Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 20, 2024NewsroomCyber Espionage / Emails Security Microsoft on Friday revealed...
The Hacker News
Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actor tracked as TA866 has resurfaced after a nine-month...
The Hacker News
Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 19, 2024NewsroomMalware / Endpoint Security Pirated applications targeting Apple macOS...
The Hacker News
Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 19, 2024NewsroomSoftware Security / Spyware A malicious package uploaded to...
The Hacker News
U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 19, 2024NewsroomCyber Theat / Zero-Day The U.S. Cybersecurity and Infrastructure...
The Hacker News
New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being...
The Hacker News
Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . The Russia-linked threat actor known as COLDRIVER has been observed evolving...
The Hacker News
TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and...
The Hacker News
MFA Spamming and Fatigue: When Security Measures Go Wrong – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today's digital...
The Hacker News
PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been...
The Hacker News
Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on...
The Hacker News
PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from...
The Hacker News
Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation – Source:thehackernews.com
Source: thehackernews.com - Author: . Wing Security announced today that it now offers free discovery and...
The Hacker News
Feds Warn of AndroxGh0st Botnet Targeting AWS, Azure, and Office 365 Credentials – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomBotnet / Cloud Security The U.S. Cybersecurity and Infrastructure...
The Hacker News
Webinar: The Art of Privilege Escalation – How Hackers Become Admins – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar In the...
The Hacker News
New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomSpyware / Forensic Analysis Cybersecurity researchers have identified a...
The Hacker News
GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomVulnerability / Software Security GitHub has revealed that it...
The Hacker News
Citrix, VMware, and Atlassian Hit with Critical Flaws — Patch ASAP! – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomVulnerability / Cyber Threat Citrix is warning of two...
The Hacker News
Zero-Day Alert: Update Chrome Now to Fix New Actively Exploited Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 17, 2024NewsroomBrowser Security / Vulnerability Google on Tuesday released updates...
The Hacker News
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits – Act Now – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 16, 2024NewsroomVulnerability / Network Security Over 178,000 SonicWall firewalls exposed...
The Hacker News
Remcos RAT Spreading Through Adult Games in New Attack Wave – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 16, 2024NewsroomBotnet / Malware The remote access trojan (RAT) known...
The Hacker News
Case Study: The Cookie Privacy Monster in Big Global Retail – Source:thehackernews.com
Source: thehackernews.com - Author: . Explore how an advanced exposure management solution saved a major retail...
The Hacker News
Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 16, 2024NewsroomCryptocurrency / Cyber Threat The operators behind the now-defunct...
The Hacker News
Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 16, 2024NewsroomCryptocurrency / Windows Security Threat actors have been observed...
The Hacker News
3 Ransomware Group Newcomers to Watch in 2024 – Source:thehackernews.com
Source: thehackernews.com - Author: . The ransomware industry surged in 2023 as it saw an alarming...
The Hacker News
Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 15, 2024NewsroomVulnerability / Browser Security Cybersecurity researchers have disclosed a...
The Hacker News
High-Severity Flaws Uncovered in Bosch Thermostats and Smart Nutrunners – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 15, 2024NewsroomOperational Technology / Network Security Multiple security vulnerabilities have...
The Hacker News
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 15, 2024NewsroomWebsite Security / Vulnerability Thousands of WordPress sites using...
The Hacker News
DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023 – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 15, 2024NewsroomServer Security / Cyber Attack The environmental services industry...
The Hacker News
New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 14, 2024NewsroomCyber Attack / Vulnerability The cyber attacks targeting the...
Posts pagination
1
…
4
5
6
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025