Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Hacker News
The Hacker News
Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 13, 2024NewsroomVulnerability / Network Security Juniper Networks has released updates...
The Hacker News
29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 13, 2024NewsroomCryptojacking / Cloud Security A 29-year-old Ukrainian national has...
The Hacker News
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different...
The Hacker News
Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion – Source:thehackernews.com
Source: thehackernews.com - Author: . The threat actors associated with the Medusa ransomware have ramped up...
The Hacker News
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO – Source:thehackernews.com
Source: thehackernews.com - Author: . Picture a cybersecurity landscape where defenses are impenetrable, and threats are...
The Hacker News
Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates...
The Hacker News
Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new...
The Hacker News
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure...
The Hacker News
Threat Actors Increasingly Abusing GitHub for Malicious Purposes – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomCybersecurity / Software Security The ubiquity of GitHub in...
The Hacker News
New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomVulnerability / Cyber Attack Cybersecurity researchers have developed a...
The Hacker News
New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomCloud Security / Cyber Attacks A new Python-based hacking...
The Hacker News
There is a Ransomware Armageddon Coming for Us All – Source:thehackernews.com
Source: thehackernews.com - Author: . Generative AI will enable anyone to launch sophisticated phishing attacks that...
The Hacker News
Atomic Stealer Gets an Upgrade – Targeting Mac Users with Encrypted Payload – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomMalvertising / Cyber Attacks Cybersecurity researchers have identified an...
The Hacker News
Mandiant’s X Account Was Hacked Using Brute-Force Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomOnline Security / Cryptocurrency The compromise of Mandiant's X...
The Hacker News
Chinese Hackers Exploit Zero-Day Flaws in Ivanti Connect Secure and Policy Secure – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomCybersecurity / Zero-Day A pair of zero-day flaws identified...
The Hacker News
Cisco Fixes High-Risk Vulnerability Impacting Unity Connection Software – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 11, 2024NewsroomVulnerability / Patch Management Cisco has released software updates...
The Hacker News
NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 10, 2024NewsroomServer Security / Cryptocurrency A new Mirai-based botnet called...
The Hacker News
Getting off the Attack Surface Hamster Wheel: Identity Can Help – Source:thehackernews.com
Source: thehackernews.com - Author: . IT professionals have developed a sophisticated understanding of the enterprise attack...
The Hacker News
Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 10, 2024NewsroomRansomware / Data Security A decryptor for the Tortilla...
The Hacker News
FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 10, 2024NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission...
The Hacker News
Microsoft’s January 2024 Windows Update Patches 48 New Vulnerabilities – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 10, 2024NewsroomVulnerability / Windows Security Microsoft has addressed a total...
The Hacker News
CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 10, 2024NewsroomPatch Management / Threat Intelligence The U.S. Cybersecurity and...
The Hacker News
Alert: Water Curupira Hackers Actively Distributing PikaBot Loader Malware – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 09, 2024NewsroomMalware / Cyber Threat A threat actor called Water...
The Hacker News
Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 09, 2024NewsroomData Security / Cyber Attack Poorly secured Microsoft SQL...
The Hacker News
Why Public Links Expose Your SaaS Attack Surface – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 09, 2024The Hacker NewsSaaS Security / Data Security Collaboration is...
The Hacker News
Alert: New Vulnerabilities Discovered in QNAP and Kyocera Device Manager – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 09, 2024NewsroomNetwork Security / Data Protection A security flaw has...
The Hacker News
Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 09, 2024NewsroomMalware / Cyber Threat Threat actors are resorting to...
The Hacker News
Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 08, 2024NewsroomMalware / Cybercrime Threat actors operating under the name...
The Hacker News
NIST Warns of Security and Privacy Risks from Rapid AI System Deployment – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 08, 2024NewsroomArtificial Intelligence / Cyber Security The U.S. National Institute...
The Hacker News
DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud – Source:thehackernews.com
Source: thehackernews.com - Author: . Jan 08, 2024NewsroomFinancial Fraud / Cybercrime The U.S. Department of Justice...
Posts pagination
1
…
5
6
7
…
57
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025