Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability – Update Now! – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 06, 2023Ravie LakshmananBrowser Security / Vulnerability Google on Monday released...
The Hacker News
Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 06, 2023Ravie LakshmananEndpoint Security / Data Security Threat actors associated...
The Hacker News
Chinese PostalFurious Gang Strikes UAE Users with Sneaky SMS Phishing Scheme – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 06, 2023Ravie Lakshmanan A Chinese-speaking phishing gang dubbed PostalFurious has...
The Hacker News
Zyxel Firewalls Under Attack! Urgent Patching Required – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 06, 2023Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and...
The Hacker News
Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 05, 2023Ravie LakshmananZero Day / Cyber Attack Microsoft has officially...
The Hacker News
The Annual Report: 2024 Plans and Priorities for SaaS Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Over 55% of security executives report that they have experienced a...
The Hacker News
Magento, WooCommerce, WordPress, and Shopify Exploited in Web Skimmer Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 05, 2023Ravie LakshmananWebsite Security / Magecart Cybersecurity researchers have unearthed...
The Hacker News
Brazilian Cybercriminals Using LOLBaS and CMD Scripts to Drain Bank Accounts – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 05, 2023Ravie LakshmananBanking Security / Malware An unknown cybercrime threat...
The Hacker News
Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 05, 2023Ravie LakshmananMalware / Cyber Threat A surge in TrueBot...
The Hacker News
New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 03, 2023Ravie LakshmananEndpoint Security / Linux An analysis of the...
The Hacker News
Cloud Security Tops Concerns for Cybersecurity Leaders: EC-Council’s Certified CISO Hall of Fame Report 2023 – Source:thehackernews.com
Source: thehackernews.com - Author: . A survey of global cybersecurity leaders through the 2023 Certified CISO...
The Hacker News
FTC Slams Amazon with $30.8M Fine for Privacy Violations Involving Alexa and Ring – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 03, 2023Ravie LakshmananPrivacy / Technology The U.S. Federal Trade Commission...
The Hacker News
New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 02, 2023Ravie LakshmananBotnet / Malware Spanish-speaking users in Latin America...
The Hacker News
Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 02, 2023Ravie LakshmananMalware / Cyber Threat The Chinese nation-stage group...
The Hacker News
North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 02, 2023Ravie LakshmananCyber Espionage / APT U.S. and South Korean...
The Hacker News
MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 02, 2023Ravie Lakshmanan Zero-Day / Vulnerability A critical flaw in...
The Hacker News
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananCyber Threat / Network Security An analysis of...
The Hacker News
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananMobile Security / APT A previously unknown advanced...
The Hacker News
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananCybercrime / Malware Cybersecurity researchers have unmasked the...
The Hacker News
Malicious PyPI Packages Using Compiled Python Code to Bypass Detection – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananProgramming / Supply Chain Researchers have discovered a...
The Hacker News
How Wazuh Improves IT Hygiene for Cyber Security Resilience – Source:thehackernews.com
Source: thehackernews.com - Author: . IT hygiene is a security best practice that ensures that digital...
The Hacker News
Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananEndpoint Security / Encryption The threat actors behind...
The Hacker News
N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananCyber Threat / Malware Cybersecurity researchers have offered...
The Hacker News
Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananNetwork Security / Exploit The U.S. Cybersecurity and...
The Hacker News
Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites – Source:thehackernews.com
Source: thehackernews.com - Author: . Jun 01, 2023Ravie LakshmananWebsite Security / WordPress WordPress has issued an...
The Hacker News
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining – Source:thehackernews.com
Source: thehackernews.com - Author: . May 31, 2023Ravie LakshmananServer Security / Cryptocurrency A financially motivated threat...
The Hacker News
Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices – Source:thehackernews.com
Source: thehackernews.com - Author: . May 31, 2023Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have found...
The Hacker News
Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities – Source:thehackernews.com
Source: thehackernews.com - Author: . May 31, 2023Ravie LakshmananData protection / Cyber Threat Improperly deactivated and...
The Hacker News
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass – Source:thehackernews.com
Source: thehackernews.com - Author: . May 31, 2023Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shared details...
The Hacker News
6 Steps to Effective Threat Hunting: Safeguard Critical Assets and Fight Cybercrime – Source:thehackernews.com
Source: thehackernews.com - Author: . Finding threat actors before they find you is key to beefing...
Posts pagination
1
…
27
28
29
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025