Cyber Security
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
4 Crucial Automation Use Cases for Enterprise Security Automation
This Week In Cybersecurity: 9th December to 13th December
Krispy Kreme Cyberattack Disrupts Online Orders, Impacts US Operations
Salt Typhoon: Chinese Hacking Group Behind Metadata Theft Targets US Telecoms
Colonial Behavioral Health Files Data Breach Notice: October 2024 Incident Impacts Consumer Data
9 Steps to Remove Malware from Your Windows PC
This Week In Cybersecurity: 25th November to 29th November
LifeLabs Data Breach Report Finally Public After Four-Year Legal Battle
Thala Recovers $25.5 Million After Security Breach
WolfsBane Linux Malware Unleashed by Chinese Hackers
This Week In Cybersecurity: 18th to 22nd November
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
Manufacturers Under Cyberattack: An Unprecedented Enterprise Cyberthreat
RedCurl Cyberespionage Group Deploys Ransomware Targeting Hyper-V
News
RedCurl Cyberespionage Group Deploys Ransomware Targeting Hyper-V
RedCurl, a known cyberespionage group, has deployed QWCrypt ransomware targeting Hyper-V servers, marking a significant shift in their tactics and raising concerns about their motivations.
Garden of Life Faces Three Class-Action Lawsuits Following Data Breach
News
Garden of Life Faces Three Class-Action Lawsuits Following Data Breach
Garden of Life faces three class-action lawsuits after a data breach exposed customer payment card information, alleging negligence and inadequate data security.
NSW Government Website Data Breach With 9,000 Court files
News
NSW Government Website Data Breach With 9,000 Court files
major data breach exposed 9,000 sensitive NSW court files. Authorities are investigating, aiming to identify accessed data within a week. Victims are urged to ...
StreamElements Confirms Third-Party Data Breach Affecting 210,000 Users
News
StreamElements Confirms Third-Party Data Breach Affecting 210,000 Users
StreamElements confirms a third-party data breach exposing data for 210,000 users, highlighting the risks of relying on external vendors.
Oracle Customers Validate Stolen Data from Cloud Server Breach
News
Oracle Customers Validate Stolen Data from Cloud Server Breach
Oracle denies a data breach affecting 6 million users, but independent verification confirms the authenticity of stolen data, contradicting their claims.
Sydney Tools Data Breach Exposes 34 Million+ Customer Orders
News
Sydney Tools Data Breach Exposes 34 Million+ Customer Orders
A massive data breach at Sydney Tools exposed over 34 million customer orders and sensitive employee data, including names, addresses, and salaries. The unsecured database ...
South Carolina Eye Clinic Suffers Data Breach: Ransomware Suspected
News
South Carolina Eye Clinic Suffers Data Breach: Ransomware Suspected
Columbia Eye Clinic in South Carolina suffered a data breach, potentially a ransomware attack, exposing patient data including names, contact information, and procedure codes.
Urgent Security Update: Authentication Bypass Vulnerability in VMware Tools for Windows (CVE-2025-22230)
News
Urgent Security Update: Authentication Bypass Vulnerability in VMware Tools for Windows (CVE-2025-22230)
Critical VMware Tools vulnerability (CVE-2025-22230) enables privilege escalation on Windows VMs. Immediate patching is paramount for enterprise security.
Numotion Data Breach Impacts Nearly 500,000 Individuals
News
Numotion Data Breach Impacts Nearly 500,000 Individuals
Numotion's latest data breach exposed the personal and health information of nearly 500,000 individuals, following a series of similar incidents, leading to multiple lawsuits.
Cloudflare R2 Service Outage: A Case Study in Human Error and System Design
News
Cloudflare R2 Service Outage: A Case Study in Human Error and System Design
Cloudflare's R2 service suffered a 77-minute outage due to a password rotation error, highlighting the risks of human error in cloud infrastructure.
Next.js Flaw Allows Unauthorized Access
News
Next.js Flaw Allows Unauthorized Access
Critical Next.js vulnerability (CVE-2025-29927) lets attackers bypass authorization, impacting versions before 15.2.3. Urgent updates are needed.
Ukraine Railway Hit by Cyberattack: Online Systems Disrupted
News
Ukraine Railway Hit by Cyberattack: Online Systems Disrupted
A major cyberattack targeted Ukraine's railway system, disrupting online services but not train operations. Restoration efforts are ongoing.
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
Cybersecurity
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
Chinese Weaver Ant hackers infiltrated a telecom network for over four years, using advanced techniques like web shell tunneling and data exfiltration.
Astral Foods Cyberattack: R20 Million Profit Plunge
News
Astral Foods Cyberattack: R20 Million Profit Plunge
Astral Foods suffered a cyberattack causing a R20 million profit loss and operational disruption. Swift recovery was implemented, but the incident highlights the need for ...
VanHelsing Ransomware Targets Multiple Platforms Including Windows and ESXi Systems
News
VanHelsing Ransomware Targets Multiple Platforms Including Windows and ESXi Systems
The new VanHelsing ransomware targets various systems, employing advanced encryption techniques and demanding ransoms up to $500,000 from its victims.
INTERPOL Operation Red Card Nets 300 Cybercrime Suspects in Africa
News
INTERPOL Operation Red Card Nets 300 Cybercrime Suspects in Africa
INTERPOL's Operation Red Card resulted in the arrest of 306 cybercrime suspects across seven African nations, seizing thousands of devices used in various scams.
Oracle Cloud Breach Compromises 6 Million Records, Threatening 140,000 Businesses
News
Oracle Cloud Breach Compromises 6 Million Records, Threatening 140,000 Businesses
A massive Oracle Cloud breach exposed 6 million records, impacting 140,000 businesses. The attacker, "rose87168," is selling the data and demanding ransoms.
NYU Data Breach: Class Action Lawsuit Investigation Underway
News
NYU Data Breach: Class Action Lawsuit Investigation Underway
NYU's March 2025 data breach exposed millions of applicants' personal data, prompting a class action lawsuit investigation. Attorneys seek to recover compensation for affected individuals.
Microsoft's Trusted Signing Service Abused to Code-Sign Malware
News
Microsoft’s Trusted Signing Service Abused to Code-Sign Malware
Microsoft's Trusted Signing service is being abused to code-sign malware using short-lived certificates. This allows malicious software to bypass security and appear legitimate. Microsoft is ...
Coinbase Targeted in GitHub Actions Breach
News
Coinbase Targeted in GitHub Actions Breach
A major GitHub Actions breach targeted Coinbase, exploiting the tj-actions/changed-files action to steal secrets. Although Coinbase claims no damage, the attack highlights supply chain vulnerabilities.

