Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
securityweek.com
securityweek.com
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire A Chinese threat actor has been targeting known vulnerabilities in...
securityweek.com
Vulnerabilities in CISA KEV Are Not Equally Critical: Report – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Security flaws in CISA’s Known Exploited Vulnerabilities (KEV) catalog should...
securityweek.com
Law Firms Warned of Silent Ransom Group Attacks – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The FBI is cautioning US law firms that they have...
securityweek.com
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Nearly one month after it informed customers that it had...
securityweek.com
In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy...
securityweek.com
Companies Warned of Commvault Vulnerability Exploitation – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The ongoing exploitation of a Commvault vulnerability that was targeted...
securityweek.com
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Marlboro-Chesterfield Pathology (MCP), a full service anatomic pathology lab in...
securityweek.com
Signal Adds Screenshot-Blocker to Thwart ‘Windows Recall’ – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine Signal on Friday shipped a new feature that automatically blocks...
securityweek.com
Akamai, Microsoft Disagree on Severity of Unpatched ‘BadSuccessor’ Flaw – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine Akamai’s security team kicked off a new spat in the...
securityweek.com
Security Theater or Real Defense? The KPIs That Tell the Truth – Source: www.securityweek.com
Source: www.securityweek.com - Author: Torsten George A critical step in maturing any cybersecurity program is the...
securityweek.com
GitLab, Atlassian Patch High-Severity Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire GitLab and Atlassian this week announced the release of patches...
securityweek.com
CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine The US government’s cybersecurity agency CISA is sounding the alarm...
securityweek.com
Now Live: Threat Detection & Incident Response (TDIR) Summit – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes...
securityweek.com
Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit will...
securityweek.com
Madhu Gottumukkala Officially Announced as CISA Deputy Director – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday...
securityweek.com
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News BreachRx, a San Francisco startup in the incident response space,...
securityweek.com
Printer Company Procolored Served Infected Software for Months – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire For half a year, the website of printer company Procolored...
securityweek.com
480,000 Catholic Health Patients Impacted by Serviceaide Data Leak – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Enterprise management solutions provider Serviceaide has informed the Department of...
securityweek.com
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine Coinbase on Thursday laid out the full scope of a...
securityweek.com
Russian APT Exploiting Mail Servers Against Government, Defense Organizations – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The Russian state-sponsored group APT28 has been exploiting XSS vulnerabilities...
securityweek.com
In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach – Source: www.securityweek.com
Source: www.securityweek.com - Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy...
securityweek.com
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List – Source: www.securityweek.com
Source: www.securityweek.com - Author: Kevin Townsend Andrei Tarasov’s criminal life is not as glamorous as you...
securityweek.com
Production at Steelmaker Nucor Disrupted by Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs American steel giant Nucor Corporation (NYSE: NUE) revealed on Wednesday...
securityweek.com
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Enterprise cybersecurity giant Proofpoint announced on Thursday that it’s acquiring...
securityweek.com
Australian Human Rights Commission Discloses Data Breach – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire The Australian Human Rights Commission (AHRC) has disclosed a data...
securityweek.com
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Ivanti on Tuesday announced patches for three vulnerabilities in its...
securityweek.com
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments – Source: www.securityweek.com
Source: www.securityweek.com - Author: Marc Solomon I read a recent Google Intelligence Report which highlighted a...
securityweek.com
SAP Patches Another Exploited NetWeaver Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ionut Arghire Enterprise software maker SAP on Tuesday released 16 new and...
securityweek.com
Apple Patches Major Security Flaws in iOS, macOS Platforms – Source: www.securityweek.com
Source: www.securityweek.com - Author: Ryan Naraine Apple on Monday pushed out patches for security vulnerabilities across...
securityweek.com
Company and Personal Data Compromised in Recent Insight Partners Hack – Source: www.securityweek.com
Source: www.securityweek.com - Author: Eduard Kovacs Private equity and venture capital company Insight Partners is informing...
Posts pagination
1
…
5
6
7
…
80
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025