolve...
Infosecurity Magazine
White House Issues AI National Security Memo – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The White House has issued a National Security Memorandum (NSM) on AI,...
Infosecurity Magazine
Embargo Ransomware Gang Deploys Customized Defense Evasion Tools – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: The Embargo ransomware group is deploying customized Rust-based tooling to overcome cybersecurity...
Infosecurity Magazine
Former British PM Cameron Calls for Tech Engagement with China Despite Cyber Threats – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Written by The US, UK and like-minded nations should strengthen their security...
Infosecurity Magazine
70% of Leaders See Cyber Knowledge Gap in Employees – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: Nearly 70% of business leaders believe their employees lack critical cybersecurity knowledge, a...
Posts pagination
1
…
19
20
21
…
52
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025