Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Department of the Treasury's Office of Foreign Assets Control...
The Hacker News
Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actor known as Patchwork has been attributed to a...
The Hacker News
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor – Source:thehackernews.com
Source: thehackernews.com - Author: . Russian aerospace and defense industries have become the target of a...
The Hacker News
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat hunters have disclosed two different malware campaigns that have targeted...
The Hacker News
Overcoming Risks from Chinese GenAI Tool Usage – Source:thehackernews.com
Source: thehackernews.com - Author: . A recent analysis of enterprise data suggests that generative AI tools...
The Hacker News
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems – Source:thehackernews.com
Source: thehackernews.com - Author: . Mitel has released security updates to address a critical security flaw...
The Hacker News
Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments – Source:thehackernews.com
Source: thehackernews.com - Author: . Virtualization and networking infrastructure have been targeted by a threat actor...
The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have shed light on a new versatile malware loader...
The Hacker News
Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices – Source:thehackernews.com
Source: thehackernews.com - Author: . Sophos and SonicWall have alerted users of critical security flaws in...
The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them – Source:thehackernews.com
Source: thehackernews.com - Author: . Is Managing Customer Logins and Data Giving You Headaches? You're Not...
The Hacker News
Pentests once a year? Nope. It’s time to build an offensive SOC – Source:thehackernews.com
Source: thehackernews.com - Author: . You wouldn’t run your blue team once a year, so why...
The Hacker News
China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community – Source:thehackernews.com
Source: thehackernews.com - Author: . The Tibetan community has been targeted by a China-nexus cyber espionage...
The Hacker News
Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft has revealed that one of the threat actors behind the...
The Hacker News
Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace – Source:thehackernews.com
Source: thehackernews.com - Author: . Europol on Monday announced the arrest of the suspected administrator of...
The Hacker News
Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have uncovered a new stealthy backdoor concealed within the...
The Hacker News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actor behind the exploitation of vulnerable Craft Content Management...
The Hacker News
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials – Source:thehackernews.com
Source: thehackernews.com - Author: . The Windows banking trojan known as Coyote has become the first...
The Hacker News
Kerberoasting Detections: A New Approach to a Decade-Old Challenge – Source:thehackernews.com
Source: thehackernews.com - Author: . Security experts have been talking about Kerberoasting for over a decade,...
The Hacker News
Malware Injected into 7 npm Packages After Maintainer Tokens Stolen in Phishing Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have alerted to a supply chain attack that has...
The Hacker News
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages – Source:thehackernews.com
Source: thehackernews.com - Author: . Google has announced the launch of a new initiative called OSS...
The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on July 22,...
The Hacker News
CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security...
The Hacker News
Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft has formally tied the exploitation of security flaws in internet-facing...
The Hacker News
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access – Source:thehackernews.com
Source: thehackernews.com - Author: . Cisco on Monday updated its advisory of a set of recently...
The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate – Source:thehackernews.com
Source: thehackernews.com - Author: . Mexican organizations are still being targeted by threat actors to deliver...
The Hacker News
How to Advance from SOC Manager to CISO? – Source:thehackernews.com
Source: thehackernews.com - Author: . Making the move from managing a security operations center (SOC) to...
The Hacker News
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access – Source:thehackernews.com
Source: thehackernews.com - Author: . The recently disclosed critical Microsoft SharePoint vulnerability has been under exploitation...
The Hacker News
Ivanti Flaws Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have disclosed details of a new malware called MDifyLoader...
The Hacker News
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have unearthed new Android spyware artifacts that are likely...
The Hacker News
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure – Source:thehackernews.com
Source: thehackernews.com - Author: . The China-linked cyber espionage group tracked as APT41 has been attributed...
Posts navigation
1
2
…
66
Latest News
The Register Security
Coyote malware abuses Microsoft’s UI Automation to hunt banking creds – Source: go.theregister.com
25/07/2025
The Register Security
The EFF is 35, but the battle to defend internet freedom is far from over – Source: go.theregister.com
25/07/2025
The Register Security
Compromised Amazon Q extension told AI to delete everything – and it shipped – Source: go.theregister.com
25/07/2025
The Register Security
Eau no! Dior tells customers their data was swiped in cyber snafu – Source: go.theregister.com
25/07/2025
The Register Security
Not pretty, not Windows-only: npm phishing attack laces popular packages with malware – Source: go.theregister.com
25/07/2025
The Hacker News
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems – Source:thehackernews.com
24/07/2025