Cyber Security
News
Volt Typhoon Rebuilds Malware Botnet After FBI Disruption
Mitchell Langley
November 14, 2024
The Chinese state-sponsored hacking group Volt Typhoon has successfully rebuilt its KV-Botnet malware botnet, targeting outdated Cisco and Netgear routers, despite an FBI disruption earlier ...
News
Stop and Shop Parent Company ‘Ahold Delhaize’ hit by Cyberattack
Mitchell Langley
November 14, 2024
Ahold Delhaize, parent company of Stop & Shop and Hannaford, confirms a significant cybersecurity incident impacting its US network. Learn about the ongoing disruption and ...
News
Set Forth Data Breach: 1.5 Million Individuals Affected by Cyberattack
Gabby Lee
November 14, 2024
Debt relief company Set Forth suffered a major data breach, exposing the sensitive personal information of roughly 1.5 million individuals. The cyberattack compromised crucial data.
News
SelectBlinds Data Breach: 200,000 Customers Impacted by E-Skimming Attack
Mitchell Langley
November 12, 2024
The SelectBlinds data breach exposed 206,238 customers' payment card details and personal information via a sophisticated e-skimming attack lasting nearly nine months.
News
Halliburton Ransomware Attack Costs Energy Giant $35 Million
Mitchell Langley
November 12, 2024
Halliburton's August ransomware attack crippled IT systems, causing $35 million in losses and highlighting the vulnerability of even the largest corporations to cyber threats. The ...
News
Halliburton Confirms Data Breach in Recent Cyberattack
Gabby Lee
November 12, 2024
Oil Giant Halliburton Confirms RansomHub Involvement in Data Breach in its Latest SEC Filing Oil and gas giant Halliburton has ...
News
Amazon Data Breach: Employee Information Exposed After Vendor Hack
Mitchell Langley
November 12, 2024
A massive Amazon data breach exposes millions of employee records after a third-party vendor was compromised. Learn about the extent of the breach and the ...
News
Schneider Electric Dev Platform Hack Confirmed: 400k Rows of User Data Stolen
Andrew Doyle
November 11, 2024
Schneider Electric, a global leader in energy management and automation solutions, recently confirmed it was targeted by the Hellcat ransomware ...
News
Palo Alto Networks PAN-OS Remote Code Execution Vulnerability Advisory
Gabby Lee
November 11, 2024
On November 6, 2024, Palo Alto Networks published a security advisory in response to claims regarding a potential remote code ...
News
Washington Court System Cyberattack Causes Multi-Regional Services Disruption
Gabby Lee
November 8, 2024
On November 3, 2024, the Washington State Administrative Office of the Courts (AOC) detected unauthorized activity within its networks, prompting ...
News
Guardian Ransomware Attack Linked to Change Healthcare Cyberattack
Andrew Doyle
November 8, 2024
On February 21, a ransomware attack targeting the systems of Change Healthcare, a key service provider, was detected, affecting numerous ...
News
SETU Cyberattack: Waterford Campus IT Systems Down, Classes Suspended
Mitchell Langley
November 6, 2024
Ireland's South East Technological University (SETU) suffered a cyberattack, temporarily halting classes and disrupting IT services on its Waterford campus. The university is working to ...
Cybersecurity
Singtel Data Breach: Volt Typhoon’s Test Run Before Targeting US Telecoms
Gabby Lee
November 6, 2024
Chinese government-backed hackers, Volt Typhoon, reportedly breached Singtel in a test run before targeting US telecoms, using a web shell and exploiting a Versa SD-WAN ...
News
Nokia Investigates Third-Party Breach After Hacker Claims to Steal Source Code
Mitchell Langley
November 6, 2024
A hacker claims to have stolen Nokia source code via a third-party vendor breach, prompting an investigation by Nokia. The alleged stolen data includes sensitive ...
Resources
FIN11 – A Critical Healthcare Cyberthreat
Mitchell Langley
November 6, 2024
FIN11, also known as DEV-0950, Lace Tempest, TA505, TEMP.Warlock, and UNC902, is a cybercrime group that has been conducting financially-motivated intrusions since at least 2017.
News
LA Housing Authority Confirms Data Breach Claimed by Cactus Ransomware
Mitchell Langley
November 5, 2024
The LA Housing Authority (HACLA) confirmed a cyberattack by the Cactus ransomware gang, following a previous breach by LockBit. Sensitive data may have been compromised, ...
News
City of Columbus Ransomware Attack: 500,000 Individuals Affected by Rhysida Ransomware Data Breach
Gabby Lee
November 5, 2024
The City of Columbus suffered a devastating ransomware attack in July 2024, resulting in the theft of personal data from 500,000 individuals, highlighting cybersecurity vulnerabilities
Blog
How the Dark Web Has Fueled the 32% Rise in Healthcare Cyberattacks
Mitchell Langley
November 4, 2024
The healthcare industry is facing an unprecedented crisis. A recent report reveals a staggering 32% increase in global healthcare cyberattacks, fueled by the booming trade ...
News
Ukraine’s Cyberattack Cripples Crimean Banks in DIU’s Massive DDoS Operation
Mitchell Langley
November 4, 2024
Ukraine's Defense Intelligence (DIU) launched a 24-hour Distributed Denial of Service (DDoS) attack targeting four Russian banks operating illegally in Crimea, disrupting online banking services ...
Cybersecurity
Central Bank Cyprus Says 14.3% of Businesses Hit by Cyberattacks
Gabby Lee
November 4, 2024
Cyprus reports 14.3% of businesses experienced cyberattacks, highlighting rising EU cybersecurity risks. Proactive measures like mandatory penetration testing are being implemented to address vulnerabilities.
