Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Microsoft is Rolling out Support for Passkeys in Windows 11 – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 26, 2023THNEndpoint Security / Password Microsoft is officially rolling out...
The Hacker News
ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity experts have shed light on a new cybercrime group known...
The Hacker News
Essential Guide to Cybersecurity Compliance – Source:thehackernews.com
Source: thehackernews.com - Author: . SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks...
The Hacker News
Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial Institutions – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 26, 2023THNMobile Security / Malware An updated version of an...
The Hacker News
Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic – Source:thehackernews.com
Source: thehackernews.com - Author: . How To Use This Report Enhance situational awareness of techniques used...
The Hacker News
Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 26, 2023THNCyber Espionage / Malware A "multi-year" Chinese state-sponsored cyber...
The Hacker News
Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 26, 2023THNVulnerability / Source Code A critical security vulnerability in...
The Hacker News
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 25, 2023THNCyber Attack / Phishing Ukrainian military entities are the...
The Hacker News
Are You Willing to Pay the High Cost of Compromised Credentials? – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 25, 2023The Hacker NewsPassword Security / Cybersecurity Weak password policies...
The Hacker News
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 25, 2023THNSpyware / Cyber Espionage Tibetan, Uyghur, and Taiwanese individuals...
The Hacker News
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government – Source:thehackernews.com
Source: thehackernews.com - Author: . An unnamed Southeast Asian government has been targeted by multiple China-nexus...
The Hacker News
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph...
The Hacker News
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware – Source:thehackernews.com
Source: thehackernews.com - Author: . The three zero-day flaws addressed by Apple on September 21, 2023,...
The Hacker News
New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 22, 2023THNMalware / Cyber Threat An active malware campaign targeting...
The Hacker News
How to Interpret the 2023 MITRE ATT&CK Evaluation Results – Source:thehackernews.com
Source: thehackernews.com - Author: . Thorough, independent tests are a vital resource for analyzing provider's capabilities...
The Hacker News
Iranian Nation-State Actor OilRig Targets Israeli Organizations – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 22, 2023THNCyber Attack / Malware Israeli organizations were targeted as...
The Hacker News
High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 22, 2023THNServer Security / Vulnerability Atlassian and the Internet Systems...
The Hacker News
Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 22, 2023THNZero Day / Vulnerability Apple has released yet another...
The Hacker News
Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNTelecom Security / Cyber Attack A previously undocumented threat...
The Hacker News
Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNBotnet / Cyber Threat The peer-to-peer (P2) worm known...
The Hacker News
The Rise of the Malicious App – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023The Hacker NewsSaaS Security / App Security Security teams...
The Hacker News
China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNCyber Espionage / Spyware China's Ministry of State Security...
The Hacker News
Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNCyber Threat / Ransomware A financially motivated threat actor...
The Hacker News
Ukrainian Hacker Suspected to be Behind “Free Download Manager” Malware Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNSupply Chain / Malware The maintainers of Free Download...
The Hacker News
Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RAT – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 21, 2023THNVulnerability / Exploit A malicious actor released a fake...
The Hacker News
Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 20, 2023THNCyber Crime / Dark Web Finnish law enforcement authorities...
The Hacker News
Critical Security Flaws Exposed in Nagios XI Network Monitoring Software – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 20, 2023THNNetwork Security / Vulnerability Multiple security flaws have been...
The Hacker News
Do You Really Trust Your Web Application Supply Chain? – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 20, 2023The Hacker NewsWeb Application Security Well, you shouldn't. It...
The Hacker News
Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 20, 2023THNKubernetes / Supply Chain Attack Cybersecurity researchers have discovered...
The Hacker News
Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 20, 2023THNMalware Attack / Cyber Threat Chinese-language speakers have been...
Posts pagination
1
…
10
11
12
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025