Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
Credible Handwriting Machine – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier In case you don’t have enough to worry about, someone...
Schneier on Security
Google Is Not Deleting Old YouTube Videos – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Google Is Not Deleting Old YouTube Videos Google has...
Schneier on Security
Friday Squid Blogging: Peruvian Squid-Fishing Regulation Drives Chinese Fleets Away – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier A Peruvian oversight law has the opposite effect: Peru in...
Schneier on Security
Security Risks of New .zip and .mov Domains – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Hauke • May 19, 2023 8:11 AM I...
Schneier on Security
Microsoft Secure Boot Bug – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus...
Schneier on Security
Micro-Star International Signing Key Stolen – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Micro-Star International—aka MSI—had its UEFI signing key stolen last month....
Schneier on Security
Upcoming Speaking Engagements – Source: www.schneier.com
Source: www.schneier.com - Author: Schneier.com Webmaster About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Friday Squid Blogging: Giant Squid Video – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments MarkH • May 13, 2023 12:45 AM While...
Schneier on Security
Ted Chiang on the Risks of AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Ted Chiang has an excellent essay in the New Yorker:...
Schneier on Security
Building Trustworthy AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Building Trustworthy AI We will all soon get into the...
Schneier on Security
FBI Disables Russian Malware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Reuters is reporting that the FBI “had identified and disabled...
Schneier on Security
PIPEDREAM Malware against Industrial Control Systems – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Another nation-state malware, Russian in origin: In the early stages...
Schneier on Security
AI Hacking Village at DEF CON This Year – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog AI Hacking Village at DEF CON This Year At...
Schneier on Security
Friday Squid Blogging: “Mediterranean Beef Squid” Hoax – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: “Mediterranean Beef Squid” Hoax The viral...
Schneier on Security
Large Language Models and Elections – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Earlier this week, the Republican National Committee released a video...
Schneier on Security
SolarWinds Detected Six Months Earlier – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New reporting from Wired reveals that the Department of Justice...
Schneier on Security
NIST Draft Document on Post-Quantum Cryptography Guidance – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog NIST Draft Document on Post-Quantum Cryptography Guidance NIST has...
Schneier on Security
Friday Squid Blogging: More Squid Camouflage Research – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier vas pup • April 28, 2023 5:29 PM I am...
Schneier on Security
Hacking the Layoff Process – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier My latest book, A Hacker’s Mind, is filled with stories...
Schneier on Security
Security Risks of AI – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Security Risks of AI Stanford and Georgetown have a new...
Schneier on Security
AI to Aid Democracy – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier AI to Aid Democracy There’s good reason to fear that...
Schneier on Security
Cyberweapons Manufacturer QuaDream Shuts Down
Following a report on its activities, the Israeli spyware company QuaDream has shut down. This was...
Schneier on Security
UK Threatens End-to-End Encryption
In an open letter, seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online...
Schneier on Security
Friday Squid Blogging: More on Squid Fishing
HomeBlog Comments vas pup • April 21, 2023 5:38 PM ChatGPT sparks AI investment bonanza https://www.dw.com/en/chatgpt-sparks-ai-investment-bonanza/a-65368393...
Schneier on Security
Hacking Pickleball
Hacking Pickleball My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are...
Schneier on Security
Using the iPhone Recovery Key to Lock Owners Out of Their iPhones
This a good example of a security feature that can sometimes harm security: Apple introduced the...
Schneier on Security
New Zero-Click Exploits Against iOS
HomeBlog New Zero-Click Exploits Against iOS CitizenLab has identified three zero-click exploits against iOS 15 and...
Schneier on Security
EFF on the UN Cybercrime Treaty
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being...
Schneier on Security
Using LLMs to Create Bioweapons
I’m not sure there are good ways to build guardrails to prevent this sort of thing:...
Schneier on Security
Swatting as a Service
Swatting as a Service Motherboard is reporting on AI-generated voices being used for “swatting”: In fact,...
Posts pagination
1
…
18
19
20
…
26
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025