Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level
Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level At least,...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
NetWire Remote Access Trojan Maker Arrested
NetWire Remote Access Trojan Maker Arrested From Brian Krebs: A Croatian national has been arrested for...
Schneier on Security
How AI Could Write Our Laws
How AI Could Write Our Laws By Nathan E. Sanders & Bruce Schneier Nearly 90% of...
Schneier on Security
Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific
Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific Chinese squid fishing boats are overwhelming...
Schneier on Security
Elephant Hackers
Elephant Hackers An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food. Read...
Schneier on Security
Another Malware with Persistence
Another Malware with Persistence Here’s a piece of Chinese malware that infects SonicWall security appliances and...
Schneier on Security
BlackLotus Malware Hijacks Windows Secure Boot Process
BlackLotus Malware Hijacks Windows Secure Boot Process Researchers have discovered malware that “can hijack a computer’s...
Schneier on Security
Prompt Injection Attacks on Large Language Models
Prompt Injection Attacks on Large Language Models This is a good survey on prompt injection attacks...
Schneier on Security
New National Cybersecurity Strategy
New National Cybersecurity Strategy Last week the Biden Administration released a new National Cybersecurity Strategy (summary...
Schneier on Security
Friday Squid Blogging: We’re Almost at Flying Squid Drones
Friday Squid Blogging: We’re Almost at Flying Squid Drones Researchers are prototyping multi-segment shapeshifter drones, which...
Schneier on Security
Nick Weaver on Regulating Cryptocurrency
Nick Weaver on Regulating Cryptocurrency Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies...
Schneier on Security
Dumb Password Rules
Dumb Password Rules Troy Hunt is collecting examples of dumb password rules. There are some pretty...
Schneier on Security
Fooling a Voice Authentication System with an AI-Generated Voice
Fooling a Voice Authentication System with an AI-Generated Voice A reporter used an AI synthesis of...
Schneier on Security
Side-Channel Attack against CRYSTALS-Kyber
Side-Channel Attack against CRYSTALS-Kyber CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as...
Schneier on Security
ChatGPT Is Ingesting Corporate Secrets
ChatGPT Is Ingesting Corporate Secrets Interesting: According to internal Slack messages that were leaked to Insider,...
Schneier on Security
Defending against AI Lobbyists
Defending against AI Lobbyists When is it time to start worrying about artificial intelligence interfering in...
Schneier on Security
Friday Squid Blogging: Thermal Batteries from Squid Proteins
Friday Squid Blogging: Thermal Batteries from Squid Proteins Researchers are making thermal batteries from “a synthetic...
Schneier on Security
Fines as a Security System
Fines as a Security System Tile has an interesting security solution to make its tracking tags...
Schneier on Security
The Insecurity of Photo Cropping
The Insecurity of Photo Cropping The Intercept has a long article on the insecurity of photo...
Schneier on Security
A Device to Turn Traffic Lights Green
A Device to Turn Traffic Lights Green Here’s a story about a hacker who reprogrammed a...
Schneier on Security
Cyberwar Lessons from the War in Ukraine
Cyberwar Lessons from the War in Ukraine The Aspen Institute has published a good analysis of...
Schneier on Security
Putting Undetectable Backdoors in Machine Learning Models
Putting Undetectable Backdoors in Machine Learning Models This is really interesting research from a few months...
Schneier on Security
Friday Squid Blogging: Squid Processing Facility
Friday Squid Blogging: Squid Processing Facility This video of a modern large squid processing ship is...
Schneier on Security
Banning TikTok
Banning TikTok Congress is currently debating bills that would ban TikTok in the United States. We...
Schneier on Security
On Pig Butchering Scams
On Pig Butchering Scams “Pig butchering” is the colorful name given to online cons that trick...
Schneier on Security
What Will It Take?
What Will It Take? What will it take for policy makers to take cybersecurity seriously? Not...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
Camera the Size of a Grain of Salt
Camera the Size of a Grain of Salt Cameras are getting smaller and smaller, changing the...
Schneier on Security
A Guide to Phishing Attacks
A Guide to Phishing Attacks This is a good list of modern phishing techniques. Leer másSchneier...
Posts navigation
1
…
14
15
16
…
19
Latest News
The Register Security
Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge – Source: go.theregister.com
06/02/2025
The Register Security
US cranks up espionage charges against ex-Googler accused of trade secrets heist – Source: go.theregister.com
06/02/2025
The Guardian UK
Global ransomware payments plunge by a third amid crackdown – Source: www.theguardian.com
05/02/2025
CSO - Online
Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung – Source: www.csoonline.com
05/02/2025
CSO - Online
Download our extended detection and response (XDR) buyer’s guide – Source: us.resources.csoonline.com
05/02/2025
CSO - Online
MacOS Ferret operators add a deceptive bite to their malware family – Source: www.csoonline.com
05/02/2025