Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates – Source:thehackernews.com
Source: thehackernews.com - Author: . The China-linked threat actor known as Mustang Panda has been attributed...
The Hacker News
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns – Source:thehackernews.com
Source: thehackernews.com - Author: . Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have...
The Hacker News
Artificial Intelligence – What’s all the fuss? – Source:thehackernews.com
Source: thehackernews.com - Author: . Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to...
The Hacker News
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution – Source:thehackernews.com
Source: thehackernews.com - Author: . A critical security vulnerability has been disclosed in the Erlang/Open Telecom...
The Hacker News
Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords – Source:thehackernews.com
Source: thehackernews.com - Author: . Blockchain is best known for its use in cryptocurrencies like Bitcoin,...
The Hacker News
Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft is calling attention to an ongoing malvertising campaign that makes...
The Hacker News
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added...
The Hacker News
Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia,...
The Hacker News
New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have detailed four different vulnerabilities in a core component...
The Hacker News
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have detailed four different vulnerabilities in a core component...
The Hacker News
Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024 – Source:thehackernews.com
Source: thehackernews.com - Author: . Google on Wednesday revealed that it suspended over 39.2 million advertiser...
The Hacker News
Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat actors are leveraging an artificial intelligence (AI) powered presentation platform...
The Hacker News
From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains – Source:thehackernews.com
Source: thehackernews.com - Author: . Introduction Cyber threats targeting supply chains have become a growing concern...
The Hacker News
New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have unearthed a new controller component associated with a...
The Hacker News
Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense – Source:thehackernews.com
Source: thehackernews.com - Author: . Intro: Why hack in when you can log in? SaaS applications...
The Hacker News
Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users – Source:thehackernews.com
Source: thehackernews.com - Author: . Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed...
The Hacker News
U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. government funding for non-profit research giant MITRE to operate...
The Hacker News
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool – Source:thehackernews.com
Source: thehackernews.com - Author: . The China-linked threat actor known as UNC5174 has been attributed to...
The Hacker News
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence – Source:thehackernews.com
Source: thehackernews.com - Author: . A critical security vulnerability has been disclosed in the Apache Roller...
The Hacker News
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds – Source:thehackernews.com
Source: thehackernews.com - Author: . Everybody knows browser extensions are embedded into nearly every user’s daily...
The Hacker News
Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have disclosed a malicious package uploaded to the Python...
The Hacker News
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges – Source:thehackernews.com
Source: thehackernews.com - Author: . The North Korea-linked threat actor assessed to be behind the massive...
The Hacker News
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . A recently disclosed security flaw in Gladinet CentreStack also impacts its...
The Hacker News
Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval – Source:thehackernews.com
Source: thehackernews.com - Author: . Meta has announced that it will begin to train its artificial...
The Hacker News
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have discovered a new, sophisticated remote access trojan called...
The Hacker News
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers are calling attention to a new type of credential...
The Hacker News
⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More – Source:thehackernews.com
Source: thehackernews.com - Author: . Attackers aren’t waiting for patches anymore — they are breaking in...
The Hacker News
Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left Behind – Source:thehackernews.com
Source: thehackernews.com - Author: . AI is changing cybersecurity faster than many defenders realize. Attackers are...
The Hacker News
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT – Source:thehackernews.com
Source: thehackernews.com - Author: . A threat actor with ties to Pakistan has been observed targeting...
The Hacker News
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit – Source:thehackernews.com
Source: thehackernews.com - Author: . Fortinet has revealed that threat actors have found a way to...
Posts navigation
1
2
…
65
Latest News
The Register Security
Free Blue Screens of Death for Windows 11 24H2 users – Source: go.theregister.com
17/04/2025
The Register Security
Signalgate chats vanish from CIA chief phone – Source: go.theregister.com
17/04/2025
The Register Security
Identifying the cyber risks that matter – Source: go.theregister.com
17/04/2025
The Register Security
CVE program gets last-minute funding from CISA – and maybe a new home – Source: go.theregister.com
17/04/2025
The Register Security
Law firm ‘didn’t think’ data theft was a breach, says ICO. Now it’s nursing a £60K fine – Source: go.theregister.com
17/04/2025
The Register Security
Russians lure European diplomats into malware trap with wine-tasting invite – Source: go.theregister.com
17/04/2025