Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Infosecurity Magazine
Infosecurity Magazine
Malicious HTML Attachment Volumes Surge – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The share of HTML attachments assessed to be malicious has more...
Infosecurity Magazine
US Authorities Dismantle Dark Web “Card Checking” Platform – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The US government has claimed to have dismantled yet another popular...
Infosecurity Magazine
CISA Advises FCC Covered List For Risk Management – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The US Cybersecurity and Infrastructure Security Agency (CISA) has urged organizations...
Infosecurity Magazine
Apple and Google Unveil Industry Specification For Unwanted Tracking – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Google and Apple have announced jointly submitting a proposed industry specification...
Infosecurity Magazine
Earth Longzhi Uses “Stack Rumbling” to Disable Security Software – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Cybersecurity researchers at Trend Micro have discovered a new campaign by...
Infosecurity Magazine
Three-Quarters of Firms Predict Breach in Coming Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Most global organizations anticipate suffering a data breach or cyber-attack in...
Infosecurity Magazine
Government’s New Fraud Strategy Gets Lukewarm Reception – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The UK government has announced a new fraud strategy which will...
Infosecurity Magazine
Dark Web Bust Leads to Arrest of 288 Suspects – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 International police have arrested nearly 300 individuals on suspicion of buying...
Infosecurity Magazine
Bitmarck Halts Operations Due to Cybersecurity Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 German IT service provider Bitmarck has confirmed bringing all of its...
Infosecurity Magazine
South Korean Lures Used to Deploy ROKRAT Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The North Korean threat actor known as APT37 has been observed...
Infosecurity Magazine
Hackers Exploit High Severity Flaw in TBK DVR Camera System – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A five-year-old vulnerability in TBK’s DVR camera system (CVE-2018-9995) has been...
Infosecurity Magazine
T-Mobile Reveals Second Breach of the Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 T-Mobile USA has begun notifying customers impacted by yet another breach...
Infosecurity Magazine
UK Gun Owners May Be Targeted After Rifle Association Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The National Smallbore Rifle Association (NSRA) has warned members of possible...
Infosecurity Magazine
Advanced Fee Fraud Surges by Over 600% – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Advance fee fraud has surged eight-fold between the year ending March...
Infosecurity Magazine
Ransomware Attack Disrupts IT Network at Hardenhuish School – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A UK secondary school has confirmed it was hit by a...
Infosecurity Magazine
Global Cyber Attacks Rise by 7% in Q1 2023 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Weekly cyber-attacks have increased worldwide by 7% in Q1 2023 compared...
Infosecurity Magazine
Android Apps Fail to Protect User Data During Device Transfer – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 Multiple Android applications have been observed not invalidating or revalidating session...
Infosecurity Magazine
Vietnamese Hackers Linked to ‘Malverposting’ Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A recent ‘malverposting’ campaign linked to a Vietnamese threat actor has been...
Infosecurity Magazine
#RSAC: Cyber-Attacks on Civilian Infrastructure Should Be War Crimes, says Ukraine Official – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A Ukrainian security official speaking at the RSA Conference has called...
Infosecurity Magazine
RTM Locker Ransomware Targets Linux Architecture – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 A new ransomware binary targeting Linux systems has been attributed to...
Infosecurity Magazine
APT Groups Expand Reach to New Industries and Geographies – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 An increasing number of advanced persistent threat (APT) groups have been...
Infosecurity Magazine
#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 New security solutions and ideas are needed to overcome the unique...
Infosecurity Magazine
Alloy Taurus Hackers Update PingPull Malware to Target Linux Systems – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com - Author: 1 The threat actor known as Alloy Taurus has been observed deploying...
Infosecurity Magazine
#RSAC: US DoJ Prioritizes Victim Support in Cybercrime Crackdown
The US Department of Justice’s (DoJ) approach to disrupting and preventing cybercrime was laid bare by...
Infosecurity Magazine
CFPB Employee Sends 256,000 Consumers’ Data to Personal Email
An employee from the US Consumer Financial Protection Bureau (CFPB) has reportedly forwarded confidential records of...
Infosecurity Magazine
Evil Extractor Targets Windows Devices to Steal Sensitive Data
The attack tool known as Evil Extractor and developed by a company called Kodex as an...
Infosecurity Magazine
Trojanized Installers Used to Distribute Bumblebee Malware
Popular software tools such as Zoom, Cisco AnyConnect, ChatGPT and Citrix Workspace have been trojanized to...
Infosecurity Magazine
North Korean Hacker Suspected in 3CX Software Supply Chain Attack
The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach,...
Infosecurity Magazine
Daggerfly APT Targets African Telecoms Firm With New MgBot Malware
The APT group known as Daggerfly (as well as Evasive Panda and Bronze Highland) has been...
Infosecurity Magazine
ChatGPT-Related Malicious URLs on the Rise
The number of newly registered and squatting domains related to ChatGPT grew by 910% monthly between...
Posts pagination
1
…
50
51
52
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025