Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
naked security
naked security
Dutch suspect locked up for alleged personal data megathefts
Dutch suspect locked up for alleged personal data megathefts Undercover Austrian “controlled data buy” leads to...
naked security
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]
S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text] Lastest episode – listen now! (Or...
naked security
Multi-million investment scammers busted in four-country Europol raid
Multi-million investment scammers busted in four-country Europol raid 216 questioned, 15 arrested, 4 fake call centres...
naked security
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]
S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text] As always:...
naked security
Serious Security: Unravelling the LifeLock “hacked passwords” story
Serious Security: Unravelling the LifeLock “hacked passwords” story Four straight-talking tips to improve your online security,...
naked security
Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security
Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security It’s a really cool and super-simple trick....
naked security
T-Mobile admits to 37,000,000 customer records stolen by “bad actor”
T-Mobile admits to 37,000,000 customer records stolen by “bad actor” Once more, it’s time for Shakespeare’s...
naked security
Apple patches are out – old iPhones get an old zero-day fix at last!
Apple patches are out – old iPhones get an old zero-day fix at last! Don’t delay,...
naked security
GoTo admits: Customer cloud backups stolen together with decryption key
GoTo admits: Customer cloud backups stolen together with decryption key We were going to write, “Once...
naked security
Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond
Naked Security 33 1/3 – Cybersecurity predictions for 2023 and beyond The problem with anniversaries is that...
naked security
Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid
Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid When someone calls you...
naked security
PyTorch: Machine Learning toolkit pwned from Christmas to New Year
PyTorch: Machine Learning toolkit pwned from Christmas to New Year The bad news: the crooks have...
naked security
S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text]
S3 Ep116: Last straw for LastPass? Is crypto doomed? [Audio + Text] Lots of big issues...
naked security
Serious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches
Serious Security: How to improve cryptography, resist supply chain attacks, and handle data breaches Lessons for...
naked security
CircleCI – code-building service suffers total credential compromise
CircleCI – code-building service suffers total credential compromise They’re saying “rotate secrets”… in plain English, they...
naked security
RSA crypto cracked? Or perhaps not!
RSA crypto cracked? Or perhaps not! Stand down from blue alert, it seems… but why not...
naked security
Popular JWT cloud security library patches “remote” code execution hole
Popular JWT cloud security library patches “remote” code execution hole It’s remotely triggerable, but attackers would...
naked security
S3 Ep117: The crypto crisis that wasn’t (and farewell forever to Win 7) [Audio + Text]
S3 Ep117: The crypto crisis that wasn’t (and farewell forever to Win 7) [Audio + Text]...
naked security
Microsoft Patch Tuesday: One 0-day; Win 7 and 8.1 get last-ever patches
Microsoft Patch Tuesday: One 0-day; Win 7 and 8.1 get last-ever patches Get ’em while they’re...
naked security
Critical “10-out-of-10” Linux kernel SMB hole – should you worry?
Critical “10-out-of-10” Linux kernel SMB hole – should you worry? It’s serious, it’s critical, and you...
naked security
LastPass finally admits: They did steal your password vaults after all
LastPass finally admits: They did steal your password vaults after all The crooks now know who...
naked security
S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text]
S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text] Join world-renowned...
naked security
Microsoft dishes the dirt on Apple’s “Achilles heel” shortly after fixing similar Windows bug
Microsoft dishes the dirt on Apple’s “Achilles heel” shortly after fixing similar Windows bug It happens...
naked security
“Suspicious login” scammers up their game – take care at Christmas
“Suspicious login” scammers up their game – take care at Christmas A picture is worth 1024...
naked security
OneCoin scammer Sebastian Greenwood pleads guilty, “Cryptoqueen” still missing
OneCoin scammer Sebastian Greenwood pleads guilty, “Cryptoqueen” still missing The Cryptoqueen herself is still missing, but...
naked security
S3 Ep113: Pwning the Windows kernel – the crooks who hoodwinked Microsoft [Audio + Text]
S3 Ep113: Pwning the Windows kernel – the crooks who hoodwinked Microsoft [Audio + Text] Return...
naked security
COVID-bit: the wireless spyware trick with an unfortunate name
COVID-bit: the wireless spyware trick with an unfortunate name It’s not the switching that’s the problem,...
naked security
Apple patches everything, finally reveals mystery of iOS 16.1.2
Apple patches everything, finally reveals mystery of iOS 16.1.2 There’s an update for everything this time,...
naked security
Patch Tuesday: 0-days, RCE bugs, and a curious tale of signed malware
Patch Tuesday: 0-days, RCE bugs, and a curious tale of signed malware Tales of derring-do in...
naked security
Pwn2Own Toronto: 54 hacks, 63 new bugs, $1 million in bounties
Pwn2Own Toronto: 54 hacks, 63 new bugs, $1 million in bounties That’s a mean average of...
Posts navigation
1
2
3
4
…
6
Latest News
securityweek.com
Chain IQ, UBS Data Stolen in Ransomware Attack – Source: www.securityweek.com
19/06/2025
securityweek.com
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands – Source: www.securityweek.com
19/06/2025
CSO - Online
Foreign aircraft, domestic risks – Source: www.csoonline.com
19/06/2025
CSO - Online
North Korea’s BlueNoroff uses AI deepfakes to push Mac malware in fake Zoom calls – Source: www.csoonline.com
19/06/2025
CSO - Online
Third-party risk management is broken — but not beyond repair – Source: www.csoonline.com
19/06/2025
CSO - Online
Asana’s MCP AI connector could have exposed corporate data, CSOs warned – Source: www.csoonline.com
19/06/2025