Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
SecurityAffairs.com
SecurityAffairs.com
CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog
CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial...
SecurityAffairs.com
Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin
Threat actors are actively exploiting a high-severity flaw in the Elementor Pro WordPress plugin used by...
SecurityAffairs.com
Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33M
The Cyber Police of Ukraine, with law enforcement officials from Czechia, has arrested several members of...
SecurityAffairs.com
Russian APT group Winter Vivern targets email portals of NATO and diplomats
Russian hacking group Winter Vivern has been actively exploiting Zimbra flaws to steal the emails of...
SecurityAffairs.com
Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE
Researchers shared details about a flaw, dubbed Super FabriXss, in Azure Service Fabric Explorer (SFX) that...
SecurityAffairs.com
New AlienFox toolkit harvests credentials for tens of cloud services
AlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported....
SecurityAffairs.com
3CX voice and video conferencing software victim of a supply chain attack
Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne...
SecurityAffairs.com
New Mélofée Linux malware linked to Chinese APT groups
Exatrack researchers warn of an unknown China-linked hacking group that has been linked to a new...
Posts navigation
1
…
35
36
Latest News
The Hacker News
GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool – Source:thehackernews.com
28/06/2025
The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns – Source:thehackernews.com
28/06/2025
The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign – Source:thehackernews.com
27/06/2025
The Hacker News
PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack – Source:thehackernews.com
27/06/2025
The Hacker News
Business Case for Agentic AI SOC Analysts – Source:thehackernews.com
27/06/2025
The Hacker News
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit – Source:thehackernews.com
27/06/2025