Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Infosecurity Magazine
Infosecurity Magazine
Bitmarck Halts Operations Due to Cybersecurity Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 German IT service provider Bitmarck has confirmed bringing all of its...
Infosecurity Magazine
South Korean Lures Used to Deploy ROKRAT Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The North Korean threat actor known as APT37 has been observed...
Infosecurity Magazine
Hackers Exploit High Severity Flaw in TBK DVR Camera System – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A five-year-old vulnerability in TBK’s DVR camera system (CVE-2018-9995) has been...
Infosecurity Magazine
T-Mobile Reveals Second Breach of the Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 T-Mobile USA has begun notifying customers impacted by yet another breach...
Infosecurity Magazine
UK Gun Owners May Be Targeted After Rifle Association Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The National Smallbore Rifle Association (NSRA) has warned members of possible...
Infosecurity Magazine
Advanced Fee Fraud Surges by Over 600% – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Advance fee fraud has surged eight-fold between the year ending March...
Infosecurity Magazine
Ransomware Attack Disrupts IT Network at Hardenhuish School – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A UK secondary school has confirmed it was hit by a...
Infosecurity Magazine
Global Cyber Attacks Rise by 7% in Q1 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Weekly cyber-attacks have increased worldwide by 7% in Q1 2023 compared...
Infosecurity Magazine
Android Apps Fail to Protect User Data During Device Transfer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Multiple Android applications have been observed not invalidating or revalidating session...
Infosecurity Magazine
Man Gets Four Years for Stealing Bitcoins Seized by Feds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 An Ohio man has been sentenced to four years and three...
Infosecurity Magazine
Vietnamese Hackers Linked to ‘Malverposting’ Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A recent ‘malverposting’ campaign linked to a Vietnamese threat actor has been...
Infosecurity Magazine
#RSAC: Cyber-Attacks on Civilian Infrastructure Should Be War Crimes, says Ukraine Official – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A Ukrainian security official speaking at the RSA Conference has called...
Infosecurity Magazine
RTM Locker Ransomware Targets Linux Architecture – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A new ransomware binary targeting Linux systems has been attributed to...
Infosecurity Magazine
APT Groups Expand Reach to New Industries and Geographies – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 An increasing number of advanced persistent threat (APT) groups have been...
Infosecurity Magazine
#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 New security solutions and ideas are needed to overcome the unique...
Infosecurity Magazine
Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The threat actor known as Alloy Taurus has been observed deploying...
Infosecurity Magazine
#RSAC: US DoJ Prioritizes Victim Support in Cybercrime Crackdown
The US Department of Justice’s (DoJ) approach to disrupting and preventing cybercrime was laid bare by...
Infosecurity Magazine
CFPB Employee Sends 256,000 Consumers’ Data to Personal Email
An employee from the US Consumer Financial Protection Bureau (CFPB) has reportedly forwarded confidential records of...
Infosecurity Magazine
Evil Extractor Targets Windows Devices to Steal Sensitive Data
The attack tool known as Evil Extractor and developed by a company called Kodex as an...
Infosecurity Magazine
Trojanized Installers Used to Distribute Bumblebee Malware
Popular software tools such as Zoom, Cisco AnyConnect, ChatGPT and Citrix Workspace have been trojanized to...
Infosecurity Magazine
North Korean Hacker Suspected in 3CX Software Supply Chain Attack
The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach,...
Infosecurity Magazine
Daggerfly APT Targets African Telecoms Firm With New MgBot Malware
The APT group known as Daggerfly (as well as Evasive Panda and Bronze Highland) has been...
Infosecurity Magazine
ChatGPT-Related Malicious URLs on the Rise
The number of newly registered and squatting domains related to ChatGPT grew by 910% monthly between...
Infosecurity Magazine
#CYBERUK23: UK Strengthens Cybersecurity Audits for Government Agencies
The UK Government has officially launched GovAssure, a new regime of independent audits of government agencies’...
Infosecurity Magazine
Iranian Nation-State Actor “Mint Sandstorm” Weaponizes N-day Flaws
A threat actor associated with Iranian nation-state hackers has been weaponizing N-day vulnerabilities, as well as...
Infosecurity Magazine
#CYBERUK23: Threat Posed by ‘Irresponsible’ Use of Commercial Hacking Tools Increasing, NCSC Warns
Spyware, hackers for hire and access to other cyber capabilities such as hacking-as-a-service kits are expected...
Infosecurity Magazine
Raspberry Robin Adopts Unique Evasion Techniques
Threat actors relying on the Raspberry Robin malware have been observed adopting unique evasion techniques to...
Infosecurity Magazine
Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices
Nurse call systems and infusion pumps have been found to be the riskiest connected medical devices,...
Infosecurity Magazine
Goldoson Malware Found in Dozens of Google Play Store Apps
Security researchers have discovered a new malicious software library capable of collecting lists of installed applications,...
Infosecurity Magazine
MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms
The Iranian government-sponsored threat actor known as MuddyWater has been observed using the legitimate SimpleHelp remote...
Posts navigation
1
…
39
40
41
Latest News
CSO - Online
So entgiften Sie Ihre Sicherheitskultur – Source: www.csoonline.com
19/12/2024
CSO - Online
Top security solutions being piloted today — and how to do it right – Source: www.csoonline.com
19/12/2024
CSO - Online
Die 10 häufigsten LLM-Schwachstellen – Source: www.csoonline.com
19/12/2024
CSO - Online
Sehr geehrter CEO, – Source: www.csoonline.com
19/12/2024
CSO - Online
European authorities say AI can use personal data without consent for training – Source: www.csoonline.com
19/12/2024
securelist.com
Attackers exploiting a patched FortiClient EMS vulnerability in the wild – Source: securelist.com
19/12/2024