CVE Vulnerability Alerts
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
Andrew Doyle
February 4, 2026
Cybersecurity
UK Data Protection Authority Probes X’s Grok AI for Generating Inappropriate Images
Mitchell Langley
February 4, 2026
News
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
Mitchell Langley
February 4, 2026
TOP CYBERSECURITY HEADLINES
Application Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
This Week’s Security Spotlight
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Andrew Doyle
January 28, 2026
Network Security
TP-Link’s Vulnerability: Critical Patch for VIGI Cameras
Gabby Lee
January 20, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
VanHelsing Ransomware Targets Multiple Platforms Including Windows and ESXi Systems
March 25, 2025
The new VanHelsing ransomware targets various systems, employing advanced encryption techniques and demanding ransoms up to $500,000 from its victims.
INTERPOL Operation Red Card Nets 300 Cybercrime Suspects in Africa
March 25, 2025
INTERPOL's Operation Red Card resulted in the arrest of 306 cybercrime suspects across seven African nations, seizing thousands of devices used in various scams.
Oracle Cloud Breach Compromises 6 Million Records, Threatening 140,000 Businesses
March 24, 2025
A massive Oracle Cloud breach exposed 6 million records, impacting 140,000 businesses. The attacker, "rose87168," is selling the data and demanding ransoms.
NYU Data Breach: Class Action Lawsuit Investigation Underway
March 24, 2025
NYU's March 2025 data breach exposed millions of applicants' personal data, prompting a class action lawsuit investigation. Attorneys seek to recover compensation for affected individuals.
Microsoft’s Trusted Signing Service Abused to Code-Sign Malware
March 24, 2025
Microsoft's Trusted Signing service is being abused to code-sign malware using short-lived certificates. This allows malicious software to bypass security and appear legitimate. Microsoft is ...
10 Key Benefits of Cyber Tabletop Exercises
March 24, 2025
Regular cybersecurity tabletop exercises are crucial for identifying weaknesses and strengthening your defenses. This blog explores the ten major advantages of incorporating these simulations into ...
Coinbase Targeted in GitHub Actions Breach
March 24, 2025
A major GitHub Actions breach targeted Coinbase, exploiting the tj-actions/changed-files action to steal secrets. Although Coinbase claims no damage, the attack highlights supply chain vulnerabilities.
CISA Says NAKIVO Backup Flaw is Actively Exploited in Attacks
March 21, 2025
CISA warns of a critical NAKIVO backup flaw, CVE-2024-48248, allowing unauthorized file access, urging organizations to patch systems promptly.
GitHub Supply Chain Attack Exposes Secrets in 218 Repositories
March 21, 2025
A GitHub Action supply chain attack exposed secrets from 218 repositories due to malicious code in tj-actions/changed-files, impacting popular projects and potentially causing further supply ...
WordPress Plugin WP Ghost Vulnerable to Critical Remote Code Execution Bug
March 21, 2025
Critical remote code execution vulnerability in WordPress plugin WP Ghost allows attackers to hijack servers. Urgent updates are required.
Network Security in a Digital World: Understanding and Mitigating Risks
March 21, 2025
The digital landscape is riddled with threats in modern networks. From malware and phishing to DDoS attacks and physical sabotage, the challenges are multifaceted. This ...
Critical Cisco Smart Licensing Utility Flaws Exploited in Attacks
March 21, 2025
Cisco's Smart Licensing Utility vulnerabilities CVE-2024-20439 and CVE-2024-20440 are now exploited, allowing unauthorized access through a backdoor admin account.
HellCat Hacking Spree Targets Jira Servers Worldwide
March 21, 2025
HellCat hackers are exploiting compromised Jira credentials in a worldwide hacking spree, targeting companies like Ascom and Jaguar Land Rover, stealing sensitive data including source ...
RansomHub Ransomware Leverages New Betruger Backdoor for Enhanced Attacks
March 21, 2025
RansomHub ransomware uses a new multi-function backdoor, Betruger, for enhanced attacks, streamlining the deployment process and minimizing detection.
Critical MegaRAC Bug Lets Attackers Hijack and Brick Servers
March 21, 2025
MI MegaRAC BMC vulnerability (CVE-2024-54085) lets attackers remotely hijack and brick servers, impacting numerous vendors and potentially causing significant damage.
This Week In Cybersecurity: 17th March to 21st March, 2025
March 21, 2025
This week in cybersecurity reports on a range of incidents, including a major data breach at California Cryobank and a supply chain attack affecting GitHub ...
No More Warnings? The Risks of Losing CIPAC’s Cyber Threat Coordination
March 20, 2025
The Department of Homeland Security (DHS) has abruptly shut down the Critical Infrastructure Partnership Advisory Council (CIPAC), the central hub for cybersecurity collaboration between the ...
517,000 Victims: How a Ransomware Gang Targeted Pennsylvania’s Largest Educators’ Union
March 20, 2025
Over 517,000 individuals are now at risk after the Pennsylvania State Education Association (PSEA) suffered a massive data breach in July 2024—claimed by the Rhysida ...
Veeam Backup & Replication Flaw Allows Remote Execution of Malicious Code
March 20, 2025
A critical vulnerability in Veeam Backup & Replication allows remote code execution, affecting various versions and posing significant security risks.
DollyWay: The 8-Year WordPress Malware Campaign Infecting 20,000 Sites
March 20, 2025
For nearly a decade, a malware campaign dubbed DollyWay has silently compromised over 20,000 WordPress websites, evolving from a ransomware and banking trojan distributor to ...





































