Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securityweek.com
securityweek.com
SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire SonicWall this week announced patches for multiple vulnerabilities in its...
securityweek.com
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press So much of the technology showcased at CES includes gadgets...
securityweek.com
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 – Source: www.securityweek.com
Source: www.securityweek.com - Author: Marc Solomon As we look ahead to the New Year and think...
securityweek.com
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Palo Alto Networks on Wednesday announced patches for multiple vulnerabilities...
securityweek.com
Excelsior Orthopaedics Data Breach Impacts 357,000 People – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Excelsior Orthopaedics is notifying approximately 357,000 people that their personal...
securityweek.com
Telegram Shared Data of Thousands of Users After CEO’s Arrest – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Following the arrest of its CEO last summer, Telegram has...
securityweek.com
Japan Links Chinese Hacker MirrorFace to Dozens of Cyberattacks Targeting Security and Tech Data – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press Japan on Wednesday linked more than 200 cyberattacks over the...
securityweek.com
Rationalizing the Stack: The Case for Security Vendor Consolidation – Source: www.securityweek.com
Source: www.securityweek.com - Author: Joshua Goldfarb In recent years, tighter security budgets and macroeconomic headwinds have...
securityweek.com
Thousands Impacted by Casio Data Breach – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Japanese electronics giant Casio has completed its investigation into the...
securityweek.com
Cybersecurity Funding Reached $9.5 Billion in 2024: Report – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Funding raised by cybersecurity firms increased to $9.5 billion last...
securityweek.com
Insider Threat: Tackling the Complex Challenges of the Enemy Within – Source: www.securityweek.com
Source: www.securityweek.com - Author: Kevin Townsend The insider threat is a simple term for a mammoth...
securityweek.com
New Labels Will Help People Pick Devices Less at Risk of Hacking – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press The federal government is rolling out a consumer labeling system...
securityweek.com
CISA Warns of Mitel MiCollab Vulnerabilities Exploited in Attacks – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The US cybersecurity agency CISA on Tuesday warned that two...
securityweek.com
Trolley Problem, Safety Versus Security of Generative AI – Source: www.securityweek.com
Source: www.securityweek.com - Author: Matt Honea Building on my previous column, I will dive into part...
securityweek.com
Former NSA Director Rob Joyce Joins DataTribe as Venture Partner – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News Former NSA director Rob Joyce has joined venture capital firm...
securityweek.com
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press The U.S. Defense Department has added dozens of Chinese companies,...
securityweek.com
Dell, HPE, MediaTek Patch Vulnerabilities in Their Products – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Hardware makers MediaTek, HPE and Dell on Monday released advisories...
securityweek.com
Washington Attorney General Sues T-Mobile Over 2021 Data Breach – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Washington State Attorney General Bob Ferguson on Monday filed a...
securityweek.com
CISA: No Federal Agency Beyond Treasury Impacted by BeyondTrust Incident – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The US cybersecurity agency CISA on Monday said that no...
securityweek.com
Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Roughly 2,000 ransomware attacks were launched over the past decade...
securityweek.com
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press China has slammed a decision by the U.S. Treasury to...
securityweek.com
Anticipating the Cyber Frontier: Top Predictions for 2025 – Source: www.securityweek.com
Source: www.securityweek.com - Author: Torsten George The year 2024 witnessed heightened cybersecurity activity, with security professionals...
securityweek.com
Wallet Drainer Malware Used to Steal $500 Million in Cryptocurrency in 2024 – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Nearly $500 million in cryptocurrency was stolen from more than...
securityweek.com
Code Execution Flaw Found in Nuclei Vulnerability Scanner – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire A security defect in the Nuclei vulnerability scanner could have...
securityweek.com
Cybersecurity M&A Roundup: 37 Deals Announced in December 2024 – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Thirty-seven cybersecurity-related merger and acquisition (M&A) deals were announced in...
securityweek.com
Tenable Disables Nessus Agents Over Faulty Updates – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Tenable has disabled two Nessus scanner agent versions after discovering...
securityweek.com
Is Your Car Spying on You? What It Means That Tesla Shared Data in the Las Vegas Explosion – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press Your car is spying on you. That is one takeaway...
securityweek.com
US Sanctions Chinese Firm Linked to Flax Typhoon Attacks on Critical Infrastructure – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The US Department of the Treasury’s Office of Foreign Assets...
securityweek.com
IT Giant Atos Responds to Ransomware Group’s Data Theft Claims – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs French IT services giant Atos said its systems have not...
securityweek.com
In Other News: Volkswagen Data Leak, DoubleClickjacking, China Denies Hacking US Treasury – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy...
Posts pagination
1
…
25
26
27
…
80
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025