Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Samsung Admits Data Breach that Exposed Details of Some U.S. Customers
Samsung Admits Data Breach that Exposed Details of Some U.S. Customers South Korean chaebol Samsung on...
The Hacker News
Microsoft Discover Severe ‘One-Click’ Exploit for TikTok Android App
Microsoft Discover Severe ‘One-Click’ Exploit for TikTok Android App Microsoft on Wednesday disclosed details of a...
The Hacker News
Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability
Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability Apple on Wednesday backported...
The Hacker News
Over 1,800 Android and iOS Apps Found Leaking Hard-Coded AWS Credentials
Over 1,800 Android and iOS Apps Found Leaking Hard-Coded AWS Credentials Researchers have identified 1,859 apps...
The Hacker News
Infra Used in Cisco Hack Also Targeted Workforce Management Solution
Infra Used in Cisco Hack Also Targeted Workforce Management Solution The attack infrastructure used to target Cisco in...
The Hacker News
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks A months-long cyber espionage campaign undertaken...
The Hacker News
Interested in Reducing Your Risk Profile? Jamf Has a Solution for That
Interested in Reducing Your Risk Profile? Jamf Has a Solution for That The threat landscape has...
The Hacker News
Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks
Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks Google on Monday introduced...
The Hacker News
Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users
Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users Five imposter extensions for...
The Hacker News
Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope
Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope A persistent Golang-based malware...
The Hacker News
Hands-on Review: Stellar Cyber Security Operations Platform for MSSPs
Hands-on Review: Stellar Cyber Security Operations Platform for MSSPs As threat complexity increases and the boundaries...
The Hacker News
Hackers Use ModernLoader to Infect Systems with Stealers and Cryptominers
Hackers Use ModernLoader to Infect Systems with Stealers and Cryptominers As many as three disparate but...
The Hacker News
New Golang-based ‘Agenda Ransomware’ Can Be Customized For Each Victim
New Golang-based ‘Agenda Ransomware’ Can Be Customized For Each Victim A new ransomware strain written in...
The Hacker News
FBI Warns Investors to Take Precautions with Decentralized Financial Platforms
FBI Warns Investors to Take Precautions with Decentralized Financial Platforms The U.S. Federal Bureau of Investigation...
The Hacker News
FTC Sues Data Broker Over Selling Location Data for Hundreds of Millions of Phones
FTC Sues Data Broker Over Selling Location Data for Hundreds of Millions of Phones The U.S....
The Hacker News
India’s Newest Airline Akasa Air Found Leaking Passengers’ Personal Information
India’s Newest Airline Akasa Air Found Leaking Passengers’ Personal Information Akasa Air, India’s newest commercial airline,...
The Hacker News
CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog
CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog The U.S. Cybersecurity and Infrastructure...
The Hacker News
A CISO’s Ultimate Security Validation Checklist
A CISO’s Ultimate Security Validation Checklist If you’re heading out of the office on a well-deserved...
The Hacker News
Twilio Breach Also Compromised Authy Two-Factor Accounts of Some Users
Twilio Breach Also Compromised Authy Two-Factor Accounts of Some Users Twilio, which earlier this month became...
The Hacker News
Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software
Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software A Turkish-speaking entity called...
The Hacker News
Critical Vulnerability Discovered in Atlassian Bitbucket Server and Data Center
Critical Vulnerability Discovered in Atlassian Bitbucket Server and Data Center Atlassian has rolled out fixes for...
The Hacker News
Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations
Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations Iranian state-sponsored actors are leaving...
The Hacker News
PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks
PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks The Python Package Index, PyPI, on...
The Hacker News
U.S. Government Spending Billions on Cybersecurity
U.S. Government Spending Billions on Cybersecurity In recent months, the House of Representatives has been hard...
The Hacker News
Researchers Uncover Kimusky Infra Targeting South Korean Politicians and Diplomats
Researchers Uncover Kimusky Infra Targeting South Korean Politicians and Diplomats The North Korean nation-state group Kimusky...
The Hacker News
Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework
Cybercrime Groups Increasingly Adopting Sliver Command-and-Control Framework Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control...
The Hacker News
Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations
Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations The threat actor behind the...
The Hacker News
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers The threat actor behind the SolarWinds supply...
The Hacker News
Hackers Breach LastPass Developer System to Steal Source Code
Hackers Breach LastPass Developer System to Steal Source Code Password management service LastPass confirmed a security...
The Hacker News
PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks
PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks The Python Package Index, PyPI, on...
Posts pagination
1
…
52
53
54
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025