Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Encryption Flaws in Popular Chinese Language App Put Users’ Typed Data at Risk – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 10, 2023THNPrivacy / Encryption A widely used Chinese language input...
The Hacker News
Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue...
The Hacker News
Cybercriminals Increasingly Using EvilProxy Phishing Kit to Target Executives – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy...
The Hacker News
Interpol Busts Phishing-as-a-Service Platform ’16Shop,’ Leading to 3 Arrests – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 10, 2023THNCyber Crime / Hacking Interpol has announced the takedown...
The Hacker News
Collide+Power, Downfall, and Inception: New Side-Channel Attacks Affecting Modern CPUs – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have disclosed details of a trio of side-channel attacks...
The Hacker News
China-Linked Hackers Strike Worldwide: 17 Nations Hit in 3-Year Cyber Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023THNCyber Espionage / Cyber Attacks Hackers associated with China's...
The Hacker News
Continuous Security Validation with Penetration Testing as a Service (PTaaS) – Source:thehackernews.com
Source: thehackernews.com - Author: . Validate security continuously across your full stack with Pen Testing as...
The Hacker News
U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023THNData Breach / Cyber Attack The U.K. Electoral Commission...
The Hacker News
New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023THNMobile Security / Network Attack Google has introduced a...
The Hacker News
Microsoft Releases Patches for 74 New Vulnerabilities in August Update – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023THNSoftware Security / Vulnerability Microsoft has patched a total...
The Hacker News
Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023THNCloud Security / Kubernetes Exposed Kubernetes (K8s) clusters are...
The Hacker News
New Report Exposes Vice Society’s Collaboration with Rhysida Ransomware – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 09, 2023The Hacker NewsCyber Threat / Ransomware Tactical similarities have...
The Hacker News
QakBot Malware Operators Expand C2 Network with 15 New Servers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 08, 2023THNMalware / Cyber Threat The operators associated with the...
The Hacker News
Hackers Abusing Cloudflare Tunnels for Covert Communications – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 08, 2023THNCyber Threat / Network Security New research has revealed...
The Hacker News
Understanding Active Directory Attack Paths to Improve Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Introduced in 1999, Microsoft Active Directory is the default identity and...
The Hacker News
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 08, 2023THNEndpoint Security / Malware An unknown threat actor is...
The Hacker News
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 08, 2023THNMalware / Cyber Threat Cybersecurity researchers have discovered a...
The Hacker News
New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023THNCyber Crime / Malware A new malware campaign has...
The Hacker News
North Korean Hackers Targets Russian Missile Engineering Firm – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023THNCyber Attack Two different North Korean nation-state actors have...
The Hacker News
Enhancing Security Operations Using Wazuh: Open Source XDR and SIEM – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023The Hacker NewsSIEM and XDR Platform In today's interconnected...
The Hacker News
New ‘Deep Learning Attack’ Deciphers Laptop Keystrokes with 95% Accuracy – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023THNDeep Learning / Endpoint Security A group of academics...
The Hacker News
New SkidMap Redis Malware Variant Targeting Vulnerable Redis Servers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023THNData Security / Linux Vulnerable Redis services have been...
The Hacker News
FBI Alert: Crypto Scammers are Masquerading as NFT Developers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 07, 2023THNCyber Crime / Cryptocurrency The U.S. Federal Bureau of...
The Hacker News
MDR: Empowering Organizations with Enhanced Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 05, 2023The Hacker NewsManaged Detection and Response Managed Detection and...
The Hacker News
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 05, 2023THNLinux / Malware Threat actors are using an open-source...
The Hacker News
Microsoft Addresses Critical Power Platform Flaw After Delays and Criticism – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 05, 2023THNVulnerability / Cyber Threat Microsoft on Friday disclosed that...
The Hacker News
Researchers Uncover New High-Severity Vulnerability in PaperCut Software – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 05, 2023THNVulnerability / Software Security Cybersecurity researchers have discovered a...
The Hacker News
NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 04, 2023THNCryptocurrency / Cyber Crime A married couple from New...
The Hacker News
Webinar – Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 04, 2023The Hacker News Privileged Access Management (PAM) solutions are...
The Hacker News
Malicious npm Packages Found Exfiltrating Sensitive Data from Developers – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have discovered a new bunch of malicious packages on...
Posts pagination
1
…
17
18
19
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025