Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more – Source:thehackernews.com
Source: thehackernews.com - Author: . Ever wonder what happens when attackers don’t break the rules—they just...
The Hacker News
FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Federal Bureau of Investigation (FBI) has revealed that it...
The Hacker News
GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actor behind the GIFTEDCROOK malware has made significant updates...
The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns – Source:thehackernews.com
Source: thehackernews.com - Author: . Facebook, the social network platform owned by Meta, is asking for...
The Hacker News
Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat hunters have discovered a network of more than 1,000 compromised...
The Hacker News
PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . A China-linked threat actor known as Mustang Panda has been attributed...
The Hacker News
Business Case for Agentic AI SOC Analysts – Source:thehackernews.com
Source: thehackernews.com - Author: . Security operations centers (SOCs) are under pressure from both sides: threats...
The Hacker News
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit – Source:thehackernews.com
Source: thehackernews.com - Author: . A new campaign has been observed leveraging fake websites advertising popular...
The Hacker News
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat intelligence firm GreyNoise is warning of a "notable surge" in...
The Hacker News
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have detailed a new campaign dubbed OneClik that leverages...
The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX...
The Hacker News
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access – Source:thehackernews.com
Source: thehackernews.com - Author: . Cisco has released updates to address two maximum-severity security flaws in...
The Hacker News
New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . The ClickFix social engineering tactic as an initial access vector using...
The Hacker News
The Hidden Risks of SaaS: Why Built-In Protections Aren’t Enough for Modern Data Resilience – Source:thehackernews.com
Source: thehackernews.com - Author: . SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace SaaS platforms have...
The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard...
The Hacker News
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers are calling attention to a series of cyber attacks...
The Hacker News
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added...
The Hacker News
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews – Source:thehackernews.com
Source: thehackernews.com - Author: . Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered...
The Hacker News
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery – Source:thehackernews.com
Source: thehackernews.com - Author: . New research has uncovered continued risk from a known security weakness...
The Hacker News
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC – Source:thehackernews.com
Source: thehackernews.com - Author: . Citrix has released security updates to address a critical flaw affecting...
The Hacker News
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical...
The Hacker News
Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games – Source:thehackernews.com
Source: thehackernews.com - Author: . Thousands of personal records allegedly linked to athletes and visitors of...
The Hacker News
Beware the Hidden Risk in Your Entra Environment – Source:thehackernews.com
Source: thehackernews.com - Author: . If you invite guest users into your Entra ID tenant, you...
The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Unknown threat actors have been distributing a trojanized version of SonicWall's...
The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have uncovered a fresh batch of malicious npm packages...
The Hacker News
Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options – Source:thehackernews.com
Source: thehackernews.com - Author: . Microsoft on Tuesday announced that it's extending Windows 10 Extended Security...
The Hacker News
New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public – Source:thehackernews.com
Source: thehackernews.com - Author: . The United States Embassy in India has announced that applicants for...
The Hacker News
Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue – Source:thehackernews.com
Source: thehackernews.com - Author: . Cybersecurity researchers have detailed two novel methods that can be used...
The Hacker News
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers – Source:thehackernews.com
Source: thehackernews.com - Author: . Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange...
The Hacker News
Between Buzz and Reality: The CTEM Conversation We All Need – Source:thehackernews.com
Source: thehackernews.com - Author: . I had the honor of hosting the first episode of the...
Posts navigation
1
2
3
…
63
Latest News
The Register Security
ChatGPT creates phisher’s paradise by recommending the wrong URLs for major companies – Source: go.theregister.com
03/07/2025
The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams – Source:thehackernews.com
03/07/2025
The Hacker News
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets – Source:thehackernews.com
03/07/2025
The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About – Source:thehackernews.com
03/07/2025
The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms – Source:thehackernews.com
03/07/2025
The Hacker News
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials – Source:thehackernews.com
03/07/2025