Cyber Security
Blog
Black Basta Decryptor Recovers Files Exploiting a Ransomware Flaw
Mitchell Langley
January 2, 2024
A team of researchers has developed a Black Basta decryptor that takes advantage of a vulnerability in the Black Basta ...
Cybersecurity
Google Settles $5 Billion Lawsuit for Tracking Users in Incognito Mode
Mitchell Langley
January 2, 2024
Google settles $5 billion lawsuit that revolved around Google’s Chrome browser’s “incognito” mode. The plaintiffs argued that this feature misled ...
Cybersecurity
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
Andrew Doyle
January 2, 2024
In the complex realm of cyber warfare, the Albanian Parliament and One Albania Telecom have made the headlines. As the ...
News
Anna Jaques Hospital Cyberattack on Christmas Day Disrupts Medical Record Systems
Gabby Lee
January 2, 2024
On Christmas Day, Anna Jaques Hospital in Newburyport, MA, was targeted by a cyberattack. The Anna Jaques Hospital Cyberattack on ...
News
Steam Game Mod Breached to Push Password-Stealing Malware
Gabby Lee
January 2, 2024
On Christmas Day, the fan expansion called “Downfall” for the indie strategy game Slay the Spire was compromised in the ...
Security Spotlight
APT28 Hacking Collective Targets Ukraine with MASEPIE Malware – CERT-UA Issues Security Alert
Andrew Doyle
December 29, 2023
The Computer Emergency Response Team (CERT) of Ukraine has issued a warning regarding a recent phishing campaign. The threat actor ...
Ransomware
Lockbit Ransomware Disrupts Healthcare Systems at German KHO Network of Hospitals
Mitchell Langley
December 29, 2023
Katholische Hospitalvereinigung Ostwestfalen (KHO), a hospital network in Germany, has confirmed that the recent service disruptions experienced at three of ...
Security Spotlight
First American Cyber Attack Disrupts Closings: No New Updates from the American Title Insurance Firm
Andrew Doyle
December 28, 2023
The nation’s second-largest title insurer, and its subsidiaries are currently experiencing an ongoing system outage following the First American cyber ...
Ransomware
Liberty Hospital Cyber Attack Forces Kansas City to Transfer Patients and Reschedule Appointments
Mitchell Langley
December 27, 2023
A hospital in the vicinity of Kansas City, Missouri, is facing challenges in delivering patient care due to a cyberattack ...
Security Spotlight
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Gabby Lee
December 27, 2023
Yakult Australia, the manufacturer of a popular probiotic milk drink, recently faced a cyber incident. The Yakult Cyber Incident has ...
Security Spotlight
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
Gabby Lee
December 27, 2023
According to Barracuda, a leading network and email security firm, they have successfully applied remote patches to all active Barracuda ...
Security Spotlight
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Mitchell Langley
December 27, 2023
Integris Health, Oklahoma’s largest not-for-profit health network, has recently experienced a cyberattack resulting in the theft of patient data. The ...
Security Spotlight
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Andrew Doyle
December 27, 2023
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut ...
Security Spotlight
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Gabby Lee
December 27, 2023
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on ...
Security Spotlight
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Andrew Doyle
December 26, 2023
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject ...
Ransomware
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Gabby Lee
December 22, 2023
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. ...
Ransomware
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
Mitchell Langley
December 22, 2023
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has ...
Cybersecurity
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
Mitchell Langley
December 21, 2023
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve ...
Cybersecurity
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Andrew Doyle
December 20, 2023
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given ...
Cybersecurity
OilRig APT Uses Downloader Malware for Cyberespionage
Gabby Lee
December 15, 2023
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader ...
