Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
A Guide to Phishing Attacks
A Guide to Phishing Attacks This is a good list of modern phishing techniques. Leer másSchneier...
Schneier on Security
Friday Squid Blogging: Squid-Inspired Hydrogel
Friday Squid Blogging: Squid-Inspired Hydrogel Scientists have created a hydrogel “using squid mantle and creative chemistry.”...
Schneier on Security
NIST Is Updating Its Cybersecurity Framework
NIST Is Updating Its Cybersecurity Framework NIST is planning a significant update of its Cybersecurity Framework....
Schneier on Security
The FBI Identified a Tor User
The FBI Identified a Tor User No details, though: According to the complaint against him, Al-Azhari...
Schneier on Security
AI and Political Lobbying
AI and Political Lobbying Launched just weeks ago, ChatGPT is already threatening to upend how we...
Schneier on Security
Security Analysis of Threema
Security Analysis of Threema A group of Swiss researchers have published an impressive security analysis of...
Schneier on Security
Real-World Steganography
Real-World Steganography From an article about Zheng Xiaoqing, an American convicted of spying for China: According...
Schneier on Security
Publisher’s Weekly Review of A Hacker’s Mind
Publisher’s Weekly Review of A Hacker’s Mind Publisher’s Weekly reviewed A Hacker’s Mind—and it’s a starred...
Schneier on Security
Friday Squid Blogging: Another Giant Squid Captured on Video
Friday Squid Blogging: Another Giant Squid Captured on Video Here’s a new video of a giant...
Schneier on Security
No-Fly List Exposed
No-Fly List Exposed I can’t remember the last time I thought about the US no-fly list:...
Schneier on Security
Bulk Surveillance of Money Transfers
Bulk Surveillance of Money Transfers Just another obscure warrantless surveillance program. US law enforcement can access...
Schneier on Security
US Cyber Command Operations During the 2022 Midterm Elections
US Cyber Command Operations During the 2022 Midterm Elections The head of both US Cyber Command...
Schneier on Security
On Alec Baldwin’s Shooting
On Alec Baldwin’s Shooting We recently learned that Alec Baldwin is being charged with involuntary manslaughter...
Schneier on Security
LastPass Breach
LastPass Breach Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised....
Schneier on Security
Arresting IT Administrators
Arresting IT Administrators This is one way of ensuring that IT keeps up with patches: Albanian...
Schneier on Security
Friday Squid Blogging: Injured Giant Squid and Paddleboarder
Friday Squid Blogging: Injured Giant Squid and Paddleboarder Here’s a video—I don’t know where it’s from—of...
Schneier on Security
Hacking the JFK Airport Taxi Dispatch System
Hacking the JFK Airport Taxi Dispatch System Two men have been convicted of hacking the taxi...
Schneier on Security
Trojaned Windows Installer Targets Ukraine
Trojaned Windows Installer Targets Ukraine Mandiant is reporting on a trojaned Windows installer that targets Ukrainian...
Schneier on Security
Ukraine Intercepting Russian Soldiers’ Cell Phone Calls
Ukraine Intercepting Russian Soldiers’ Cell Phone Calls They’re using commercial phones, which go through the Ukrainian...
Schneier on Security
Critical Microsoft Code-Execution Vulnerability
Critical Microsoft Code-Execution Vulnerability A critical code-execution vulnerability in Microsoft Windows was patched in September. It...
Schneier on Security
How to Surrender to a Drone
How to Surrender to a Drone The Ukrainian army has released an instructional video explaining how...
Schneier on Security
Apple Patches iPhone Zero-Day
Apple Patches iPhone Zero-Day The most recent iPhone update—to version 16.1.2—patches a zero-day vulnerability that “may...
Schneier on Security
As Long as We’re on the Subject of CAPTCHAs
As Long as We’re on the Subject of CAPTCHAs There are these. Leer másSchneier on Security...
Schneier on Security
Friday Squid Blogging: Squid in Concert
Friday Squid Blogging: Squid in Concert Squid is performing a concert in London in February. If...
Schneier on Security
Obligatory ChatGPT Post
Obligatory ChatGPT Post Seems like absolutely everyone everywhere is playing with Chat GPT. So I did,...
Schneier on Security
Hacking Boston’s CharlieCard
Hacking Boston’s CharlieCard Interesting discussion of vulnerabilities and exploits against Boston’s CharlieCard. Leer másSchneier on Security...
Schneier on Security
Reimagining Democracy
Reimagining Democracy Last week, I hosted a two-day workshop on reimagining democracy. The idea was to...
Schneier on Security
A Security Vulnerability in the KmsdBot Botnet
A Security Vulnerability in the KmsdBot Botnet Security researchers found a software bug in the KmsdBot...
Schneier on Security
CryWiper Data Wiper Targeting Russian Sites
CryWiper Data Wiper Targeting Russian Sites Kaspersky is reporting on a data wiper masquerading as ransomware...
Schneier on Security
Security Vulnerabilities in Eufy Cameras
Security Vulnerabilities in Eufy Cameras Eufy cameras claim to be local only, but upload data to...
Posts navigation
1
…
15
16
17
…
19
Latest News
The Register Security
Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge – Source: go.theregister.com
06/02/2025
The Register Security
US cranks up espionage charges against ex-Googler accused of trade secrets heist – Source: go.theregister.com
06/02/2025
The Guardian UK
Global ransomware payments plunge by a third amid crackdown – Source: www.theguardian.com
05/02/2025
CSO - Online
Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung – Source: www.csoonline.com
05/02/2025
CSO - Online
Download our extended detection and response (XDR) buyer’s guide – Source: us.resources.csoonline.com
05/02/2025
CSO - Online
MacOS Ferret operators add a deceptive bite to their malware family – Source: www.csoonline.com
05/02/2025