Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Data Stealing Malware Discovered in Popular Android Screen Recorder App – Source:thehackernews.com
Source: thehackernews.com - Author: . May 24, 2023Ravie LakshmananMobile Security / Data Safety Google has removed...
The Hacker News
Legion Malware Upgraded to Target SSH Servers and AWS Credentials – Source:thehackernews.com
Source: thehackernews.com - Author: . May 24, 2023Ravie LakshmananServer Security / Malware An updated version of...
The Hacker News
N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . May 24, 2023Ravie LakshmananCyber Espionage / Server Security The infamous Lazarus...
The Hacker News
Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation – Source:thehackernews.com
Source: thehackernews.com - Author: . May 24, 2023Ravie LakshmananCyber War / Threat Intel The Computer Emergency...
The Hacker News
GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments – Source:thehackernews.com
Source: thehackernews.com - Author: . May 23, 2023Ravie LakshmananCyber Threat / APT Government and diplomatic entities...
The Hacker News
North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . May 23, 2023Ravie LakshmananCyber Threat / Malware The North Korean advanced...
The Hacker News
The Rising Threat of Secrets Sprawl and the Need for Action – Source:thehackernews.com
Source: thehackernews.com - Author: . The most precious asset in today's information age is the secret...
The Hacker News
New WinTapix.sys Malware Engages in Multi-Stage Attack Across Middle East – Source:thehackernews.com
Source: thehackernews.com - Author: . May 23, 2023Ravie LakshmananEndpoint Security/ Malware An unknown threat actor has...
The Hacker News
China Bans U.S. Chip Giant Micron, Citing “Serious Cybersecurity Problems” – Source:thehackernews.com
Source: thehackernews.com - Author: . May 23, 2023Ravie LakshmananNational Security / Hardware China has banned U.S....
The Hacker News
E.U. Regulators Hit Meta with Record $1.3 Billion Fine for Data Transfer Violations – Source:thehackernews.com
Source: thehackernews.com - Author: . May 22, 2023Ravie LakshmananData Protection / Privacy Facebook's parent company Meta...
The Hacker News
Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations – Source:thehackernews.com
Source: thehackernews.com - Author: . May 22, 2023Ravie LakshmananCryptocurrency / Cloud Security A financially motivated threat...
The Hacker News
New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets – Source:thehackernews.com
Source: thehackernews.com - Author: . A new stealthy information stealer malware called Bandit Stealer has caught...
The Hacker News
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
Source: thehackernews.com - Author: . May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability...
The Hacker News
Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data – Source:thehackernews.com
Source: thehackernews.com - Author: . May 26, 2023Ravie LakshmananData Safety / Cloud Security A new security...
The Hacker News
Predator Android Spyware: Researchers Uncover New Data Theft Capabilities – Source:thehackernews.com
Source: thehackernews.com - Author: . Security researchers have detailed the inner workings of the commercial Android...
The Hacker News
5 Must-Know Facts about 5G Network Security and Its Cloud Benefits – Source:thehackernews.com
Source: thehackernews.com - Author: . 5G is a game changer for mobile connectivity, including mobile connectivity...
The Hacker News
New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids – Source:thehackernews.com
Source: thehackernews.com - Author: . May 26, 2023Ravie LakshmananICS/SCADA Security A new strain of malicious software...
The Hacker News
Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances – Source:thehackernews.com
Source: thehackernews.com - Author: . May 26, 2023Ravie LakshmananEmail Security / Zero-Day Email protection and network...
The Hacker News
Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananGaming / Server Security A new botnet called...
The Hacker News
Zyxel Issues Critical Security Patches for Firewall and VPN Products – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananNetwork Security / Vulnerability Zyxel has released software...
The Hacker News
Cynet Protects Hospital From Lethal Infection – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023The Hacker NewsIncident Response A hospital with 2,000 employees...
The Hacker News
New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananEmail Security / Exploit An unnamed government entity...
The Hacker News
Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananFinancial Security / Cyber Threat A Brazilian threat...
The Hacker News
Webinar with Guest Forrester: Browser Security New Approaches – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023The Hacker NewsBrowser Security / Tech In today's digital...
The Hacker News
Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananEndpoint Security / Cyber Threat The threat actors...
The Hacker News
China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected – Source:thehackernews.com
Source: thehackernews.com - Author: . May 25, 2023Ravie LakshmananCyber Threat / Espionage A stealthy China-based group...
The Hacker News
Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps
Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps Microsoft has patched a...
The Hacker News
3CX Supply Chain Attack — Here’s What We Know So Far
3CX Supply Chain Attack — Here’s What We Know So Far Enterprise communications software maker 3CX...
The Hacker News
Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
Deep Dive Into 6 Key Steps to Accelerate Your Incident Response Organizations rely on Incident response to ensure...
The Hacker News
Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam The Cyber Police of...
Posts pagination
1
…
29
30
31
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025