Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
Exploding USB Sticks
Exploding USB Sticks In case you don’t have enough to worry about, people are hiding explosives—actual...
Schneier on Security
Mass Ransomware Attack
Mass Ransomware Attack A vulnerability in a popular data transfer tool has resulted in a mass...
Schneier on Security
ChatGPT Privacy Flaw
ChatGPT Privacy Flaw OpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security...
Schneier on Security
US Citizen Hacked by Spyware
US Citizen Hacked by Spyware The New York Times is reporting that a US citizen’s phone...
Schneier on Security
Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level
Friday Squid Blogging: New Species of Vampire Squid Lives 3,000 Feet below Sea Level At least,...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
NetWire Remote Access Trojan Maker Arrested
NetWire Remote Access Trojan Maker Arrested From Brian Krebs: A Croatian national has been arrested for...
Schneier on Security
How AI Could Write Our Laws
How AI Could Write Our Laws By Nathan E. Sanders & Bruce Schneier Nearly 90% of...
Schneier on Security
Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific
Friday Squid Blogging: Chinese Squid Fishing in the Southeast Pacific Chinese squid fishing boats are overwhelming...
Schneier on Security
Elephant Hackers
Elephant Hackers An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food. Read...
Schneier on Security
Another Malware with Persistence
Another Malware with Persistence Here’s a piece of Chinese malware that infects SonicWall security appliances and...
Schneier on Security
BlackLotus Malware Hijacks Windows Secure Boot Process
BlackLotus Malware Hijacks Windows Secure Boot Process Researchers have discovered malware that “can hijack a computer’s...
Schneier on Security
Prompt Injection Attacks on Large Language Models
Prompt Injection Attacks on Large Language Models This is a good survey on prompt injection attacks...
Schneier on Security
New National Cybersecurity Strategy
New National Cybersecurity Strategy Last week the Biden Administration released a new National Cybersecurity Strategy (summary...
Schneier on Security
Friday Squid Blogging: We’re Almost at Flying Squid Drones
Friday Squid Blogging: We’re Almost at Flying Squid Drones Researchers are prototyping multi-segment shapeshifter drones, which...
Schneier on Security
Nick Weaver on Regulating Cryptocurrency
Nick Weaver on Regulating Cryptocurrency Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies...
Schneier on Security
Dumb Password Rules
Dumb Password Rules Troy Hunt is collecting examples of dumb password rules. There are some pretty...
Schneier on Security
Fooling a Voice Authentication System with an AI-Generated Voice
Fooling a Voice Authentication System with an AI-Generated Voice A reporter used an AI synthesis of...
Schneier on Security
Side-Channel Attack against CRYSTALS-Kyber
Side-Channel Attack against CRYSTALS-Kyber CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as...
Schneier on Security
ChatGPT Is Ingesting Corporate Secrets
ChatGPT Is Ingesting Corporate Secrets Interesting: According to internal Slack messages that were leaked to Insider,...
Schneier on Security
Defending against AI Lobbyists
Defending against AI Lobbyists When is it time to start worrying about artificial intelligence interfering in...
Schneier on Security
Friday Squid Blogging: Thermal Batteries from Squid Proteins
Friday Squid Blogging: Thermal Batteries from Squid Proteins Researchers are making thermal batteries from “a synthetic...
Schneier on Security
Fines as a Security System
Fines as a Security System Tile has an interesting security solution to make its tracking tags...
Schneier on Security
The Insecurity of Photo Cropping
The Insecurity of Photo Cropping The Intercept has a long article on the insecurity of photo...
Schneier on Security
A Device to Turn Traffic Lights Green
A Device to Turn Traffic Lights Green Here’s a story about a hacker who reprogrammed a...
Schneier on Security
Cyberwar Lessons from the War in Ukraine
Cyberwar Lessons from the War in Ukraine The Aspen Institute has published a good analysis of...
Schneier on Security
Putting Undetectable Backdoors in Machine Learning Models
Putting Undetectable Backdoors in Machine Learning Models This is really interesting research from a few months...
Schneier on Security
Friday Squid Blogging: Squid Processing Facility
Friday Squid Blogging: Squid Processing Facility This video of a modern large squid processing ship is...
Schneier on Security
Banning TikTok
Banning TikTok Congress is currently debating bills that would ban TikTok in the United States. We...
Schneier on Security
On Pig Butchering Scams
On Pig Butchering Scams “Pig butchering” is the colorful name given to online cons that trick...
Posts navigation
1
…
18
19
20
…
24
Latest News
The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About – Source:thehackernews.com
03/07/2025
The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms – Source:thehackernews.com
03/07/2025
The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials – Source:thehackernews.com
03/07/2025
CSO - Online
Third-party risk management: How to avoid compliance disaster – Source: www.csoonline.com
03/07/2025
CSO - Online
Russland nutzt Medienplattform für Desinformation – Source: www.csoonline.com
03/07/2025
CSO - Online
5 multicloud security challenges — and how to address them – Source: www.csoonline.com
03/07/2025