Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 13, 2023THNRansomware / Malware A new ransomware family called 3AM...
The Hacker News
How Cyberattacks Are Transforming Warfare – Source:thehackernews.com
Source: thehackernews.com - Author: . There is a new battlefield. It is global and challenging to...
The Hacker News
Microsoft Warns of New Phishing Campaign Targeting Corporations via Teams Messages – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft is warning of a new phishing campaign undertaken by an...
The Hacker News
Microsoft Releases Patch for Two New Actively Exploited Zero-Days Flaws – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 13, 2023THNEndpoint Security / Zero Day Microsoft has released software...
The Hacker News
Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 13, 2023THNVulnerability / Zero Day Adobe's Patch Tuesday update for...
The Hacker News
Mozilla Rushes to Patch WebP Critical Zero-Day Exploit in Firefox and Thunderbird – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 13, 2023THNVulnerability / Browser Security Mozilla on Tuesday released security...
The Hacker News
Critical GitHub Vulnerability Exposes 4,000+ Repositories to Repojacking Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 12, 2023THNSoftware Security / Vulnerability A new vulnerability disclosed in...
The Hacker News
7 Steps to Kickstart Your SaaS Security Program – Source:thehackernews.com
Source: thehackernews.com - Author: . SaaS applications are the backbone of modern businesses, constituting a staggering...
The Hacker News
Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 12, 2023THNCritical Infrastructure Security A threat actor called Redfly has...
The Hacker News
Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 12, 2023THNEndpoint Security / Malware A sophisticated phishing campaign is...
The Hacker News
Beware: MetaStealer Malware Targets Apple macOS in Recent Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 12, 2023THNEndpoint Security / Data Security A new information stealer...
The Hacker News
Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild – Update Now – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 12, 2023THNBrowser Security / Zero Day Google on Monday rolled...
The Hacker News
Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 11, 2023THNMalware / Social Media A new phishing attack is...
The Hacker News
Charming Kitten’s New Backdoor ‘Sponsor’ Targets Brazil, Israel, and U.A.E. – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 11, 2023THNCyber Espionage / Malware The Iranian threat actor known...
The Hacker News
How to Prevent API Breaches: A Guide to Robust Security – Source:thehackernews.com
Source: thehackernews.com - Author: . With the growing reliance on web applications and digital platforms, the...
The Hacker News
Google Chrome Rolls Out Support for ‘Privacy Sandbox’ to Bid Farewell to Tracking Cookies – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 11, 2023THNPrivacy / Online Security Google has officially begun its...
The Hacker News
Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 11, 2023THNEndpoint Security / Malware A new cyber attack campaign...
The Hacker News
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 11, 2023THNCyber Crime / Malware A new malware loader called...
The Hacker News
Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 09, 2023THNMobile Security / Spyware Spyware masquerading as modified versions...
The Hacker News
Cybercriminals Weaponizing Legitimate Advanced Installer Tool in Crypto-Mining Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 09, 2023THNMalware / Hacking A legitimate Windows tool used for...
The Hacker News
U.K. and U.S. Sanction 11 Russia-based Trickbot Cybercrime Gang Members – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 08, 2023THNCybercrime / Malware The U.K. and U.S. governments on...
The Hacker News
Cisco Issues Urgent Fix for Authentication Bypass Bug Affecting BroadWorks Platform – Source:thehackernews.com
Source: thehackernews.com - Author: . Cisco has released security fixes to address multiple security flaws, including...
The Hacker News
Protecting Your Microsoft IIS Servers Against Malware Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft Internet Information Services (IIS) is a web server software package...
The Hacker News
North Korean Hackers Exploit Zero-Day Bug to Target Cybersecurity Researchers – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat actors associated with North Korea are continuing to target the...
The Hacker News
CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 08, 2023THNEndpoint Security / Exploit The U.S. Cybersecurity and Infrastructure...
The Hacker News
Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 08, 2023THNSpyware / Vulnerability Apple on Thursday released emergency security...
The Hacker News
Mac Users Beware: Malvertising Campaign Spreads Atomic Stealer macOS Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 07, 2023THNMalvertising / Endpoint Security A new malvertising campaign has...
The Hacker News
The State of the Virtual CISO Report: MSP/MSSP Security Strategies for 2024 – Source:thehackernews.com
Source: thehackernews.com - Author: . By the end of 2024, the number of MSPs and MSSPs...
The Hacker News
Alert: Apache Superset Vulnerabilities Expose Servers to Remote Code Execution Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 07, 2023THNServer Security / Vulnerability Patches have been released to...
The Hacker News
Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs for Cyberattacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Sep 07, 2023THNBotnet / Cyber Threat A Mirai botnet variant called...
Posts pagination
1
…
12
13
14
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025