Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have disclosed 46 new security flaws in products from...
The Hacker News
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers are calling attention to a new sophisticated malware called...
The Hacker News
Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity – Source:thehackernews.com
Source: thehackernews.com - Author: . Long gone are the days when a simple backup in a...
The Hacker News
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps – Source:thehackernews.com
Source: thehackernews.com - Author: . An Android malware family previously observed targeting Indian military personnel has...
The Hacker News
Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry...
The Hacker News
Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Mozilla has released updates to address a critical security flaw impacting...
The Hacker News
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform...
The Hacker News
Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . A new analysis has uncovered connections between affiliates of RansomHub and...
The Hacker News
APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . An advanced persistent threat (APT) group with ties to Pakistan has...
The Hacker News
New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It – Source:thehackernews.com
Source: thehackernews.com - Author: . Whether it’s CRMs, project management tools, payment processors, or lead management...
The Hacker News
Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert! – Source:thehackernews.com
Source: thehackernews.com - Author: . Hackers have long used Word and Excel documents as delivery vehicles...
The Hacker News
150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platforms – Source:thehackernews.com
Source: thehackernews.com - Author: . An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects...
The Hacker News
CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two...
The Hacker News
NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systems – Source:thehackernews.com
Source: thehackernews.com - Author: . A critical security flaw has been disclosed in NetApp SnapCenter that,...
The Hacker News
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations – Source:thehackernews.com
Source: thehackernews.com - Author: . The Chinese threat actor known as FamousSparrow has been linked to...
The Hacker News
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actor known as EncryptHub exploited a recently-patched security vulnerability...
The Hacker News
RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment – Source:thehackernews.com
Source: thehackernews.com - Author: . The Russian-speaking hacking group called RedCurl has been linked to a...
The Hacker News
Malicious npm Package Modifies Local ‘ethers’ Library to Launch Reverse Shell Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have discovered two malicious packages on the npm registry...
The Hacker News
Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience – Source:thehackernews.com
Source: thehackernews.com - Author: . “A boxer derives the greatest advantage from his sparring partner…” —...
The Hacker News
How PAM Mitigates Insider Threats: Preventing Data Breaches, Privilege Misuse, and More – Source:thehackernews.com
Source: thehackernews.com - Author: . When people think of cybersecurity threats, they often picture external hackers...
The Hacker News
Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker...
The Hacker News
Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Google has released out-of-band fixes to address a high-severity security flaw...
The Hacker News
New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround – Source:thehackernews.com
Source: thehackernews.com - Author: . Broadcom has issued security patches to address a high-severity security flaw...
The Hacker News
Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker – Source:thehackernews.com
Source: thehackernews.com - Author: . A new investigation has unearthed nearly 200 unique command-and-control (C2) domains...
The Hacker News
Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years – Source:thehackernews.com
Source: thehackernews.com - Author: . A major telecommunications company located in Asia was allegedly breached by...
The Hacker News
AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface – Source:thehackernews.com
Source: thehackernews.com - Author: . Organizations now use an average of 112 SaaS applications—a number that...
The Hacker News
Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers are calling attention to an Android malware campaign that...
The Hacker News
INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust – Source:thehackernews.com
Source: thehackernews.com - Author: . Law enforcement authorities in seven African countries have arrested 306 suspects...
The Hacker News
Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication – Source:thehackernews.com
Source: thehackernews.com - Author: . A set of five critical security shortcomings have been disclosed in...
The Hacker News
Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft on Monday announced a new feature called inline data protection...
Posts navigation
1
2
…
66
Latest News
The Register Security
UK’s first permanent facial recognition cameras installed in South London – Source: go.theregister.com
27/03/2025
The Register Security
Ransomwared NHS software supplier nabs £3M discount from ICO for good behavior – Source: go.theregister.com
27/03/2025
The Hacker News
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records – Source:thehackernews.com
27/03/2025
The Hacker News
Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks – Source:thehackernews.com
27/03/2025
The Hacker News
APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware – Source:thehackernews.com
27/03/2025
The Hacker News
New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and How to Fix It – Source:thehackernews.com
27/03/2025