Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Threat Research
copilot
June Patch Tuesday digs into 67 bugs – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn .Microsoft on Tuesday released 67 patches affecting 12 product families....
asyncrat
The strange tale of ischhfd83: When cybercriminals eat their own – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey At Sophos X-Ops, we often get queries from our customers...
dragonforce
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers – Source: news.sophos.com
Source: news.sophos.com - Author: gallagherseanm Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked...
ctu
DragonForce targets rivals in a play for dominance – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn Not content with attacking retailers, this aggressive group is fighting...
3am ransomware
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist – Source: news.sophos.com
Source: news.sophos.com - Author: gallagherseanm Ransomware is usually a crime of opportunity. Attackers typically strike through...
beyond the kill chain
Beyond the kill chain: What cybercriminals do with their money (Part 5) – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey Content warning: Because of the nature of some of the...
beyond the kill chain
Beyond the kill chain: What cybercriminals do with their money (Part 4) – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey Content warning: Because of the nature of some of the...
beyond the kill chain
Beyond the kill chain: What cybercriminals do with their money (Part 3) – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey Content warning: Because of the nature of some of the...
beyond the kill chain
Beyond the kill chain: What cybercriminals do with their money (Part 2) – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey Content warning: Because of the nature of some of the...
beyond the kill chain
Beyond the kill chain: What cybercriminals do with their money (Part 1) – Source: news.sophos.com
Source: news.sophos.com - Author: Matt Wixey Content warning: Because of the nature of some of the...
featured
Microsoft primes 71 fixes for May Patch Tuesday – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn Microsoft on Tuesday released 71 patches affecting 14 product families....
featured
Lumma Stealer, coming and going – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn In September 2024, a threat hunt across Sophos Managed Detection...
ctu
NICKEL TAPESTRY expands fraudulent worker operations – Source: news.sophos.com
Source: news.sophos.com - Author: Angela Gunn The North Korean IT worker scheme grows to include organizations...
Threat Research
Layers of Deception: Analyzing the Complex Stages of XLoader Malware Evolution
XLoader, an advanced evolution of the FormBook malware, stands out as a highly sophisticated cyber threat...
Latest News
The Register Security
UK gov asks university boffins to pinpoint cyber growth areas where it should splash cash – Source: go.theregister.com
20/06/2025
The Hacker News
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft – Source:thehackernews.com
19/06/2025
The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware – Source:thehackernews.com
19/06/2025
The Hacker News
Secure Vibe Coding: The Complete New Guide – Source:thehackernews.com
19/06/2025
securityweek.com
Chain IQ, UBS Data Stolen in Ransomware Attack – Source: www.securityweek.com
19/06/2025
securityweek.com
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands – Source: www.securityweek.com
19/06/2025