Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Zero-Day Attacks Exploited Critical Vulnerability in Citrix ADC and Gateway – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 19, 2023THNVulnerability / Cyber Threat Citrix is alerting users of...
The Hacker News
Defend Against Insider Threats: Join this Webinar on SaaS Security Posture Management – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023The Hacker NewsSaaS Security / Cybersecurity As security practices...
The Hacker News
AIOS WordPress Plugin Faces Backlash for Storing User Passwords in Plaintext – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023THNPassword Security / WordPress All-In-One Security (AIOS), a WordPress...
The Hacker News
TeamTNT’s Cloud Credential Stealing Campaign Now Targets Azure and Google Cloud – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023THNCyber Threat / Cloud Security A malicious actor has...
The Hacker News
New SOHO Router Botnet AVrecon Spreads to 70,000 Devices Across 20 Countries – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023THNNetwork Security / Malware A new malware strain has...
The Hacker News
Zimbra Warns of Critical Zero-Day Flaw in Email Software Amid Active Exploitation – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023THNEmail Security / Vulnerability Zimbra has warned of a...
The Hacker News
PicassoLoader Malware Used in Ongoing Attacks on Ukraine and Poland – Source:thehackernews.com
Source: thehackernews.com - Author: . Government entities, military organizations, and civilian users in Ukraine and Poland...
The Hacker News
TeamTNT’s Silentbob Botnet Infecting 196 Hosts in Cloud Attack Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 13, 2023THNCloud Security / Cryptocurrency As many as 196 hosts...
The Hacker News
Fake PoC for Linux Kernel Vulnerability on GitHub Exposes Researchers to Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 13, 2023THNLinux / Vulnerability In a sign that cybersecurity researchers...
The Hacker News
Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNMalware / Cyber Attack An unidentified threat actor compromised...
The Hacker News
VirusTotal Data Leak Exposes Some Registered Customers’ Details – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNPrivacy / Malware Data associated with a subset of...
The Hacker News
Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground – Source:thehackernews.com
Source: thehackernews.com - Author: . Discover stories about threat actors' latest tactics, techniques, and procedures from...
The Hacker News
FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNRansomware / Cyber Threat The financially motivated threat actor...
The Hacker News
Owner of BreachForums Pleads Guilty to Cybercrime and Child Pornography Charges – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNCybercrime / Data Breach Conor Brian Fitzpatrick, the owner...
The Hacker News
Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack Websites – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNServer Security / Vulnerability Threat actors are actively exploiting...
The Hacker News
JumpCloud Blames ‘Sophisticated Nation-State’ Actor for Security Breach – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 18, 2023THNData Security / Cyber Attack A little over a...
The Hacker News
Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 17, 2023THNMobile Security / Malware Threat actors are taking advantage...
The Hacker News
These 6 Questions Will Help You Choose the Best Attack Surface Management Platform – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 17, 2023The Hacker NewsAttack Surface Management The hype around different...
The Hacker News
Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 17, 2023THNEndpoint Security / Cyber Attack Cyber attacks using infected...
The Hacker News
Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 17, 2023THNMalware / Cyber Threat Microsoft Word documents exploiting known...
The Hacker News
CERT-UA Uncovers Gamaredon’s Rapid Data Exfiltration Tactics Following Initial Compromise – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 17, 2023THNCyber Attack / Data Safety The Russia-linked threat actor...
The Hacker News
WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 15, 2023THNArtificial Intelligence / Cyber Crime With generative artificial intelligence...
The Hacker News
Microsoft Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 15, 2023THNCyber Attack / Enterprise Security Microsoft on Friday said...
The Hacker News
Critical Security Flaws Uncovered in Honeywell Experion DCS and QuickBlox Services – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 14, 2023THNVulnerability/ Cyber Threat Multiple security vulnerabilities have been discovered...
The Hacker News
Ransomware Extortion Skyrockets in 2023, Reaching $449.1 Million and Counting – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023THNRansomware / Cyber Threat Ransomware has emerged as the...
The Hacker News
The Risks and Preventions of AI in Business: Safeguarding Against Potential Pitfalls – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023The Hacker NewsDNS Filtering / Network Security Artificial intelligence...
The Hacker News
Microsoft Thwarts Chinese Cyber Attack Targeting Western European Governments – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023THNThreat Intel / Cyber Espionage Microsoft on Tuesday revealed...
The Hacker News
Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023THNCyber Threat / Gaming Cybersecurity researchers have unearthed a...
The Hacker News
Python-Based PyLoose Fileless Attack Targets Cloud Workloads for Cryptocurrency Mining – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023The Hacker NewsCloud Security / Cryptocurrency A new fileless...
The Hacker News
Microsoft Releases Patches for 132 Vulnerabilities, Including 6 Under Active Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 12, 2023The Hacker NewsVulnerability / Software Security Microsoft on Tuesday...
Posts pagination
1
…
21
22
23
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025