Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Major Cybersecurity Agencies Collaborate to Unveil 2022’s Most Exploited Vulnerabilities – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 04, 2023THNSoftware Security / Cyber Theat A four-year-old critical security...
The Hacker News
Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNMobile Security / Malware Threat actors are leveraging a...
The Hacker News
New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3 – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNBrowser Security / Malware Cybersecurity researchers have discovered a...
The Hacker News
Hundreds of Citrix NetScaler ADC and Gateway Servers Hacked in Major Cyber Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNVulnerability / Cyber Threat Hundreds of Citrix NetScaler ADC...
The Hacker News
A Penetration Testing Buyer’s Guide for IT Security Teams – Source:thehackernews.com
Source: thehackernews.com - Author: . The frequency and complexity of cyber threats are constantly evolving. At...
The Hacker News
Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNCyber Threat / Network Security Microsoft is warning of...
The Hacker News
“Mysterious Team Bangladesh” Targeting India with DDoS Attacks and Data Breaches – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNCyber Attack / Data Safety A hacktivist group known...
The Hacker News
Microsoft Exposes Russian Hackers’ Sneaky Phishing Tactics via Microsoft Teams Chats – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNCyber Attack / Phishing Microsoft on Wednesday disclosed that...
The Hacker News
Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 03, 2023THNVulnerability / Software Security Cybersecurity researchers have discovered a...
The Hacker News
Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNCyber Threat / Hacking A Russa-nexus adversary has been...
The Hacker News
Phishers Exploit Salesforce’s Email Services Zero-Day in Targeted Facebook Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been...
The Hacker News
Industrial Control Systems Vulnerabilities Soar: Over One-Third Unpatched in 2023 – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNICS/SCADA Security About 34% of security vulnerabilities impacting industrial...
The Hacker News
Top Industries Significantly Impacted by Illicit Telegram Networks – Source:thehackernews.com
Source: thehackernews.com - Author: . In recent years the rise of illicit activities conducted within online...
The Hacker News
Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access Trojan – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered...
The Hacker News
Iranian Company Cloudzy Accused of Aiding Cybercriminals and Nation-State Hackers – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure...
The Hacker News
Norwegian Entities Targeted in Ongoing Attacks Exploiting Ivanti EPMM Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 02, 2023THNVulnerability / Cyber Attack Advanced persistent threat (APT) actors...
The Hacker News
New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python...
The Hacker News
European Bank Customers Targeted in SpyNote Android Trojan Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 01, 2023THNMobile Security / Malware Various European customers of different...
The Hacker News
What is Data Security Posture Management (DSPM)? – Source:thehackernews.com
Source: thehackernews.com - Author: . Data Security Posture Management is an approach to securing cloud data...
The Hacker News
Researchers Expose Space Pirates’ Cyber Campaign Across Russia and Serbia – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 01, 2023THNCyber Attack / Malware The threat actor known as...
The Hacker News
China’s APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe – Source:thehackernews.com
Source: thehackernews.com - Author: . A nation-state actor with links to China is suspected of being...
The Hacker News
Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan – Source:thehackernews.com
Source: thehackernews.com - Author: . Aug 01, 2023THNCyber Attack / Malware Organizations in Italy are the...
The Hacker News
New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 31, 2023THNCyber Threat / Botnet The P2PInfect peer-to-peer (P2) worm...
The Hacker News
Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 31, 2023THNCyber Espionage / Malware Threat actors associated with the...
The Hacker News
AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 31, 2023THNNetwork Security / Botnet More details have emerged about...
The Hacker News
Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 31, 2023THNMalware / Cyber Threat Threat actors are creating fake...
The Hacker News
Multiple Flaws Found in Ninja Forms Plugin Leave 800,000 Sites Vulnerable – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 31, 2023THNWebsite Security / WordPress Multiple security vulnerabilities have been...
The Hacker News
New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data – Source:thehackernews.com
Source: thehackernews.com - Author: . A new Android malware strain called CherryBlos has been observed making...
The Hacker News
RFP Template for Browser Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 29, 2023The Hacker NewsBrowser Security / Data Security Increasing cyber...
The Hacker News
Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 29, 2023THNData Security / Privacy Apple has announced plans to...
Posts pagination
1
…
18
19
20
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025