Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets
North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets The North Korea-linked ScarCruft group...
The Hacker News
LastPass Suffers Another Security Breach; Exposed Some Customers Information
LastPass Suffers Another Security Breach; Exposed Some Customers Information Popular password management service LastPass said it’s...
The Hacker News
Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android Users
Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android Users More than 300,000 users...
The Hacker News
Researchers ‘Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet Network
Researchers ‘Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet Network An ongoing analysis into an up-and-coming cryptocurrency mining...
The Hacker News
Hackers Leak Another Set of Medibank Customer Data on the Dark Web
Hackers Leak Another Set of Medibank Customer Data on the Dark Web Medibank on Thursday confirmed...
The Hacker News
Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java Framework
Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java Framework A critical security vulnerability has been disclosed...
The Hacker News
What Developers Need to Fight the Battle Against Common Vulnerabilities
What Developers Need to Fight the Battle Against Common Vulnerabilities Today’s threat landscape is constantly evolving,...
The Hacker News
Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities
Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities The threat...
The Hacker News
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, & Windows Zero-Days
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, & Windows Zero-Days A Barcelona-based surveillanceware vendor...
The Hacker News
Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers
Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers A previously undocumented Go-based malware...
The Hacker News
What the CISA Reporting Rule Means for Your IT Security Protocol
What the CISA Reporting Rule Means for Your IT Security Protocol The new Cyber Incident Reporting for...
The Hacker News
Watch Out! These Android Keyboard Apps With 2 Million Installs Can be Hacked Remotely
Watch Out! These Android Keyboard Apps With 2 Million Installs Can be Hacked Remotely Multiple unpatched...
The Hacker News
The Value of Old Systems
The Value of Old Systems Old technology solutions – every organization has a few of them...
The Hacker News
Researchers Disclose Supply-Chain Flaw Affecting IBM Cloud Databases for PostgreSQL
Researchers Disclose Supply-Chain Flaw Affecting IBM Cloud Databases for PostgreSQL IBM has fixed a high-severity security...
The Hacker News
Hackers Sign Android Malware Apps with Compromised Platform Certificates
Hackers Sign Android Malware Apps with Compromised Platform Certificates Platform certificates used by Android smartphone vendors...
The Hacker News
CISA Warns of Multiple Critical Vulnerabilities Affecting Mitsubishi Electric PLCs
CISA Warns of Multiple Critical Vulnerabilities Affecting Mitsubishi Electric PLCs The U.S. Cybersecurity and Infrastructure Security...
The Hacker News
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems The maintainers of the FreeBSD...
The Hacker News
Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability
Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability Search giant Google...
The Hacker News
When Being Attractive Gets Risky – How Does Your Attack Surface Look to an Attacker?
When Being Attractive Gets Risky – How Does Your Attack Surface Look to an Attacker? In...
The Hacker News
SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars
SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars Cybersecurity researchers have discovered a security...
The Hacker News
North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps
North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps The Lazarus Group threat actor has...
The Hacker News
New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of Manufacturers
New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of Manufacturers Three different security flaws have...
The Hacker News
Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware
Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware A new data wiper...
The Hacker News
This Malware Installs Malicious Browser Extensions to Steal Users’ Passwords and Cryptos
This Malware Installs Malicious Browser Extensions to Steal Users’ Passwords and Cryptos A malicious extension for...
The Hacker News
Nighthawk Likely to Become Hackers’ New Post-Exploitation Tool After Cobalt Strike
Nighthawk Likely to Become Hackers’ New Post-Exploitation Tool After Cobalt Strike A nascent and legitimate penetration...
The Hacker News
Meta Takes Down Fake Facebook and Instagram Accounts Linked to Pro-U.S. Influence Operation
Meta Takes Down Fake Facebook and Instagram Accounts Linked to Pro-U.S. Influence Operation Meta Platforms on...
The Hacker News
Top Cyber Threats Facing E-Commerce Sites This Holiday Season
Top Cyber Threats Facing E-Commerce Sites This Holiday Season Delivering a superior customer experience is essential...
The Hacker News
Hackers Exploiting Abandoned Boa Web Servers to Target Critical Industries
Hackers Exploiting Abandoned Boa Web Servers to Target Critical Industries Microsoft on Tuesday disclosed the intrusion...
The Hacker News
34 Russian Cybercrime Groups Stole Over 50 Million Passwords with Stealer Malware
34 Russian Cybercrime Groups Stole Over 50 Million Passwords with Stealer Malware As many as 34...
The Hacker News
Ducktail Malware Operation Evolves with New Malicious Capabilities
Ducktail Malware Operation Evolves with New Malicious Capabilities The operators of the Ducktail information stealer have...
Posts pagination
1
…
42
43
44
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025