Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Infosecurity Magazine
Infosecurity Magazine
North Korea Hacks Crypto: More Targets, Lower Gains – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 North Korea-backed threat actors hacked more crypto platforms than ever in...
Infosecurity Magazine
Data Privacy Week: US Data Breaches Surge, 2023 Sees 78% Increase in Compromises – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Written by The number of reported data compromises in the US...
Infosecurity Magazine
Southern Water Confirms Data Breach Following Black Basta Claims – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 UK water supplier Southern Water has confirmed that it suffered a...
Infosecurity Magazine
Pwn2Own Contest Unearths Dozens of Zero-Day Vulnerabilities – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Some of the world’s top ethical hackers are competing in Tokyo...
Infosecurity Magazine
HPE Says SolarWinds Hackers Accessed its Emails – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 An infamous Russian state hacking unit compromised the cloud-based email environment...
Infosecurity Magazine
Why Bulletproof Hosting is Key to Cybercrime-as-a-Service – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The emergence of cybercrime-as-a-service (RaaS) has lowered the entry barrier into...
Infosecurity Magazine
X Makes Passkeys Available for US-Based Users – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Social media giant X (formerly Twitter) has made passkeys available as...
Infosecurity Magazine
Exploit Code Released For Critical Fortra GoAnywhere Bug – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Threat actors could soon strike after a proof-of-concept exploit was published...
Infosecurity Magazine
New Cybersecurity Governance Code Puts Cyber Risks on Boardroom Agenda – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The UK government has published a new Code of Practice on...
Infosecurity Magazine
French Watchdog Slams Amazon with €32m Fine for Spying on Workers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Amazon France Logistique, a subsidiary of the e-commerce giant that manages...
Infosecurity Magazine
Australia Sanctions Russian Hacker Behind Medibank Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The Australian government has publicly named a Russian cybercriminal as responsible...
Infosecurity Magazine
Data Privacy Week: Lack of Understanding, Underfunding Threaten Data Privacy and Compliance – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A lack of understanding combined with budgetary squeezes are significant obstacles...
Infosecurity Magazine
Russian Coldriver Hackers Deploy Malware to Target Western Officials – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Russian threat group Coldriver has expanded its targeting of Western officials...
Infosecurity Magazine
Experts Urge Clearer Direction in South Africa’s Cyber Strategy – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 South Africa, known to be 'the world's most internet-addicted country,' finds...
Infosecurity Magazine
TA866 Resurfaces in Targeted OneDrive Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cybersecurity researchers at Proofpoint have identified the resurgence of TA866 in...
Infosecurity Magazine
New Malware Campaign Exploits 9hits in Docker Assault – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Security researchers have uncovered a novel cyber-attack campaign targeting vulnerable Docker...
Infosecurity Magazine
NCSC Builds New “Cyber League” Threat Tracking Community – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 One of the UK’s leading cybersecurity agencies has announced plans to...
Infosecurity Magazine
AI, Gaming, FinTech Named Major Cybersecurity Threats For Kids – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The heightened utilization of AI tools and potential vulnerabilities in gaming...
Infosecurity Magazine
GitHub Rotates Credentials and Patches New Bug – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 GitHub has revealed that service disruption in December was due to...
Infosecurity Magazine
New Research: Tackling .NET Malware With Harmony Library – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Security researchers have recently unveiled strategic insights into countering .NET malware...
Infosecurity Magazine
Anti-Hezbollah Groups Hack Beirut Airport Screens – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Beirut’s international airport faced a cyber-attack on Sunday, January 8, reportedly...
Infosecurity Magazine
Turkish APT Sea Turtle Resurfaces, Spies on Dutch IT Firms – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Sea Turtle, a group of hackers aligned with the Turkish government,...
Infosecurity Magazine
North Korean Hackers Stole $600m in Crypto in 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 North Korean hackers stole at least $600m in cryptocurrency in 2023,...
Infosecurity Magazine
Merck Settles With Insurers Over $700m NotPetya Claim – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Merck has finally reached a settlement with its insurers after they...
Infosecurity Magazine
Security Firm Certik’s Account Hijacked to Spread Crypto Drainer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A Web3 security vendor was tricked by a social media phishing...
Infosecurity Magazine
19 xDedic Cybercrime Market Users and Admins Face Prison – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The US Justice Department (DoJ) announced that 19 individuals involved in...
Infosecurity Magazine
Cyber-Attacks Drain $1.84bn from Web3 in 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cyber-attacks targeting Web3 cost organizations $1.84bn in 2023 across 751 incidents,...
Infosecurity Magazine
NIST Fortifies Chatbots and Self-Driving Cars Against Digital Threats – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 In a landmark move, the US National Institute of Standards and...
Infosecurity Magazine
23andMe Blames User “Negligence” for Data Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 DNA testing firm 23andMe has argued the victims are responsible for...
Infosecurity Magazine
LastPass Enforces 12-Character Master Passwords – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Two years after suffering a series of major beaches, LastPass has...
Posts pagination
1
…
26
27
28
…
52
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025