Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Schneier on Security
Schneier on Security
AIs as Trusted Third Parties – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is a truly fascinating paper: “Trusted Machine Learning Models...
Schneier on Security
A Taxonomy of Adversarial Machine Learning Attacks and Mitigations – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Clive Robinson • March 27, 2025 1:17 PM @ ALL,...
Schneier on Security
AI Data Poisoning – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Cloudflare has a new feature—available to free users as well—that...
Schneier on Security
Report on Paragon Spyware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Citizen Lab has a new report on Paragon’s spyware: Key...
Schneier on Security
More Countries are Demanding Backdoors to Encrypted Apps – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Random Geek • March 24, 2025 12:03 PM I think...
Schneier on Security
More Countries are Demanding Back-Doors to Encrypted Apps – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog More Countries are Demanding Back-Doors to Encrypted Apps Last...
Schneier on Security
Friday Squid Blogging: A New Explanation of Squid Camouflage – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Friday Squid Blogging: A New Explanation of Squid Camouflage New...
Schneier on Security
My Writings Are in the LibGen AI Training Corpus – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The Atlantic has a search tool that allows you to...
Schneier on Security
NCSC Releases Post-Quantum Cryptography Timeline – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Bernie • March 21, 2025 9:08 AM I...
Schneier on Security
Critical GitHub Attack – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier This is serious: A sophisticated cascading supply chain attack has...
Schneier on Security
Is Security Human Factors Research Skewed Towards Western Ideas and Habits? – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Really interesting research: “How WEIRD is Usable Privacy and Security...
Schneier on Security
Improvements in Brute Force Attacks – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM,...
Schneier on Security
Friday Squid Blogging: SQUID Band – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Friday Squid Blogging: SQUID Band A bagpipe and drum...
Schneier on Security
TP-Link Router Botnet – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier There is a new botnet that is infecting TP-Link routers:...
Schneier on Security
RIP Mark Klein – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Clive Robinson • March 13, 2025 1:11 PM RIP Mark...
Schneier on Security
China, Russia, Iran, and North Korea Intelligence Sharing – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Former CISA Director Jen Easterly writes about a new international...
Schneier on Security
Silk Typhoon Hackers Indicted – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Lots of interesting details in the story: The US Department...
Schneier on Security
Thousands of WordPress Websites Infected with Malware – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier The malware includes four separate backdoors: Creating four backdoors facilitates...
Schneier on Security
Friday Squid Blogging: Squid Loyalty Cards – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
Rayhunter: Device to Detect Cellular Surveillance – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Clive Robinson • March 7, 2025 2:39 PM @ Bruce,...
Schneier on Security
The Combined Cipher Machine – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
CISA Identifies Five New Vulnerabilities Currently Being Exploited – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Bob • March 5, 2025 5:40 PM Don’t...
Schneier on Security
Trojaned AI Tool Leads to Disney Hack – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier HomeBlog Comments Clive Robinson • March 4, 2025 8:29 AM...
Schneier on Security
Friday Squid Blogging: Eating Bioluminescent Squid – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Schneier on Security
“Emergent Misalignment” in LLMs – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Interesting research: “Emergent Misalignment: Narrow finetuning can produce broadly misaligned...
Schneier on Security
UK Demanded Apple Add a Backdoor to iCloud – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Last month, the UK government demanded that Apple weaken the...
Schneier on Security
An iCloud Backdoor Would Make Our Phones Less Safe – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier Last month, the UK government demanded that Apple weaken the...
Schneier on Security
North Korean Hackers Steal $1.5B in Cryptocurrency – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier It looks like a very sophisticated attack against the Dubai-based...
Schneier on Security
More Research Showing AI Breaking the Rules – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier These researchers had LLMs play chess against better opponents. When...
Schneier on Security
Friday Squid Blogging: New Squid Fossil – Source: www.schneier.com
Source: www.schneier.com - Author: Bruce Schneier About Bruce SchneierI am a public-interest technologist, working at the...
Posts navigation
1
…
3
4
5
…
24
Latest News
CSO - Online
UK blames Russia’s infamous ‘Fancy Bear’ group for Microsoft cloud hacks – Source: www.csoonline.com
22/07/2025
securityweek.com
SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available – Source: www.securityweek.com
22/07/2025
The Hacker News
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – Source:thehackernews.com
22/07/2025
The Hacker News
Ivanti Flaws Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks – Source:thehackernews.com
22/07/2025
The Register Security
Dell scoffs at breach, says miscreants only stole ‘fake data’ – Source: go.theregister.com
22/07/2025
The Register Security
Another massive security snafu hits Microsoft, but don’t expect it to stick – Source: go.theregister.com
22/07/2025