Cyber Security
U.K. Unveils Cybersecurity Reform to Safeguard Critical Infrastructure
CISO Forum 2025: Summit Explores AI, Cloud Risk, and Governance Realities
Coordinated Zero-Day Exploits Target Citrix and Cisco Vulnerabilities in Custom Malware Campaign
China’s Cyber Silence Compared to Russia’s Noise Signals a Strategic Shift in Cyber Geopolitics
Microsoft Issues First Extended Security Update for Windows 10 Post-End-of-Life
Rhadamanthys Infostealer Operation Disrupted: Customers Lose Server Access
Synology Patches Critical RCE Bug in BeeStation Following Pwn2Own Taipei Demo
ASIO Chief Warns of State-Backed Cyber Sabotage Targeting Critical Infrastructure
Triofox Vulnerability Exploited for Remote Code Execution Through Built-In Antivirus
Adobe Addresses Critical Vulnerabilities Across Creative Suite Products
China Alleges U.S. Behind 2020 Cyberattack Targeting Bitcoin Miners
SAP Patches Critical SQL Anywhere Monitor Flaw With Hardcoded Credentials
Doctor Alliance Breach Exposes 1.2 Million Patient Records Online
Data Breach at Thayer Hotel West Point Exposes Over 33,000 Guest Records
APT37 Exploits Google Find Hub to Remotely Wipe Android Devices
Intel Engineer Allegedly Walks off With 18,000 Confidential Files in Data Theft Lawsuit
AI Startups Leak Cloud Secrets on GitHub, Exposing Model Data
Critical Vulnerability in ‘expr-eval’ Library Enables Remote Code Execution
Russian Initial Access Broker Pleads Guilty in Yanluowang Ransomware Campaign
Firefox 145 Brings Major Privacy Upgrade to Defend Against Fingerprinting
Triofox CVE-2025-12480 Exploited in Attacks Despite Available Patch
CISA Orders Federal Agencies to Patch Samsung Zero-Day Exploited by LandFall Spyware
Konni Campaign Impersonates Human Rights Groups in Cross-Platform Espionage Operation
NAKIVO Enhances Disaster Recovery With Real-Time Replication and Multilingual Support
Microsoft Reveals Whisper Leak Side-Channel Attack That Threatens LLM Communication Privacy
Critical runC Vulnerabilities Undermine Container Isolation in Docker and Kubernetes
QNAP Patches Seven Zero-Day Vulnerabilities Exploited at Pwn2Own 2025
GlassWorm Returns With Malicious VSCode Extensions Infecting Thousands
Sensitive Data at OB/GYN Associates Exposed in Data Breach
SonicWall Confirms State-Sponsored Hackers Targeted Cloud Backup Service
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. Ace Hardware Cyber Attack 2023 ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...
U.K. Unveils Cybersecurity Reform to Safeguard Critical Infrastructure
CISO Forum 2025: Summit Explores AI, Cloud Risk, and Governance Realities
Coordinated Zero-Day Exploits Target Citrix and Cisco Vulnerabilities in Custom Malware Campaign
DanaBot Resurfaces with New Windows Variant Six Months After Takedown
China’s Cyber Silence Compared to Russia’s Noise Signals a Strategic Shift in Cyber Geopolitics
Google Sues Chinese Cybercriminal Group Behind Massive “Lighthouse” Smishing Campaign
Microsoft Issues First Extended Security Update for Windows 10 Post-End-of-Life
Microsoft Patch Tuesday Fixes 60+ Bugs, Including Actively Exploited Windows Kernel Zero-Day
Maverick Banking Malware Shares Codebase With Coyote in Targeted Brazilian Campaigns
Rhadamanthys Infostealer Operation Disrupted: Customers Lose Server Access
Synology Patches Critical RCE Bug in BeeStation Following Pwn2Own Taipei Demo
ASIO Chief Warns of State-Backed Cyber Sabotage Targeting Critical Infrastructure
Triofox Vulnerability Exploited for Remote Code Execution Through Built-In Antivirus
Adobe Addresses Critical Vulnerabilities Across Creative Suite Products
China Alleges U.S. Behind 2020 Cyberattack Targeting Bitcoin Miners
SAP Patches Critical SQL Anywhere Monitor Flaw With Hardcoded Credentials
Doctor Alliance Breach Exposes 1.2 Million Patient Records Online
Data Breach at Thayer Hotel West Point Exposes Over 33,000 Guest Records
APT37 Exploits Google Find Hub to Remotely Wipe Android Devices
Intel Engineer Allegedly Walks off With 18,000 Confidential Files in Data Theft Lawsuit