Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
The Hacker News
Page 3
The Hacker News
The Hacker News
10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected...
The Hacker News
Hackers Targeting Human Rights Activists in Morocco and Western Sahara – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024NewsroomCyber Espionage / Malware Human rights activists in Morocco...
The Hacker News
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024NewsroomVulnerability / IoT Security Multiple security vulnerabilities have been...
The Hacker News
CL0P’s Ransomware Rampage – Security Measures for 2024 – Source:thehackernews.com
Source: thehackernews.com - Author: . 2023 CL0P Growth Emerging in early 2019, CL0P was first introduced...
The Hacker News
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate...
The Hacker News
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024NewsroomBotnet / Vulnerability Threat actors are actively scanning and...
The Hacker News
Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 09, 2024The Hacker NewsPrivileged Access Management As cyber threats loom...
The Hacker News
Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for...
The Hacker News
Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 08, 2024NewsroomCybercrime / Network Security Threat hunters have discovered a...
The Hacker News
The Drop in Ransomware Attacks in 2024 and What it Means – Source:thehackernews.com
Source: thehackernews.com - Author: . The ransomware industry surged in 2023 as it saw an alarming...
The Hacker News
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set...
The Hacker News
Google Sues App Developers Over Fake Crypto Investment App Scam – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 08, 2024NewsroomInvestment Scam / Mobile Security Google has filed a...
The Hacker News
Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found...
The Hacker News
AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has...
The Hacker News
CISO Perspectives on Complying with Cybersecurity Regulations – Source:thehackernews.com
Source: thehackernews.com - Author: . Compliance requirements are meant to increase cybersecurity transparency and accountability. As...
The Hacker News
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat...
The Hacker News
New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific...
The Hacker News
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been...
The Hacker News
Vietnam-Based Hackers Steal Financial Data Across Asia with Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . A suspected Vietnamese-origin threat actor has been observed targeting victims in...
The Hacker News
New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an...
The Hacker News
Considerations for Operational Technology Cybersecurity – Source:thehackernews.com
Source: thehackernews.com - Author: . Operational Technology (OT) refers to the hardware and software used to...
The Hacker News
New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 04, 2024NewsroomVulnerability / Internet Protocol New research has found that...
The Hacker News
Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates...
The Hacker News
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that...
The Hacker News
U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 03, 2024NewsroomData Breach / Incident Response The U.S. Cyber Safety...
The Hacker News
Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said...
The Hacker News
Attack Surface Management vs. Vulnerability Management – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 03, 2024The Hacker NewsCybersecurity / Penetration Testing Attack surface management...
The Hacker News
Mispadu Trojan Targets Europe, Thousands of Credentials Compromised – Source:thehackernews.com
Source: thehackernews.com - Author: . The banking trojan known as Mispadu has expanded its focus beyond...
The Hacker News
Critical Security Flaw Found in Popular LayerSlider WordPress Plugin – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 03, 2024NewsroomWeb Security / Vulnerability A critical security flaw impacting...
The Hacker News
Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution – Source:thehackernews.com
Source: thehackernews.com - Author: . Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into...
Posts navigation
1
2
3
4
…
66
Latest News
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024