Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
SecurityAffairs.com
SecurityAffairs.com
MyEstatePoint Property Search Android app leaks user passwords – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini MyEstatePoint Property Search Android app leaks user passwords The MyEstatePoint...
SecurityAffairs.com
The source code of Zeppelin Ransomware sold on a hacking forum – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini The source code of Zeppelin Ransomware sold on a hacking...
SecurityAffairs.com
Hacker hijacked Orange Spain RIPE account causing internet outage to company customers – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Hacker hijacked Orange Spain RIPE account causing internet outage to...
SecurityAffairs.com
HealthEC data breach impacted more than 4.5 Million people – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini HealthEC data breach impacted more than 4.5 Million people Healthcare...
SecurityAffairs.com
Experts found 3 malicious packages hiding crypto miners in PyPi repository – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Experts found 3 malicious packages hiding crypto miners in PyPi...
SecurityAffairs.com
Crooks hacked Mandiant X account to push cryptocurrency scam – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Crooks hacked Mandiant X account to push cryptocurrency scam The...
SecurityAffairs.com
Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud Crooks created...
SecurityAffairs.com
CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN...
SecurityAffairs.com
Don’t trust links with known domains: BMW affected by redirect vulnerability – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Don’t trust links with known domains: BMW affected by redirect...
SecurityAffairs.com
Hackers stole more than $81 million worth of crypto assets from Orbit Chain – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Hackers stole more than $81 million worth of crypto assets...
SecurityAffairs.com
Ukraine’s SBU said that Russia’s intelligence hacked surveillance cameras to direct a missile strike on Kyiv – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Ukraine’s SBU said that Russia’s intelligence hacked surveillance cameras to...
SecurityAffairs.com
Researchers released a free decryptor for Black Basta ransomware – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Researchers released a free decryptor for Black Basta ransomware A...
SecurityAffairs.com
Experts warn of JinxLoader loader used to spread Formbook and XLoader – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Experts warn of JinxLoader loader used to spread Formbook and...
SecurityAffairs.com
Terrapin attack allows to downgrade SSH protocol security – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Terrapin attack allows to downgrade SSH protocol security Researchers discovered...
SecurityAffairs.com
Multiple organizations in Iran were breached by a mysterious hacker – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Multiple organizations in Iran were breached by a mysterious hacker...
SecurityAffairs.com
Top 2023 Security Affairs cybersecurity stories – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Top 2023 Security Affairs cybersecurity stories These are the Top...
SecurityAffairs.com
Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies...
SecurityAffairs.com
Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Cactus RANSOMWARE gang hit the Swedish retail and grocery provider...
SecurityAffairs.com
Google agreed to settle a $5 billion privacy lawsuit – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Google agreed to settle a $5 billion privacy lawsuit Pierluigi...
SecurityAffairs.com
Security Affairs newsletter Round 452 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Security Affairs newsletter Round 452 by Pierluigi Paganini – INTERNATIONAL...
SecurityAffairs.com
INC RANSOM ransomware gang claims to have breached Xerox Corp – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini INC RANSOM ransomware gang claims to have breached Xerox Corp...
SecurityAffairs.com
Spotify music converter TuneFab puts users at risk – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Spotify music converter TuneFab puts users at risk Pierluigi Paganini...
SecurityAffairs.com
Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Cyber attacks hit the Assembly of the Republic of Albania...
SecurityAffairs.com
Russia-linked APT28 used new malware in a recent phishing campaign – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Russia-linked APT28 used new malware in a recent phishing campaign...
SecurityAffairs.com
Clash of Clans gamers at risk while using third-party app – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Clash of Clans gamers at risk while using third-party app...
SecurityAffairs.com
New Version of Meduza Stealer Released in Dark Web – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini New Version of Meduza Stealer Released in Dark Web Pierluigi...
SecurityAffairs.com
Operation Triangulation attacks relied on an undocumented hardware feature – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Operation Triangulation attacks relied on an undocumented hardware feature Pierluigi...
SecurityAffairs.com
Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive...
SecurityAffairs.com
Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Lockbit ransomware attack interrupted medical emergencies gang at a German...
SecurityAffairs.com
Experts warn of critical Zero-Day in Apache OfBiz – Source: securityaffairs.com
Source: securityaffairs.com - Author: Pierluigi Paganini Experts warn of critical Zero-Day in Apache OfBiz Pierluigi Paganini...
Posts pagination
1
…
5
6
7
…
32
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025