Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Volt Typhoon Rebuilds Malware Botnet After FBI Disruption
News
Volt Typhoon Rebuilds Malware Botnet After FBI Disruption
The Chinese state-sponsored hacking group Volt Typhoon has successfully rebuilt its KV-Botnet malware botnet, targeting outdated Cisco and Netgear routers, despite an FBI disruption earlier ...
Stop and Shop Parent Company Ahold Delhaize hit by Cyberattack
News
Stop and Shop Parent Company ‘Ahold Delhaize’ hit by Cyberattack
Ahold Delhaize, parent company of Stop & Shop and Hannaford, confirms a significant cybersecurity incident impacting its US network. Learn about the ongoing disruption and ...
Set Forth Data Breach: 1.5 Million Individuals Affected by Cyberattack
News
Set Forth Data Breach: 1.5 Million Individuals Affected by Cyberattack
Debt relief company Set Forth suffered a major data breach, exposing the sensitive personal information of roughly 1.5 million individuals. The cyberattack compromised crucial data.
SelectBlinds Data Breach: 200,000 Customers Impacted by E-Skimming Attack
News
SelectBlinds Data Breach: 200,000 Customers Impacted by E-Skimming Attack
The SelectBlinds data breach exposed 206,238 customers' payment card details and personal information via a sophisticated e-skimming attack lasting nearly nine months.
Halliburton Ransomware Attack Costs Energy Giant $35 Million
News
Halliburton Ransomware Attack Costs Energy Giant $35 Million
Halliburton's August ransomware attack crippled IT systems, causing $35 million in losses and highlighting the vulnerability of even the largest corporations to cyber threats. The ...
Halliburton Confirms Data Breach in Recent Cyberattack
News
Halliburton Confirms Data Breach in Recent Cyberattack
Oil Giant Halliburton Confirms RansomHub Involvement in Data Breach in its Latest SEC Filing Oil and gas giant Halliburton has ...
Amazon Data Breach: Employee Information Exposed After Vendor Hack
News
Amazon Data Breach: Employee Information Exposed After Vendor Hack
A massive Amazon data breach exposes millions of employee records after a third-party vendor was compromised. Learn about the extent of the breach and the ...
Schneider Electric Dev Platform Hack Confirmed 400k Rows of User Data Stolen
News
Schneider Electric Dev Platform Hack Confirmed: 400k Rows of User Data Stolen
Schneider Electric, a global leader in energy management and automation solutions, recently confirmed it was targeted by the Hellcat ransomware ...
Palo Alto Networks PAN-OS RCE Vulnerability
News
Palo Alto Networks PAN-OS Remote Code Execution Vulnerability Advisory
On November 6, 2024, Palo Alto Networks published a security advisory in response to claims regarding a potential remote code ...
Washington Court System Cyberattack Causes Multi-Regional Services Disruption
News
Washington Court System Cyberattack Causes Multi-Regional Services Disruption
On November 3, 2024, the Washington State Administrative Office of the Courts (AOC) detected unauthorized activity within its networks, prompting ...
News
Guardian Ransomware Attack Linked to Change Healthcare Cyberattack
On February 21, a ransomware attack targeting the systems of Change Healthcare, a key service provider, was detected, affecting numerous ...
SETU Cyberattack: Waterford Campus IT Systems Down, Classes Suspended
News
SETU Cyberattack: Waterford Campus IT Systems Down, Classes Suspended
Ireland's South East Technological University (SETU) suffered a cyberattack, temporarily halting classes and disrupting IT services on its Waterford campus. The university is working to ...
Singtel Data Breach: Volt Typhoon's Test Run Before Targeting US Telecoms
Cybersecurity
Singtel Data Breach: Volt Typhoon’s Test Run Before Targeting US Telecoms
Chinese government-backed hackers, Volt Typhoon, reportedly breached Singtel in a test run before targeting US telecoms, using a web shell and exploiting a Versa SD-WAN ...
Nokia Investigates Third-Party Breach After Hacker Claims to Steal Source Code
News
Nokia Investigates Third-Party Breach After Hacker Claims to Steal Source Code
A hacker claims to have stolen Nokia source code via a third-party vendor breach, prompting an investigation by Nokia. The alleged stolen data includes sensitive ...
FIN11
Resources
FIN11 – A Critical Healthcare Cyberthreat
FIN11, also known as DEV-0950, Lace Tempest, TA505, TEMP.Warlock, and UNC902, is a cybercrime group that has been conducting financially-motivated intrusions since at least 2017.
LA Housing Authority Confirms Data Breach Claimed by Cactus Ransomware
News
LA Housing Authority Confirms Data Breach Claimed by Cactus Ransomware
The LA Housing Authority (HACLA) confirmed a cyberattack by the Cactus ransomware gang, following a previous breach by LockBit. Sensitive data may have been compromised, ...
City of Columbus Ransomware Attack: 500,000 Individuals Affected by Rhysida Ransomware Data Breach
News
City of Columbus Ransomware Attack: 500,000 Individuals Affected by Rhysida Ransomware Data Breach
The City of Columbus suffered a devastating ransomware attack in July 2024, resulting in the theft of personal data from 500,000 individuals, highlighting cybersecurity vulnerabilities
Blog
How the Dark Web Has Fueled the 32% Rise in Healthcare Cyberattacks
The healthcare industry is facing an unprecedented crisis. A recent report reveals a staggering 32% increase in global healthcare cyberattacks, fueled by the booming trade ...
