Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
naked security
naked security
GoDaddy admits: Crooks hit us with malware, poisoned customer websites
GoDaddy admits: Crooks hit us with malware, poisoned customer websites New report admits that attackers were...
naked security
Coinbase breached by social engineers, employee data stolen
Coinbase breached by social engineers, employee data stolen Another day, another “sophisticated” attack. This time, the...
naked security
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]
S3 Ep123: Crypto company compromise kerfuffle [Audio + Text] Latest episode – listen now! Top-notch advice...
naked security
NPM JavaScript packages abused to create scambait links in bulk
NPM JavaScript packages abused to create scambait links in bulk Free spins? Bonus game points? Cheap...
naked security
Dutch police arrest three cyberextortion suspects who allegedly earned millions
Dutch police arrest three cyberextortion suspects who allegedly earned millions Ever paid hush money to crooks...
naked security
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!
Beware rogue 2FA apps in App Store and Google Play – don’t get hacked! Even in...
naked security
LastPass: Keylogger on home PC led to cracked corporate password vault
LastPass: Keylogger on home PC led to cracked corporate password vault Seems the crooks implanted a...
naked security
Feds warn about right Royal ransomware rampage that runs the gamut of TTPs
Feds warn about right Royal ransomware rampage that runs the gamut of TTPs Wondering which cybercrime...
naked security
S3 Ep124: When so-called security apps go rogue [Audio + Text]
S3 Ep124: When so-called security apps go rogue [Audio + Text] Rogue software packages. Rogue “sysadmins”....
naked security
Microsoft Patch Tuesday: 36 RCE bugs, 3 zero-days, 75 CVEs
Microsoft Patch Tuesday: 36 RCE bugs, 3 zero-days, 75 CVEs Lots of lovely patches for your...
naked security
S3 Ep122: Stop calling every breach “sophisticated”! [Audio + Text]
S3 Ep122: Stop calling every breach “sophisticated”! [Audio + Text] Latest episode – listen now! (Full...
naked security
Apple fixes zero-day spyware implant bug – patch now!
Apple fixes zero-day spyware implant bug – patch now! Everyone update now! Except for those who...
naked security
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bug
Serious Security: GnuTLS follows OpenSSL, fixes timing attack bug Conditional code considered cryptographically counterproductive.Leer másNaked Security...
naked security
Reddit admits it was hacked and data stolen, says “Don’t panic”
Reddit admits it was hacked and data stolen, says “Don’t panic” Reddit is suggesting three tips...
naked security
Hive ransomware servers shut down at last, says FBI
Hive ransomware servers shut down at last, says FBI Unfortunately, you’ve probably already heard the cliche...
naked security
Dutch suspect locked up for alleged personal data megathefts
Dutch suspect locked up for alleged personal data megathefts Undercover Austrian “controlled data buy” leads to...
naked security
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text] Lastest episode – listen now! (Or...
naked security
Multi-million investment scammers busted in four-country Europol raid
Multi-million investment scammers busted in four-country Europol raid 216 questioned, 15 arrested, 4 fake call centres...
naked security
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text] As always:...
naked security
Serious Security: Unravelling the LifeLock “hacked passwords” story
Serious Security: Unravelling the LifeLock “hacked passwords” story Four straight-talking tips to improve your online security,...
naked security
Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security
Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security It’s a really cool and super-simple trick....
naked security
T-Mobile admits to 37,000,000 customer records stolen by “bad actor”
T-Mobile admits to 37,000,000 customer records stolen by “bad actor” Once more, it’s time for Shakespeare’s...
naked security
Apple patches are out – old iPhones get an old zero-day fix at last!
Apple patches are out – old iPhones get an old zero-day fix at last! Don’t delay,...
naked security
GoTo admits: Customer cloud backups stolen together with decryption key
GoTo admits: Customer cloud backups stolen together with decryption key We were going to write, “Once...
naked security
Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond
Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond The problem with anniversaries is that...
naked security
Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid
Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid When someone calls you...
naked security
PyTorch: Machine Learning toolkit pwned from Christmas to New Year
PyTorch: Machine Learning toolkit pwned from Christmas to New Year The bad news: the crooks have...
naked security
S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text]
S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text] Lots of big issues...
naked security
Serious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches
Serious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches Lessons for...
naked security
CircleCI – code-building service suffers total credential compromise
CircleCI – code-building service suffers total credential compromise They’re saying “rotate secrets”… in plain English, they...
Posts navigation
1
2
3
…
6
Latest News
CSO - Online
Enterprise-specific zero-day exploits on the rise, Google warns – Source: www.csoonline.com
30/04/2025
CSO - Online
Huntress expands ITDR capabilities to combat credential theft and BEC – Source: www.csoonline.com
30/04/2025
CSO - Online
Palo Alto Networks to buy Protect AI, strengthen AI security platform – Source: www.networkworld.com
30/04/2025
CSO - Online
Cybersecurity leaders decry ‘political persecution’ of Chris Krebs in a letter to the President – Source: www.csoonline.com
30/04/2025
CSO - Online
Brocade Fabric OS flaw could allow code injection attacks – Source: www.csoonline.com
30/04/2025
CSO - Online
Cyberattacke auf berlin.de – Source: www.csoonline.com
30/04/2025