Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and Bitdefender
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and Bitdefender Looking to up your cybersecurity game...
The Hacker News
Apple Boosts Security With New iMessage, Apple ID, and iCloud Protections
Apple Boosts Security With New iMessage, Apple ID, and iCloud Protections Apple on Wednesday announced a raft of...
The Hacker News
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers An unconventional data exfiltration method leverages...
The Hacker News
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android Apps
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android Apps Researchers have shed light on...
The Hacker News
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics The Iran-linked MuddyWater threat actor has been...
The Hacker News
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver The subgroup of...
The Hacker News
Why is Robust API Security Crucial in eCommerce?
Why is Robust API Security Crucial in eCommerce? API attacks are on the rise. One of...
The Hacker News
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm Cybersecurity researchers have reported...
The Hacker News
Using XDR to Consolidate and Optimize Cybersecurity Technology
Using XDR to Consolidate and Optimize Cybersecurity Technology Businesses know they need cybersecurity, but it seems...
The Hacker News
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones Firmware
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones Firmware Cisco has released a new security...
The Hacker News
Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls
Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls A new attack method can...
The Hacker News
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant Travel agencies have emerged...
The Hacker News
Royal Ransomware Threat Takes Aim at U.S. Healthcare System
Royal Ransomware Threat Takes Aim at U.S. Healthcare System The U.S. Department of Health and Human...
The Hacker News
Keep Your Grinch at Bay: Here’s How to Stay Safe Online this Holiday Season
Keep Your Grinch at Bay: Here’s How to Stay Safe Online this Holiday Season As the...
The Hacker News
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware A cryptocurrency mining attack targeting the...
The Hacker News
Telcom and BPO Companies Under Attack by SIM Swapping Hackers
Telcom and BPO Companies Under Attack by SIM Swapping Hackers A persistent intrusion campaign has set...
The Hacker News
Darknet’s Largest Mobile Malware Marketplace Threatens Users Worldwide
Darknet’s Largest Mobile Malware Marketplace Threatens Users Worldwide Cybersecurity researchers have shed light on a darknet...
The Hacker News
Understanding NIST CSF to assess your organization’s Ransomware readiness
Understanding NIST CSF to assess your organization’s Ransomware readiness Ransomware attacks keep increasing in volume and...
The Hacker News
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network A novel Go-based...
The Hacker News
Chinese Hackers Target Middle East Telecoms in Latest Cyber Attacks
Chinese Hackers Target Middle East Telecoms in Latest Cyber Attacks A malicious campaign targeting the Middle...
The Hacker News
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and Politics
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and Politics Hackers with ties to the...
The Hacker News
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber Attacks
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber Attacks Cryptocurrency investment companies are the target of a...
The Hacker News
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware A version of an open source...
The Hacker News
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection Acer has released a...
The Hacker News
Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches
Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches The Australian government...
The Hacker News
3 New Vulnerabilities Affect OT Products from German Companies Festo and CODESYS
3 New Vulnerabilities Affect OT Products from German Companies Festo and CODESYS Researchers have disclosed details...
The Hacker News
Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in Philippines
Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in Philippines A threat actor with...
The Hacker News
Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection
Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection New findings from cybersecurity firm...
The Hacker News
This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms
This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms A malicious Android...
The Hacker News
French Electricity Provider Fined for Storing Users’ Passwords with Weak MD5 Algorithm
French Electricity Provider Fined for Storing Users’ Passwords with Weak MD5 Algorithm The French data protection...
Posts pagination
1
…
41
42
43
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025