Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Infosecurity Magazine
Infosecurity Magazine
USB Drives Used as Trojan Horses By Camaro Dragon – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 New versions of Chinese espionage malware have been observed spreading rapidly...
Infosecurity Magazine
#InfosecurityEurope: BlackBerry Cybersecurity President Warns Against Heavy-Handed AI Regulation – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The threats posed by the malicious use of generative AI tools,...
Infosecurity Magazine
NCSC Updates Cybersecurity Guidance for the Legal Sector – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The UK’s National Cyber Security Centre (NCSC) has released updated guidance...
Infosecurity Magazine
Manchester University Breach Victims Hit with Triple Extortion – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Staff and students at Manchester University have been sent threatening emails...
Infosecurity Magazine
FBI Analyst Gets Three Years For National Security Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 An FBI analyst has been sentenced to 46 months behind bars...
Infosecurity Magazine
#InfosecurityEurope Case Study: Attack Surface Operations at Nationwide – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 As the UK’s largest building society, Nationwide has 18,000 users on...
Infosecurity Magazine
#InfosecurityEurope: Experts Highlight Evolving Attack Techniques – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cyber-criminals are infamous for their ability to pivot quickly in the...
Infosecurity Magazine
Apple Addresses Exploited Security Flaws in iOS, macOS and Safari – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Apple has released a series of updates for its operating systems...
Infosecurity Magazine
US Justice Department Launches New National Security Cyber Section – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The US Department of Justice (DOJ) has announced the establishment of...
Infosecurity Magazine
#InfosecurityEurope: Drones Contain Over 156 Different Cyber Threats, Angoka Research Finds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Drones, also known as unmanned aerial vehicles (UAVs), are being adopted...
Infosecurity Magazine
RedEyes Group Targets Individuals with Wiretapping Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The North Korean state-sponsored advanced persistent threat (APT) group RedEyes (also...
Infosecurity Magazine
#InfosecurityEurope: It’s Time to Think Creatively to Combat Skills Shortages – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Organizations should take a fresh look at their recruitment policies, hiring...
Infosecurity Magazine
#InfosecurityEurope: Industry Pros Urged to Advocate Neuroinclusion – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cybersecurity professionals were today urged to fight for a more neuroinclusive...
Infosecurity Magazine
#InfosecurityEurope: Hackers Are the Immune System of the Digital Age – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Network defenders must be as fast and innovative as their adversaries and...
Infosecurity Magazine
#InfosecurityEurope: Dunelm Shifts Security to the Edge – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Furniture retailer Dunelm has improved its security, and the performance of...
Infosecurity Magazine
#InfosecurityEurope: Angoka Named UK’s Most Innovative Cyber SME of 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The UK Department of Science, Information and Technology (DSIT) has selected Angoka as...
Infosecurity Magazine
#InfosecurityEurope: Internet of Things Continues to Pose Security Risk – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The growth of connected and interactive devices continues to threaten security...
Infosecurity Magazine
#InfosecurityEurope: From Passion to Profession, Becky Pinkard’s Dedication to Cybersecurity – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Becky Pinkard describes herself as an outsider who found her place,...
Infosecurity Magazine
#InfosecurityEurope: Cybersecurity Industry Still Fighting to Recruit and Retain Talent – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cybersecurity teams are struggling to find the right talent, with the...
Infosecurity Magazine
Supply Chain and APIs Top Security Concerns, CISO Survey Shows – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A recent chief information security officers (CISO) survey has shown that...
Infosecurity Magazine
Security Researchers Uncover New Spyware Implant TriangleDB – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Security researchers at Kaspersky have recently uncovered a sophisticated spyware implant...
Infosecurity Magazine
#InfosecurityEurope: Compliance Does Not Mean Security, Experts Warn – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Compliance will not give you good security, although effective security can...
Infosecurity Magazine
#InfosecurityEurope: Security Training Failures Impacting Digital Transformation – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Global organizations are still failing to build cybersecurity training into digital...
Infosecurity Magazine
#InfosecurityEurope: Transparency and Context Key to Insider Risk Management – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Security chiefs must first get employees on board if they want...
Infosecurity Magazine
#InfosecurityEurope: One in Three UK&I Workers Susceptible to Phishing – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 More than one in three workers in the UK and Ireland...
Infosecurity Magazine
#InfosecurityEurope: Financial Firms to Build Resilience in Face of Growing Cyber-Threats – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cyber-resilience is now a key component of operational resilience for the...
Infosecurity Magazine
#InfosecurityEurope: Does Pentesting Need a New Service Model? – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Pentesting had been a firm feature in the world of cybersecurity...
Infosecurity Magazine
#InfosecurityEurope: Why API Security Could Be the Next Big Thing in Cyber – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 In our modern digital world, application programming interfaces (APIs) have become...
Infosecurity Magazine
#InfosecurityEurope: Security Training Needs to Nudge, Not Nag – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Conventional security awareness training fails to bring lasting changes to user...
Infosecurity Magazine
#InfosecurityEurope: Certifications Are No Guarantee of Security – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Over reliance on security certifications can lead to a less diverse...
Posts pagination
1
…
44
45
46
…
52
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025