TOP CYBERSECURITY HEADLINES

SECURITYWEEK INDUSTRY EXPERTS

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

  • All
  • Application Security
  • Blog
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
StreamElements Confirms Third-Party Data Breach Affecting 210,000 Users
StreamElements confirms a third-party data breach exposing data for 210,000 users, highlighting the risks of relying on external vendors.
Oracle Customers Validate Stolen Data from Cloud Server Breach
Oracle denies a data breach affecting 6 million users, but independent verification confirms the authenticity of stolen data, contradicting their claims.
Urgent Security Update: Authentication Bypass Vulnerability in VMware Tools for Windows (CVE-2025-22230)
Critical VMware Tools vulnerability (CVE-2025-22230) enables privilege escalation on Windows VMs. Immediate patching is paramount for enterprise security.
South Carolina Eye Clinic Suffers Data Breach: Ransomware Suspected
Columbia Eye Clinic in South Carolina suffered a data breach, potentially a ransomware attack, exposing patient data including names, contact information, and procedure codes.
Sydney Tools Data Breach Exposes 34 Million+ Customer Orders
A massive data breach at Sydney Tools exposed over 34 million customer orders and sensitive employee data, including names, addresses, and salaries. The unsecured database ...
Numotion Data Breach Impacts Nearly 500,000 Individuals
Numotion's latest data breach exposed the personal and health information of nearly 500,000 individuals, following a series of similar incidents, leading to multiple lawsuits.
Cloudflare R2 Service Outage: A Case Study in Human Error and System Design
Cloudflare's R2 service suffered a 77-minute outage due to a password rotation error, highlighting the risks of human error in cloud infrastructure.
Next.js Flaw Allows Unauthorized Access
Critical Next.js vulnerability (CVE-2025-29927) lets attackers bypass authorization, impacting versions before 15.2.3. Urgent updates are needed.
Ukraine Railway Hit by Cyberattack: Online Systems Disrupted
A major cyberattack targeted Ukraine's railway system, disrupting online services but not train operations. Restoration efforts are ongoing.
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
Chinese Weaver Ant hackers infiltrated a telecom network for over four years, using advanced techniques like web shell tunneling and data exfiltration.
Astral Foods Cyberattack: R20 Million Profit Plunge
Astral Foods suffered a cyberattack causing a R20 million profit loss and operational disruption. Swift recovery was implemented, but the incident highlights the need for ...
VanHelsing Ransomware Targets Multiple Platforms Including Windows and ESXi Systems
The new VanHelsing ransomware targets various systems, employing advanced encryption techniques and demanding ransoms up to $500,000 from its victims.
INTERPOL Operation Red Card Nets 300 Cybercrime Suspects in Africa
INTERPOL's Operation Red Card resulted in the arrest of 306 cybercrime suspects across seven African nations, seizing thousands of devices used in various scams.
Oracle Cloud Breach Compromises 6 Million Records, Threatening 140,000 Businesses
A massive Oracle Cloud breach exposed 6 million records, impacting 140,000 businesses. The attacker, "rose87168," is selling the data and demanding ransoms.
NYU Data Breach: Class Action Lawsuit Investigation Underway
NYU's March 2025 data breach exposed millions of applicants' personal data, prompting a class action lawsuit investigation. Attorneys seek to recover compensation for affected individuals.
Microsoft’s Trusted Signing Service Abused to Code-Sign Malware
Microsoft's Trusted Signing service is being abused to code-sign malware using short-lived certificates. This allows malicious software to bypass security and appear legitimate. Microsoft is ...
10 Key Benefits of Cyber Tabletop Exercises
Regular cybersecurity tabletop exercises are crucial for identifying weaknesses and strengthening your defenses. This blog explores the ten major advantages of incorporating these simulations into ...
Coinbase Targeted in GitHub Actions Breach
A major GitHub Actions breach targeted Coinbase, exploiting the tj-actions/changed-files action to steal secrets. Although Coinbase claims no damage, the attack highlights supply chain vulnerabilities.
CISA Says NAKIVO Backup Flaw is Actively Exploited in Attacks
CISA warns of a critical NAKIVO backup flaw, CVE-2024-48248, allowing unauthorized file access, urging organizations to patch systems promptly.
GitHub Supply Chain Attack Exposes Secrets in 218 Repositories
A GitHub Action supply chain attack exposed secrets from 218 repositories due to malicious code in tj-actions/changed-files, impacting popular projects and potentially causing further supply ...