Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Mexico-Based Hacker Targets Global Banks with Android Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 04, 2023Ravie LakshmananCyber Crime / Mobile Security An e-crime actor...
The Hacker News
Alert: 330,000 FortiGate Firewalls Still Unpatched to CVE-2023-27997 RCE Flaw – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 04, 2023Ravie LakshmananNetwork Security / Exploit No less than 330000...
The Hacker News
Chinese Hackers Use HTML Smuggling to Infiltrate European Ministries with PlugX – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 03, 2023Ravie LakshmananMalware Attack / Cyberespionage A Chinese nation-state group...
The Hacker News
Improve Your Security WordPress Spam Protection With CleanTalk Anti-Spam – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 03, 2023The Hacker NewsWebsite Security Tool Every website owner or...
The Hacker News
CISA Flags 8 Actively Exploited Flaws in Samsung and D-Link Devices – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 03, 2023Ravie LakshmananMobile Security / Network Security The U.S. Cybersecurity...
The Hacker News
Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto Wallets – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 03, 2023Ravie LakshmananMalware / Hacking In yet another sign of...
The Hacker News
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising – Source:thehackernews.com
Source: thehackernews.com - Author: . Threat actors associated with the BlackCat ransomware have been observed employing...
The Hacker News
Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin Accounts – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 01, 2023Ravie LakshmananWebsite Security / Cyber Threat As many as...
The Hacker News
Beware: New ‘Rustbucket’ Malware Variant Targeting macOS Users – Source:thehackernews.com
Source: thehackernews.com - Author: . Jul 01, 2023Ravie LakshmananEndpoint Security / Malware Researchers have pulled back...
The Hacker News
Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 30, 2023The Hacker NewsCyber Espionage/ Malware Charming Kitten, the nation-state...
The Hacker News
3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 30, 2023The Hacker NewsSaaS Security / Artificial Intelligence, In today's...
The Hacker News
WhatsApp Upgrades Proxy Feature Against Internet Shutdowns – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 30, 2023Ravie LakshmananPrivacy / Tech Meta's WhatsApp has rolled out...
The Hacker News
Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 30, 2023Ravie LakshmananServer Security / Cyber Threat An active financially...
The Hacker News
MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk? – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 30, 2023Ravie LakshmananVulnerability / Software Security MITRE has released its...
The Hacker News
From MuddyC3 to PhonyC2: Iran’s MuddyWater Evolves with a New Cyber Weapon – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has...
The Hacker News
Fluhorse: Flutter-Based Android Malware Targets Credit Cards and 2FA Codes – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie LakshmananMobile Security / Malware Cybersecurity researchers have shared...
The Hacker News
The Right Way to Enhance CTI with AI (Hint: It’s the Data) – Source:thehackernews.com
Source: thehackernews.com - Author: . Cyber threat intelligence is an effective weapon in the ongoing battle...
The Hacker News
North Korean Hacker Group Andariel Strikes with New EarlyRat Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie LakshmananVulnerability / Malware The North Korea-aligned threat actor...
The Hacker News
Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users’ Personal Data – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie LakshmananMobile Security / Privacy Android-based phone monitoring app...
The Hacker News
Critical Security Flaw in Social Login Plugin for WordPress Exposes Users’ Accounts – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie LakshmananWebsite Security / Vulnerability A critical security flaw...
The Hacker News
Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 29, 2023Ravie LakshmananCyber Threat / Hacking A previously undocumented Windows-based...
The Hacker News
Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 28, 2023Ravie LakshmananFirmware Security / Tech Drones that don't have...
The Hacker News
CryptosLabs Scam Ring Targets French-Speaking Investors, Rakes in €480 Million – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 28, 2023Ravie LakshmananCyber Crime / Cryptocurrency Cybersecurity researchers have exposed...
The Hacker News
5 Things CISOs Need to Know About Securing OT Environments – Source:thehackernews.com
Source: thehackernews.com - Author: . For too long the cybersecurity world focused exclusively on information technology...
The Hacker News
8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 28, 2023Ravie LakshmananRansomware / Cyber Threat A ransomware threat called...
The Hacker News
Critical SQL Injection Flaws Expose Gentoo Soko to Remote Code Execution – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 28, 2023Ravie LakshmananEndpoint Security / RCE Multiple SQL injection vulnerabilities...
The Hacker News
New Mockingjay Process Injection Technique Could Let Malware Evade Detection – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 27, 2023Ravie LakshmananMalware / Cyber Threat A new process injection...
The Hacker News
New Ongoing Campaign Targets npm Ecosystem with Unique Execution Chain – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 27, 2023Ravie LakshmananSupply Chain / Software Security Cybersecurity researchers have...
The Hacker News
Beyond Asset Discovery: How Attack Surface Management Prioritizes Vulnerability Remediation – Source:thehackernews.com
Source: thehackernews.com - Author: . As the business environment becomes increasingly connected, organizations' attack surfaces continue...
The Hacker News
EncroChat Bust Leads to 6,558 Criminals’ Arrests and €900 Million Seizure – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 27, 2023Ravie Lakshmanan Europol on Tuesday announced that the takedown...
Posts pagination
1
…
23
24
25
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025