Cybersecurity
University of Pennsylvania Data Breach: Clop’s Zero-Day Exploit Targets Oracle’s E-Business Suite
Gabby Lee
December 3, 2025
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
Russian Internet Authority Blocks Roblox Over Content Concerns
Mitchell Langley
December 5, 2025
CVE Vulnerability Alerts
React Server Components’ Security Flaw Risks Unauthenticated Remote Code Execution
Andrew Doyle
December 5, 2025
Cybersecurity
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
Mitchell Langley
December 3, 2025
Data Security
South Korea’s Coupang Faces Data Breach Impacting Millions: Implications for The Retail Giant
Andrew Doyle
December 2, 2025
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
This Week In Cybersecurity: 9th September to 13th September
September 13, 2024
Avis has reported a data breach involving unauthorized access to its business application, exposing customer names and potentially sensitive information.
What is a Whaling Phishing Attack?
September 13, 2024
Whaling phishing, also known simply as whaling, is a highly targeted and sophisticated form of phishing attack that specifically targets high-level executives within an organization, such ...
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
September 13, 2024
A critical vulnerability, CVE-2024-40711, affecting Veeam Backup & Replication (VBR), has emerged as a significant threat to enterprises, with ransomware gangs poised to exploit it for data ...
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
September 12, 2024
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has emerged, posing a significant threat to businesses worldwide. The group has already claimed 19 victims on its ...
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
September 11, 2024
A major credit card data breach has impacted nearly 1.7 million individuals, raising concerns about the security of sensitive financial information.
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
September 11, 2024
A novel acoustic attack named ‘PIXHELL’ can leak secrets from audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.
Indodax Hack: A Major Blow to Indonesian Crypto Security
September 11, 2024
Hackers targeted Indodax's hot wallet, which is a cryptocurrency wallet that is connected to the internet and used for frequent transactions.
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
September 9, 2024
A critical severity vulnerability has been discovered in LiteSpeed Cache, a popular caching plugin used by over 6 million WordPress sites. The flaw, tracked as ...
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
September 9, 2024
GRU Unit 29155: A Growing Threat to Global Security
This Week In Cybersecurity: 2nd September to 6th September, VK Data Leak Exposes 390 Million Users
September 9, 2024
VK Data Leak, Voldemort Malware Abusing Google Sheets, DICK’S Sporting Goods Cyberattack and more.
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
September 9, 2024
This vulnerability, tracked as CVE-2024-7591, allows attackers to remotely execute commands on vulnerable devices, posing a significant risk to organizations relying on these products.
Avis Data Breach: Customer Data Stolen in Attack on Business Application
September 9, 2024
Car Rental Giant Avis Suffers Data Breach, Exposing Customer Information
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
September 6, 2024
Ransomware attacks targeting critical national infrastructure (CNI) organizations have reached alarming heights, with costs soaring to unprecedented levels. A new report from Sophos reveals a ...
Clearview AI Fined €30.5 Million for Unlawful Data Collection
September 5, 2024
Dutch Data Protection Authority Takes Action Against Clearview AI Facial Recognition Company
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
September 5, 2024
HikkI-Chan Claims Responsibility for VK Data Breach
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
September 5, 2024
North Korean threat actors, known for their sophisticated cyberattacks, have been targeting job seekers with a fake Windows video conferencing application disguised as FreeConference.com.
What is a DDoS Attack – A Complete Guide
September 5, 2024
This comprehensive guide delves into the intricacies of DDoS attacks, their mechanisms, common types, and effective mitigation strategies, empowering enterprise businesses to safeguard their online ...
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
September 3, 2024
Security Camera Vendor Faces FTC Action for Lax Security Practices
CBIZ Discloses Data Breach Affecting Nearly 36,000 Individuals
September 3, 2024
CBIZ Benefits & Insurance Services (CBIZ), a leading provider of financial, benefits, and insurance services, has disclosed a data breach that impacted nearly 36,000 individuals
TfL Cyberattack: Transport for London Under Attack
September 3, 2024
Transport for London (TfL), the city's transportation authority, is currently investigating an ongoing cyberattack. While the attack is ongoing, TfL has assured the public that ...




































