Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
security affairs
security affairs
Crooks are increasingly targeting DeFi platforms to steal cryptocurrency
Crooks are increasingly targeting DeFi platforms to steal cryptocurrency The U.S. FBI warns investors that crooks...
security affairs
A study on malicious plugins in WordPress Marketplaces
A study on malicious plugins in WordPress Marketplaces A group of researchers from the Georgia Institute...
security affairs
COVID-19 data put for sale on Dark Web
COVID-19 data put for sale on Dark Web Researchers discovered leaked PII stolen from Thailand’s Department...
security affairs
Scammers used a deepfake AI hologram of Binance executive to scam crypto projects
Scammers used a deepfake AI hologram of Binance executive to scam crypto projects Scammers used a...
security affairs
CISA adds 10 new flaws to its Known Exploited Vulnerabilities Catalog
CISA adds 10 new flaws to its Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure...
security affairs
Twilio hackers also breached the food delivery firm DoorDash
Twilio hackers also breached the food delivery firm DoorDash Twilio hackers also compromised the food delivery...
security affairs
New Agenda Ransomware appears in the threat landscape
New Agenda Ransomware appears in the threat landscape Trend Micro researchers warn of a new ransomware...
security affairs
Security Affairs newsletter Round 381
Security Affairs newsletter Round 381 A new round of the weekly SecurityAffairs newsletter arrived! Every week...
security affairs
Experts warn of the first known phishing attack against PyPI
Experts warn of the first known phishing attack against PyPI The Python Package Index (PyPI) warns...
security affairs
Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploit
Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploit Leaked documents...
security affairs
Nobelium APT uses new Post-Compromise malware MagicWeb
Nobelium APT uses new Post-Compromise malware MagicWeb Russia-linked APT group Nobelium is behind a new sophisticated...
security affairs
LastPass data breach: threat actors stole a portion of source code
LastPass data breach: threat actors stole a portion of source code Password management software firm LastPass...
security affairs
0ktapus phishing campaign: Twilio hackers targeted other 136 organizations
0ktapus phishing campaign: Twilio hackers targeted other 136 organizations The threat actors behind Twilio and Cloudflare attacks have been...
security affairs
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification technique
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification technique The North Korea-linked Kimsuky APT is...
security affairs
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access An Iran-linked Mercury APT group...
security affairs
Critical flaw impacts Atlassian Bitbucket Server and Data Center
Critical flaw impacts Atlassian Bitbucket Server and Data Center Atlassian addressed a critical vulnerability in Bitbucket Server and...
security affairs
Threat actor abuses Genshin Impact Anti-Cheat driver to disable antivirus
Threat actor abuses Genshin Impact Anti-Cheat driver to disable antivirus Threat actors abused a vulnerable anti-cheat...
security affairs
Unprecedented cyber attack hit State Infrastructure of Montenegro
Unprecedented cyber attack hit State Infrastructure of Montenegro The state Infrastructure of Montenegro was hit by...
security affairs
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access An Iran-linked Mercury APT group...
security affairs
Threat actors are using the Tox P2P messenger as C2 server
Threat actors are using the Tox P2P messenger as C2 server Threat actors are using the...
security affairs
GAIROSCOPE attack allows to exfiltrate data from Air-Gapped systems via ultrasonic tones
GAIROSCOPE attack allows to exfiltrate data from Air-Gapped systems via ultrasonic tones GAIROSCOPE: An Israeli researcher...
security affairs
Lockbit leak sites hit by mysterious DDoS attack after Entrust hack
Lockbit leak sites hit by mysterious DDoS attack after Entrust hack LockBit ransomware gang claims to...
security affairs
CISA adds Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog
CISA adds Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog US Cybersecurity and Infrastructure...
security affairs
Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business
Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business Experts found backdoors in budget...
security affairs
GitLab fixed a critical Remote Code Execution (RCE) bug in CE and EE releases
GitLab fixed a critical Remote Code Execution (RCE) bug in CE and EE releases DevOps platform...
security affairs
Over 80,000 Hikvision cameras can be easily hacked
Over 80,000 Hikvision cameras can be easily hacked Experts warn that over 80,000 Hikvision cameras are...
security affairs
Microsoft publicly discloses details on critical ChromeOS flaw
Microsoft publicly discloses details on critical ChromeOS flaw Microsoft shared technical details of a critical ChromeOS...
security affairs
France hospital Center Hospitalier Sud Francilien suffered ransomware attack
France hospital Center Hospitalier Sud Francilien suffered ransomware attack A French hospital, the Center Hospitalier Sud...
security affairs
VMware fixed a privilege escalation issue in VMware Tools
VMware fixed a privilege escalation issue in VMware Tools VMware this week released patches to address...
security affairs
AiTM phishing campaign also targets G Suite users
AiTM phishing campaign also targets G Suite users The threat actors behind a large-scale adversary-in-the-middle (AiTM) phishing...
Posts pagination
1
…
15
16
17
…
19
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025