Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
SecurityAffairs.com
SecurityAffairs.com
FBI: Patches for Barracuda ESG Zero-Day CVE-2023-2868 are ineffective – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The FBI warned that patches for a critical Barracuda ESG...
SecurityAffairs.com
Researchers released PoC exploit for Ivanti Sentry flaw CVE-2023-38035 – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Proof-of-concept exploit code for critical Ivanti Sentry authentication bypass flaw...
SecurityAffairs.com
Lazarus APT exploits Zoho ManageEngine flaw to target an Internet backbone infrastructure provider – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The North Korea-linked Lazarus group exploits a critical flaw in...
SecurityAffairs.com
Lapsus$ member has been convicted of having hacked multiple high-profile companies – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini An 18-year-old member of the Lapsus$ gang has been convicted...
SecurityAffairs.com
More than 3,000 Openfire servers exposed to attacks using a new exploit – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Researchers warn that more than 3,000 unpatched Openfire servers are...
SecurityAffairs.com
DoJ charged Tornado Cash founders with laundering more than $1 billion – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The U.S. DoJ charged two men with operating the Tornado...
SecurityAffairs.com
FBI identifies wallets holding cryptocurrency funds stolen by North Korea – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The U.S. FBI warned that North Korea-linked threat actors may...
SecurityAffairs.com
Carderbee APT targets Hong Kong orgs via supply chain attacks – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini A previously unknown APT group, tracked as Carderbee, was behind...
SecurityAffairs.com
TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwords – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Four vulnerabilities in the TP-Link Tapo L530E smart bulb and...
SecurityAffairs.com
Defense contractor Belcan leaks admin password with a list of flaws – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini US Government and defense contractor Belcan left its super admin...
SecurityAffairs.com
Akira ransomware gang spotted targeting Cisco VPN products to hack organizations – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The Akira ransomware gang targets Cisco VPN products to gain...
SecurityAffairs.com
Snatch gang claims the hack of the Department of Defence South Africa – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Snatch gang claims the hack of the Department of Defence...
SecurityAffairs.com
CISA adds critical Adobe ColdFusion flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini US CISA added critical vulnerability CVE-2023-26359 in Adobe ColdFusion to its Known...
SecurityAffairs.com
A cyber attack hit the Australian software provider Energy One – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The Australian software provider Energy One announced it was hit...
SecurityAffairs.com
Ivanti fixed a new critical Sentry API authentication bypass flaw – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Ivanti warned customers of a new critical Sentry API authentication...
SecurityAffairs.com
BlackCat ransomware group claims the hack of Seiko network – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The BlackCat/ALPHV ransomware group claims to have hacked the Japanese...
SecurityAffairs.com
New HiatusRAT campaign targets Taiwan and U.S. military procurement system – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini HiatusRAT malware operators resurfaced with a new wave of attacks...
SecurityAffairs.com
Spoofing an Apple device and tricking users into sharing sensitive data – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini White hat hackers at the recent hacking conference Def Con...
SecurityAffairs.com
Israel and US to Invest $3.85 Million in projects for critical infrastructure protection through the BIRD Cyber Program – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Israel and US government agencies announced the BIRD Cyber Program,...
SecurityAffairs.com
N. Korean Kimsuky APT targets S. Korea-US military exercises – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini North Korea-linked APT Kimsuky launched a spear-phishing campaign targeting US...
SecurityAffairs.com
Four Juniper Junos OS flaws can be chained to remotely hack devices – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Juniper Networks addressed multiple flaws in the J-Web component of...
SecurityAffairs.com
Security Affairs newsletter Round 433 by Pierluigi Paganini – International edition – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Privacy Overview This website uses cookies to improve your experience...
SecurityAffairs.com
Cybersecurity: CASB vs SASE – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Understanding cybersecurity aspects addressed by Cloud Access Security Broker (CASB)...
SecurityAffairs.com
Over 3,000 Android Malware spotted using unsupported/unknown compression methods to avoid detection – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Threat actors are using Android Package (APK) files with unsupported...
SecurityAffairs.com
WinRAR flaw enables remote code execution of arbitrary code – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini A flaw impacting the file archiver utility for Windows WinRAR...
SecurityAffairs.com
#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini #OpFukushima: The famous collective Anonymous has launched cyberattacks against Japan...
SecurityAffairs.com
Massive phishing campaign targets users of the Zimbra Collaboration email server – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini A massive social engineering campaign is targeting users of the...
SecurityAffairs.com
Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini An international law enforcement operation across 25 African countries has...
SecurityAffairs.com
Bronze Starlight targets the Southeast Asian gambling sector – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Experts warn of an ongoing campaign attributed to China-linked Bronze...
SecurityAffairs.com
APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countries – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Russia-linked APT29 used the Zulip Chat App in attacks aimed...
Posts pagination
1
…
13
14
15
…
32
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025