Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
North Korean Affiliates Suspected in $40M Cryptocurrency Heist, FBI Warns – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023THNCryptocurrency / Cyber Attack The U.S. Federal Bureau of...
The Hacker News
Meta Set to Enable Default End-to-End Encryption on Messenger by Year End – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023THNEncryption / Privacy Meta has once again reaffirmed its...
The Hacker News
Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023THNMobile Security / Cyber Crime A Syrian threat actor...
The Hacker News
Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023The Hacker NewsMalware / Cybersecurity Developers are not the...
The Hacker News
Spacecolon Toolset Fuels Global Surge in Scarab Ransomware Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023THNRansomware / Malware A malicious toolset dubbed Spacecolon is...
The Hacker News
Over a Dozen Malicious npm Packages Target Roblox Game Developers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 23, 2023THNSoftware Security / Malware More than a dozen malicious...
The Hacker News
Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 22, 2023THNSoftware Supply Chain / Malware A previously undocumented threat...
The Hacker News
New Variant of XLoader macOS Malware Disguised as ‘OfficeNote’ Productivity App – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 22, 2023THNMalware / Endpoint Security A new variant of an...
The Hacker News
Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 22, 2023THNZero-Day / Software Security Software services provider Ivanti is...
The Hacker News
Critical Adobe ColdFusion Flaw Added to CISA’s Exploited Vulnerability Catalog – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 22, 2023THNVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure...
The Hacker News
New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 21, 2023THNVulnerability / Cyber Threat A high-severity security flaw has...
The Hacker News
How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes – Source:thehackernews.com
Source: thehackernews.com - Author: . From a user's perspective, OAuth works like magic. In just a...
The Hacker News
This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 21, 2023THNMalware / Privacy Threat actors are leveraging access to...
The Hacker News
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 21, 2023THNCyber Threat / Malware The threat actors behind the...
The Hacker News
WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 19, 2023THNMalvertising / Website Security Cybersecurity researchers have detailed an...
The Hacker News
New Juniper Junos OS Flaws Expose Devices to Remote Attacks – Patch Now – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 19, 2023THNNetwork Security / Vulnerability Networking hardware company Juniper Networks...
The Hacker News
Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 19, 2023THNMobile Security / Malware Threat actors are using Android...
The Hacker News
14 Suspected Cybercriminals Arrested Across Africa in Coordinated Crackdown – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 18, 2023THNCyber Crime / Hacking News A coordinated law enforcement...
The Hacker News
The Vulnerability of Zero Trust: Lessons from the Storm 0558 Hack – Source:thehackernews.com
Source: thehackernews.com - Author: . While IT security managers in companies and public administrations rely on...
The Hacker News
New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 18, 2023THNEmail Seucrity / Cyber Attack A new "mass-spreading" social...
The Hacker News
New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft on Thursday disclosed that it found a new version of...
The Hacker News
Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 18, 2023THNBrowser Security / Malware Google has announced plans to...
The Hacker News
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNEndpoint Security / Vulnerability A previously undetected attack method...
The Hacker News
China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNCyber Attack / Malware An ongoing cyber attack campaign...
The Hacker News
New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNCryptojacking / Proxyjacking A new, financially motivated operation dubbed...
The Hacker News
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNMobile Security / Vulnerability Cybersecurity researchers have documented a...
The Hacker News
Why You Need Continuous Network Monitoring? – Source:thehackernews.com
Source: thehackernews.com - Author: . Changes in the way we work have had significant implications for...
The Hacker News
Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNCyber Espionage / Malware An ongoing campaign targeting ministries...
The Hacker News
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 17, 2023THNVulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure...
The Hacker News
What’s the State of Credential theft in 2023? – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 16, 2023The Hacker News At a little overt halfway through...
Posts pagination
1
…
15
16
17
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025