Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
The Conviction of Uber’s Chief Security Officer
The Conviction of Uber’s Chief Security Officer I have been meaning to write about Joe Sullivan,...
Schneier on Security
NSA on Supply Chain Security
NSA on Supply Chain Security The NSA (together with CISA) has published a long report on...
Schneier on Security
Friday Squid Blogging: Newfoundland Giant Squid Sculpture
Friday Squid Blogging: Newfoundland Giant Squid Sculpture In 1878, a 55-foot-long giant squid washed up on...
Schneier on Security
Iran’s Digital Surveillance Tools Leaked
Iran’s Digital Surveillance Tools Leaked It’s Iran’s turn to have its digital surveillance tools leaked: According...
Schneier on Security
Apple Only Commits to Patching Latest OS Version
Apple Only Commits to Patching Latest OS Version People have suspected this for a while, but...
Schneier on Security
Friday Squid Blogging: Chinese Squid Fishing
Friday Squid Blogging: Chinese Squid Fishing China claims that it is “engaging in responsible squid fishing”:...
Schneier on Security
Critical Vulnerability in Open SSL
Critical Vulnerability in Open SSL There are no details yet, but it’s really important that you...
Schneier on Security
Australia Increases Fines for Massive Data Breaches
Australia Increases Fines for Massive Data Breaches After suffering two large, and embarrassing, data breaches in...
Schneier on Security
Regulating DAOs
Regulating DAOs In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
Friday Squid Blogging: On Squid Ink
Friday Squid Blogging: On Squid Ink It’s aimed at children, but it’s a good primer. As...
Schneier on Security
Hacking Automobile Keyless Entry Systems
Hacking Automobile Keyless Entry Systems Suspected members of a European car-theft ring have been arrested: The...
Schneier on Security
Qatar Spyware
Qatar Spyware Everyone visiting Qatar for the World Cup needs to install spyware on their phone....
Schneier on Security
Museum Security
Museum Security Interesting interview: Banks don’t take millions of dollars and put them in plastic bags...
Schneier on Security
Interview with Signal’s New President
Interview with Signal’s New President Long and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp...
Schneier on Security
Adversarial ML Attack that Secretly Gives a Language Model a Point of View
Adversarial ML Attack that Secretly Gives a Language Model a Point of View Machine learning security...
Schneier on Security
Friday Squid Blogging: The Reproductive Habits of Giant Squid
Friday Squid Blogging: The Reproductive Habits of Giant Squid Interesting: A recent study on giant squid...
Schneier on Security
On the Randomness of Automatic Card Shufflers
On the Randomness of Automatic Card Shufflers Many years ago, Matt Blaze and I talked about...
Schneier on Security
New Report on IoT Security
New Report on IoT Security The Atlantic Council has published a report on securing the Internet...
Schneier on Security
Leaking Passwords through the Spellchecker
Leaking Passwords through the Spellchecker Sometimes browser spellcheckers leak passwords: When using major web browsers like...
Schneier on Security
Prompt Injection/Extraction Attacks against AI Systems
Prompt Injection/Extraction Attacks against AI Systems This is an interesting attack I had not previously considered....
Schneier on Security
Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses
Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses Okay, it’s an obscure threat. But...
Schneier on Security
Friday Squid Blogging: Another Giant Squid Washes Up on New Zealand Beach
Friday Squid Blogging: Another Giant Squid Washes Up on New Zealand Beach This one has chewed-up...
Schneier on Security
Automatic Cheating Detection in Human Racing
Automatic Cheating Detection in Human Racing This is a fascinating glimpse of the future of automatic...
Schneier on Security
FBI Seizes Stolen Cryptocurrencies
FBI Seizes Stolen Cryptocurrencies The Wall Street Journal is reporting that the FBI has recovered over...
Schneier on Security
Weird Fallout from Peiter Zatko’s Twitter Whistleblowing
Weird Fallout from Peiter Zatko’s Twitter Whistleblowing People are trying to dig up dirt on Peiter...
Schneier on Security
Relay Attack against Teslas
Relay Attack against Teslas Nice work: Radio relay attacks are technically complicated to execute, but conceptually...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
Massive Data Breach at Uber
Massive Data Breach at Uber It’s big: The breach appeared to have compromised many of Uber’s...
Schneier on Security
Friday Squid Blogging: Mayfly Squid
Friday Squid Blogging: Mayfly Squid This is surprisingly funny. As usual, you can also use this...
Posts navigation
1
…
17
18
19
Latest News
The Hacker News
Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks – Source:thehackernews.com
05/02/2025
The Hacker News
New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack – Source:thehackernews.com
05/02/2025
The Hacker News
Navigating the Future: Key IT Vulnerability Management Trends – Source:thehackernews.com
05/02/2025
The Hacker News
AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks – Source:thehackernews.com
05/02/2025
The Hacker News
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25 – Source:thehackernews.com
05/02/2025
securityweek.com
Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 – Source: www.securityweek.com
05/02/2025