Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securityweek.com
securityweek.com
$200 Million in Cryptocurrency Stolen in Mixin Network Hack – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Peer-to-peer digital asset transactional network Mixin Network has suspended deposits...
securityweek.com
Stealthy APT Gelsemium Seen Targeting Southeast Asian Government – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire A stealthy advanced persistent threat (APT) actor known as Gelsemium...
securityweek.com
Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire A Nigerian national residing in South Africa last week pleaded...
securityweek.com
900 US Schools Impacted by MOVEit Hack at National Student Clearinghouse – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs The National Student Clearinghouse, an educational nonprofit that provides reporting,...
securityweek.com
City of Dallas Details Ransomware Attack Impact, Costs – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The City of Dallas has announced that an $8.5 million...
securityweek.com
In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire A critical vulnerability in the TeamCity CI/CD server could be...
securityweek.com
Predator Spyware Delivered to iOS, Android Devices via Zero-Days, MitM Attacks – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs The Predator spyware has been delivered to iPhones and Android...
securityweek.com
Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press A leading Egyptian opposition politician was targeted with spyware after...
securityweek.com
In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek is publishing a weekly cybersecurity roundup that provides a...
securityweek.com
China’s Offensive Cyber Operations in Africa Support Soft Power Efforts – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Chinese state-sponsored threat groups have targeted telecommunications, financial and government...
securityweek.com
Air Canada Says Employee Information Accessed in Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Air Canada, the largest airline in the country, this week...
securityweek.com
BIND Updates Patch Two High-Severity DoS Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The Internet Systems Consortium (ISC) has released security updates to...
securityweek.com
Faster Patching Pace Validates CISA’s KEV Catalog Initiative – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The Known Exploited Vulnerabilities (KEV) Catalog maintained by the US...
securityweek.com
SANS Survey Shows Drop in 2023 ICS/OT Security Budgets – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs A survey conducted by the SANS Institute shows that the...
securityweek.com
Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Apple announced on Thursday that its latest operating system updates...
securityweek.com
New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine A new and mysterious APT group has been spotted targeting...
securityweek.com
Every Network Is Now an OT Network. Can Your Security Keep Up? – Source: www.securityweek.com
Source: www.securityweek.com - Author: John Maddison Every network today is now an OT network. Or it...
securityweek.com
Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 – Source: www.securityweek.com
Source: www.securityweek.com - Author: Torsten George This October will mark the 20th anniversary of Cybersecurity Awareness...
securityweek.com
TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Credit reporting firm TransUnion this week denied being breached, after...
securityweek.com
Legit Security Raises $40 Million in Series B Financing – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Application security posture management firm Legit Security on Wednesday announced...
securityweek.com
Cisco to Acquire Splunk for $28 Billion – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Cisco on Thursday announced that it has entered into a...
securityweek.com
Atlassian Security Updates Patch High-Severity Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Atlassian this week announced patches for four high-severity vulnerabilities impacting...
securityweek.com
Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Research-focused security services provider IOActive has conducted an analysis of...
securityweek.com
UK’s New Online Safety Law Adds to Crackdown on Big Tech Companies – Source: www.securityweek.com
Source: www.securityweek.com - Author: Associated Press British lawmakers have approved an ambitious but controversial new internet...
securityweek.com
Critical Infrastructure Organizations Warned of Snatch Ransomware Attacks – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The FBI and the cybersecurity agency CISA on Wednesday published...
securityweek.com
Intel Launches New Attestation Service as Part of Trust Authority Portfolio – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Chip giant Intel announced on the second day of its...
securityweek.com
Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Authorities in Finland and Europol on Tuesday announced the seizure...
securityweek.com
Staying on Topic in an Off Topic World – Source: www.securityweek.com
Source: www.securityweek.com - Author: Joshua Goldfarb Have you ever been in a meeting where someone keeps...
securityweek.com
Discern Security Emerges From Stealth Mode With $3 Million in Funding – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire AI-driven policy management cybersecurity startup Discern Security on Tuesday announced...
securityweek.com
DHS Publishes New Recommendations on Cyber Incident Reporting – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The US Department of Homeland Security (DHS) on Tuesday published...
Posts pagination
1
…
50
51
52
…
80
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025