Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash...
The Hacker News
DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomCryptojacking / Malware The Computer Emergency Response Team of...
The Hacker News
Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomNational Security / Data Breach A former software engineer...
The Hacker News
Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024The Hacker NewsThreat Intelligence / Cloud Security Cloudzy, a...
The Hacker News
INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomCyber Crime / Malware An INTERPOL-led collaborative operation targeting...
The Hacker News
Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that...
The Hacker News
FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 01, 2024NewsroomCyber Attack / Botnet The threat actor behind a...
The Hacker News
Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over...
The Hacker News
U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers – Source:thehackernews.com
Source: thehackernews.com - Author: . The U.S. government on Wednesday said it took steps to neutralize...
The Hacker News
HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 01, 2024NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated...
The Hacker News
Why the Right Metrics Matter When it Comes to Vulnerability Management – Source:thehackernews.com
Source: thehackernews.com - Author: . How's your vulnerability management program doing? Is it effective? A success?...
The Hacker News
Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 01, 2024NewsroomNetwork Security / Malware Google-owned Mandiant said it identified...
The Hacker News
CISA Warns of Active Exploitation of Critical Flaws in Apple iOS and macOS – Source:thehackernews.com
Source: thehackernews.com - Author: . Feb 01, 2024NewsroomVulnerability / Software Update The U.S. Cybersecurity and Infrastructure...
The Hacker News
RunC Flaws Enable Container Escapes, Granting Attackers Host Access – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been...
The Hacker News
Alert: Ivanti Discloses 2 New Zero-Day Flaws, One Under Active Exploitation – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomVulnerability / Zero Day Ivanti is alerting of two...
The Hacker News
Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling...
The Hacker News
Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomCryptocurrency / Cybersecurity A financially motivated threat actor known...
The Hacker News
The SEC Won’t Let CISOs Be: Understanding New SaaS Cybersecurity Rules – Source:thehackernews.com
Source: thehackernews.com - Author: . The SEC isn't giving SaaS a free pass. Applicable public companies,...
The Hacker News
Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently...
The Hacker News
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 31, 2024NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain...
The Hacker News
Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomCyber Crime / Malware A Brazilian law enforcement operation...
The Hacker News
URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomDevSecOps / Vulnerability GitLab once again released fixes to...
The Hacker News
China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomMalware / Cyber Espionage The China-based threat actor known...
The Hacker News
Top Security Posture Vulnerabilities Revealed – Source:thehackernews.com
Source: thehackernews.com - Author: . Each New Year introduces a new set of challenges and opportunities...
The Hacker News
Italian Data Protection Watchdog Accuses ChatGPT of Privacy Violations – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomGenerative AI / Data Privacy Italy's data protection authority...
The Hacker News
New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomMalware / Cyber Threat Threat hunters have identified a...
The Hacker News
Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 30, 2024NewsroomVulnerability / Network Security Juniper Networks has released out-of-band...
The Hacker News
Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 29, 2024NewsroomVulnerability / NTML Security A now-patched security flaw in...
The Hacker News
493 Companies Share Their SaaS Security Battles – Get Insights in this Webinar – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 29, 2024The Hacker NewsSaaS Security / Webinar In today's digital...
The Hacker News
Albabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and Golang – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 29, 2024NewsroomRansomware / Malware Cybersecurity researchers have detected in the...
Posts pagination
1
…
4
5
6
…
59
Latest News
CSO - Online
Managed SOC für mehr Sicherheit – Source: www.csoonline.com
11/09/2025
CSO - Online
Menschenzentrierte Cybersicherheit gewinnt an Bedeutung – Source: www.csoonline.com
11/09/2025
The Hacker News
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity – Source:thehackernews.com
11/09/2025
The Hacker News
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence – Source:thehackernews.com
11/09/2025
The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers – Source:thehackernews.com
11/09/2025
The Hacker News
Cracking the Boardroom Code: Helping CISOs Speak the Language of Business – Source:thehackernews.com
11/09/2025