Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
Credit Card Fraud That Bypasses 2FA
Credit Card Fraud That Bypasses 2FA Someone in the UK is stealing smartphones and credit cards...
Schneier on Security
Large-Scale Collection of Cell Phone Data at US Borders
Large-Scale Collection of Cell Phone Data at US Borders The Washington Post is reporting that the...
Schneier on Security
New Linux Cryptomining Malware
New Linux Cryptomining Malware It’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use...
Schneier on Security
Responsible Disclosure for Cryptocurrency Security
Responsible Disclosure for Cryptocurrency Security Stewart Baker discusses why the industry-norm responsible disclosure for software vulnerabilities...
Schneier on Security
Friday Squid Blogging: Colossal Squid in New Zealand Museum
Friday Squid Blogging: Colossal Squid in New Zealand Museum It’s in Timaru. As usual, you can...
Schneier on Security
Facebook Has No Idea What Data It Has
Facebook Has No Idea What Data It Has This is from a court deposition: Facebook’s stonewalling...
Schneier on Security
The LockBit Ransomware Gang Is Surprisingly Professional
The LockBit Ransomware Gang Is Surprisingly Professional This article makes LockBit sound like a legitimate organization:...
Schneier on Security
Clever Phishing Scam Uses Legitimate PayPal Messages
Clever Phishing Scam Uses Legitimate PayPal Messages Brian Krebs is reporting on a clever PayPal phishing...
Schneier on Security
Montenegro is the Victim of a Cyberattack
Montenegro is the Victim of a Cyberattack Details are few, but Montenegro has suffered a cyberattack:...
Schneier on Security
Friday Squid Blogging: Squid Images
Friday Squid Blogging: Squid Images iStock has over 13,000 royalty-free images of squid. As usual, you...
Schneier on Security
High-School Graduation Prank Hack
High-School Graduation Prank Hack This is a fun story, detailing the hack a group of high...
Schneier on Security
Levels of Assurance for DoD Microelectronics
Levels of Assurance for DoD Microelectronics The NSA has has published criteria for evaluating levels of...
Schneier on Security
FTC Sues Data Broker
FTC Sues Data Broker This is good news: The Federal Trade Commission (FTC) has sued Kochava,...
Schneier on Security
Friday Squid Blogging: 14-foot Giant Squid Washes Ashore in Cape Town
Friday Squid Blogging: 14-foot Giant Squid Washes Ashore in Cape Town It’s an Architeuthis dux, the...
Schneier on Security
Man-in-the-Middle Phishing Attack
Man-in-the-Middle Phishing Attack Here’s a phishing campaign that uses a man-in-the-middle attack to defeat multi-factor authentication:...
Schneier on Security
Security and Cheap Complexity
Security and Cheap Complexity I’ve been saying that complexity is the worst enemy of security for...
Schneier on Security
Hyundai Uses Example Keys for Encryption System
Hyundai Uses Example Keys for Encryption System This is a dumb crypto mistake I had not...
Schneier on Security
Signal Phone Numbers Exposed in Twilio Hack
Signal Phone Numbers Exposed in Twilio Hack Twilio was hacked earlier this month, and the phone...
Schneier on Security
Mudge Files Whistleblower Complaint against Twitter
Mudge Files Whistleblower Complaint against Twitter Peiter Zatko, aka Mudge, has filed a whistleblower complaint with...
Schneier on Security
USB “Rubber Ducky” Attack Tool
USB “Rubber Ducky” Attack Tool The USB Rubber Ducky is getting better and better. Already, previous...
Schneier on Security
Friday Squid Blogging: The Language of the Jumbo Flying Squid
Friday Squid Blogging: The Language of the Jumbo Flying Squid The jumbo flying squid (Dosidicus gigas)...
Schneier on Security
Remotely Controlling Touchscreens
Remotely Controlling Touchscreens This is more of a demonstration than a real-world vulnerability, but researchers can...
Schneier on Security
Zoom Exploit on MacOS
Zoom Exploit on MacOS This vulnerability was reported to Zoom last December: The exploit works by...
Schneier on Security
Upcoming Speaking Engagements
Upcoming Speaking Engagements This is a current list of where and when I am scheduled to...
Schneier on Security
$23 Million YouTube Royalties Scam
$23 Million YouTube Royalties Scam Scammers were able to convince YouTube that other peoples’ music was...
Schneier on Security
Twitter Exposes Personal Information for 5.4 Million Accounts
Twitter Exposes Personal Information for 5.4 Million Accounts Twitter accidentally exposed the personal information—including phone numbers...
Schneier on Security
A Taxonomy of Access Control
A Taxonomy of Access Control My personal definition of a brilliant idea is one that is...
Schneier on Security
Friday Squid Blogging: SQUID Acronym for Making Conscious Choices
Friday Squid Blogging: SQUID Acronym for Making Conscious Choices I think the U is forced: SQUID...
Schneier on Security
Hacking Starlink
Hacking Starlink This is the first—of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities,...
Posts navigation
1
…
18
19
Latest News
securityweek.com
Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine – Source: www.securityweek.com
05/02/2025
securityweek.com
Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities – Source: www.securityweek.com
05/02/2025
securityweek.com
Webinar Today: Defenders on the Frontline – Incident Response and Threat Intel Under the Microscope – Source: www.securityweek.com
05/02/2025
securityweek.com
CISA Issues Exploitation Warning for .NET Vulnerability – Source: www.securityweek.com
05/02/2025
securityweek.com
Zyxel Issues ‘No Patch’ Warning for Exploited Zero-Days – Source: www.securityweek.com
05/02/2025
securelist.com
Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024 – Source: securelist.com
05/02/2025