Ukraine's Cyberattack Cripples Crimean Banks in DIU's Massive DDoS Operation
News
Ukraine’s Cyberattack Cripples Crimean Banks in DIU’s Massive DDoS Operation
Ukraine's Defense Intelligence (DIU) launched a 24-hour Distributed Denial of Service (DDoS) attack targeting four Russian banks operating illegally in Crimea, disrupting online banking services ...
Central Bank Cyprus Says 14.3% of Businesses Hit by Cyberattacks
Cybersecurity
Central Bank Cyprus Says 14.3% of Businesses Hit by Cyberattacks
Cyprus reports 14.3% of businesses experienced cyberattacks, highlighting rising EU cybersecurity risks. Proactive measures like mandatory penetration testing are being implemented to address vulnerabilities.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
VanHelsing Ransomware Targets Multiple Platforms Including Windows and ESXi Systems
The new VanHelsing ransomware targets various systems, employing advanced encryption techniques and demanding ransoms up to $500,000 from its victims.
INTERPOL Operation Red Card Nets 300 Cybercrime Suspects in Africa
INTERPOL's Operation Red Card resulted in the arrest of 306 cybercrime suspects across seven African nations, seizing thousands of devices used in various scams.
Oracle Cloud Breach Compromises 6 Million Records, Threatening 140,000 Businesses
A massive Oracle Cloud breach exposed 6 million records, impacting 140,000 businesses. The attacker, "rose87168," is selling the data and demanding ransoms.
NYU Data Breach: Class Action Lawsuit Investigation Underway
NYU's March 2025 data breach exposed millions of applicants' personal data, prompting a class action lawsuit investigation. Attorneys seek to recover compensation for affected individuals.
Microsoft’s Trusted Signing Service Abused to Code-Sign Malware
Microsoft's Trusted Signing service is being abused to code-sign malware using short-lived certificates. This allows malicious software to bypass security and appear legitimate. Microsoft is ...
10 Key Benefits of Cyber Tabletop Exercises
Regular cybersecurity tabletop exercises are crucial for identifying weaknesses and strengthening your defenses. This blog explores the ten major advantages of incorporating these simulations into ...
Coinbase Targeted in GitHub Actions Breach
A major GitHub Actions breach targeted Coinbase, exploiting the tj-actions/changed-files action to steal secrets. Although Coinbase claims no damage, the attack highlights supply chain vulnerabilities.
CISA Says NAKIVO Backup Flaw is Actively Exploited in Attacks
CISA warns of a critical NAKIVO backup flaw, CVE-2024-48248, allowing unauthorized file access, urging organizations to patch systems promptly.
GitHub Supply Chain Attack Exposes Secrets in 218 Repositories
A GitHub Action supply chain attack exposed secrets from 218 repositories due to malicious code in tj-actions/changed-files, impacting popular projects and potentially causing further supply ...
WordPress Plugin WP Ghost Vulnerable to Critical Remote Code Execution Bug
Critical remote code execution vulnerability in WordPress plugin WP Ghost allows attackers to hijack servers. Urgent updates are required.
Network Security in a Digital World: Understanding and Mitigating Risks
The digital landscape is riddled with threats in modern networks. From malware and phishing to DDoS attacks and physical sabotage, the challenges are multifaceted. This ...
Critical Cisco Smart Licensing Utility Flaws Exploited in Attacks
Cisco's Smart Licensing Utility vulnerabilities CVE-2024-20439 and CVE-2024-20440 are now exploited, allowing unauthorized access through a backdoor admin account.
HellCat Hacking Spree Targets Jira Servers Worldwide
HellCat hackers are exploiting compromised Jira credentials in a worldwide hacking spree, targeting companies like Ascom and Jaguar Land Rover, stealing sensitive data including source ...
RansomHub Ransomware Leverages New Betruger Backdoor for Enhanced Attacks
RansomHub ransomware uses a new multi-function backdoor, Betruger, for enhanced attacks, streamlining the deployment process and minimizing detection.
Critical MegaRAC Bug Lets Attackers Hijack and Brick Servers
MI MegaRAC BMC vulnerability (CVE-2024-54085) lets attackers remotely hijack and brick servers, impacting numerous vendors and potentially causing significant damage.
This Week In Cybersecurity: 17th March to 21st March, 2025
This week in cybersecurity reports on a range of incidents, including a major data breach at California Cryobank and a supply chain attack affecting GitHub ...
No More Warnings? The Risks of Losing CIPAC’s Cyber Threat Coordination
The Department of Homeland Security (DHS) has abruptly shut down the Critical Infrastructure Partnership Advisory Council (CIPAC), the central hub for cybersecurity collaboration between the ...
517,000 Victims: How a Ransomware Gang Targeted Pennsylvania’s Largest Educators’ Union
Over 517,000 individuals are now at risk after the Pennsylvania State Education Association (PSEA) suffered a massive data breach in July 2024—claimed by the Rhysida ...
Veeam Backup & Replication Flaw Allows Remote Execution of Malicious Code
A critical vulnerability in Veeam Backup & Replication allows remote code execution, affecting various versions and posing significant security risks.
DollyWay: The 8-Year WordPress Malware Campaign Infecting 20,000 Sites
For nearly a decade, a malware campaign dubbed DollyWay has silently compromised over 20,000 WordPress websites, evolving from a ransomware and banking trojan distributor to ...