Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 06, 2024NewsroomCybersecurity / Vulnerability A recently disclosed server-side request forgery...
The Hacker News
U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 06, 2024NewsroomSurveillance / Privacy The U.S. State Department said it's...
The Hacker News
Belarusian National Linked to BTC-e Faces 25 Years for $4 Billion Crypto Money Laundering – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 05, 2024NewsroomCryptocurrency / Financial Fraud A 42-year-old Belarusian and Cypriot...
The Hacker News
Combined Security Practices Changing the Game for Risk Management – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 05, 2024The Hacker NewsData Protection / Threat Intelligence A significant...
The Hacker News
Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 05, 2024NewsroomSpyware / Surveillance The iPhones belonging to nearly three...
The Hacker News
New Mispadu Banking Trojan Exploiting Windows SmartScreen Flaw – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 05, 2024NewsroomMalware / Financial Security The threat actors behind the...
The Hacker News
Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. government on Wednesday said the Chinese state-sponsored hacking group...
The Hacker News
Unified Identity – look for the meaning behind the hype! – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 08, 2024The Hacker NewsUnified Identity / Cyber Security If you've...
The Hacker News
HijackLoader Evolves: Researchers Decode the Latest Evasion Methods – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 08, 2024NewsroomEndpoint Security / Cyber Threat The threat actors behind...
The Hacker News
Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 08, 2024NewsroomData Protection / Mobile Securit Google has unveiled a...
The Hacker News
Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 08, 2024NewsroomCyber Espionage / Malware The North Korea-linked nation-state actor...
The Hacker News
Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 08, 2024NewsroomCyber Threat / Network Security Cisco, Fortinet, and VMware...
The Hacker News
After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actors behind the KV-botnet made "behavioral changes" to the...
The Hacker News
Critical Boot Loader Vulnerability in Shim Impacts Nearly All Linux Distros – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 07, 2024NewsroomDevice Security / Vulnerability The maintainers of shim have...
The Hacker News
New Webinar: 5 Steps to vCISO Success for MSPs and MSSPs – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 07, 2024The Hacker NewsRisk Management / Cybersecurity 2024 will be...
The Hacker News
Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse – Source:thehackernews.com
Source: thehackernews.com - Author: . A coalition of dozens of countries, including France, the U.K., and...
The Hacker News
Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 07, 2024NewsroomCyber Espionage / Network Security Chinese state-backed hackers broke...
The Hacker News
Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover – Patch Now – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 07, 2024NewsroomCybersecurity / Software Security JetBrains is alerting customers of...
The Hacker News
Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 06, 2024NewsroomVulnerability / Cloud Security Three new security vulnerabilities have...
The Hacker News
How a $10B Enterprise Customer Drastically Increased their SaaS Security Posture with 201% ROI by Using SSPM – Source:thehackernews.com
Source: thehackernews.com - Author: . SaaS applications are the darlings of the software world. They enable...
The Hacker News
Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 06, 2024NewsroomDark Web / Cybercrime Employment agencies and retail companies...
The Hacker News
Beware: Fake Facebook Job Ads Spreading ‘Ov3r_Stealer’ to Steal Crypto and Credentials – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 06, 2024NewsroomSocial Engineering / Malvertising Threat actors are leveraging bogus...
The Hacker News
Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 05, 2024NewsroomCyber Espionage / Cyber Extortion The threat actor known...
The Hacker News
U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 03, 2024NewsroomIntelligence Agency / Cyber Security The U.S. Treasury Department's...
The Hacker News
Mastodon Vulnerability Allows Hackers to Hijack Any Decentralized Account – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 03, 2024NewsroomVulnerability / Social Media The decentralized social network Mastodon...
The Hacker News
AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 03, 2024NewsroomCyber Attack / Software Security Remote desktop software maker...
The Hacker News
Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash...
The Hacker News
DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomCryptojacking / Malware The Computer Emergency Response Team of...
The Hacker News
Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomNational Security / Data Breach A former software engineer...
The Hacker News
Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024The Hacker NewsThreat Intelligence / Cloud Security Cloudzy, a...
Posts pagination
1
2
3
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025