Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Syxsense Platform: Unified Security and Endpoint Management
Syxsense Platform: Unified Security and Endpoint Management As threats grow and attack surfaces get more complex,...
The Hacker News
Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks A pair of severe security...
The Hacker News
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers An older version of Shein’s Android application suffered...
The Hacker News
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers An older version of Shein’s Android application suffered...
The Hacker News
U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities
U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities The U.S. Cybersecurity and Infrastructure Security...
The Hacker News
Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors
Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors Google said it’s working...
The Hacker News
Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme
Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme The Dutch police...
The Hacker News
PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks
PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks The PlugX remote access trojan has been...
The Hacker News
PureCrypter Malware Targets Government Entities in Asia-Pacific and North America
PureCrypter Malware Targets Government Entities in Asia-Pacific and North America Government entities in Asia-Pacific and North...
The Hacker News
ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks
ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks A new ChromeLoader malware campaign...
The Hacker News
Shocking Findings from the 2023 Third-Party App Access Report
Shocking Findings from the 2023 Third-Party App Access Report Spoiler Alert: Organizations with 10,000 SaaS users...
The Hacker News
Researchers Share New Insights Into RIG Exploit Kit Malware’s Operations
Researchers Share New Insights Into RIG Exploit Kit Malware’s Operations The RIG exploit kit (EK) touched...
The Hacker News
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults LastPass, which in December 2022...
The Hacker News
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability The U.S. Cybersecurity and...
The Hacker News
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia The threat actor known as...
The Hacker News
Application Security vs. API Security: What is the difference?
Application Security vs. API Security: What is the difference? As digital transformation takes hold and businesses...
The Hacker News
New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on Enterprises
New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on Enterprises A new post-exploitation framework called...
The Hacker News
Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain
Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain Romanian cybersecurity company Bitdefender has released a free universal decryptor...
The Hacker News
Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection Techniques
Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection Techniques Cryptocurrency companies are being targeted as part...
The Hacker News
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots As a primary working interface,...
The Hacker News
How to Tackle the Top SaaS Challenges of 2023
How to Tackle the Top SaaS Challenges of 2023 Are you prepared to tackle the top...
The Hacker News
CISA Sounds Alarm on Cybersecurity Threats Amid Russia’s Invasion Anniversary
CISA Sounds Alarm on Cybersecurity Threats Amid Russia’s Invasion Anniversary The U.S. Cybersecurity and Infrastructure Security...
The Hacker News
How to Use AI in Cybersecurity and Avoid Being Trapped
How to Use AI in Cybersecurity and Avoid Being Trapped The use of AI in cybersecurity...
The Hacker News
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products Multiple threat actors have been observed...
The Hacker News
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware Trojanized versions of legitimate applications...
The Hacker News
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels
Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels An investigation into...
The Hacker News
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia The threat actor known as...
The Hacker News
Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client
Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client At the beginning of January,...
The Hacker News
Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks
Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks An open source command-and-control (C2) framework...
The Hacker News
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia
Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia Shipping companies and medical...
Posts pagination
1
…
34
35
36
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025