Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Blog
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations ...
Mintlify Data Breached Through Compromised GitHub Tokens
News
Mintlify Data Breached Through Compromised GitHub Tokens
Mintlify Data Breached, Revokes Compromised Github Tokens and Implements New Security Measures! Mintlify recently encountered a data breach that led ...
CISA Shares Advisory on Defending Critical Infrastructure Against Volt Typhoon
News
CISA Shares Advisory on Defending Critical Infrastructure Against Volt Typhoon
The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), ...
Iranian Hackers Claimed Breach at Dimona Nuclear Facility in Israel
News
Iranian Hackers Claimed Breach at Dimona Nuclear Facility in Israel
A group of Iranian hackers claim to have successfully breached the networks of the Dimona nuclear facility in Israel’s Negev ...
Hackers Breaching US Water Systems, White House and EPA Issues Warning
News
Hackers Breaching US Water Systems, White House and EPA Issues Warning
U.S. National Security Advisor, Jake Sullivan, and Environmental Protection Agency (EPA) Administrator, Michael Regan, issued a joint letter to governors, ...
Chinese APT ‘Earth Krahang’ Breaches 70 Organizations Across 45 Countries
News
Chinese APT ‘Earth Krahang’ Breaches 70 Organizations Across 45 Countries
The Earth Krahang hacking group has been conducting a large-scale cyber espionage campaign since early 2022 according to Trend Micro. ...
United Healthcare Pays $2 Billion After Change Healthcare Cyber Attack, Health Insurers Split Over the Relief
News
United Healthcare Pays $2B After Change Healthcare Cyber Attack, Health Insurers Split Over the Relief
Insurance industry executives and US health officials are optimistic that the impact of the Change Healthcare cyber attack is gradually ...
Enhanced OSINT with DarkGPT, A Tool to Detect Leaked Databases
Blog
Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases
A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of ...
Timeline of Change Healthcare Cyberattack
Blog
Timeline of Change Healthcare Cyberattack
On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group’s Change Healthcare, causing severe disruption to the ...
CISA Hacked, Key Systems Forced Offline
News
CISA Hacked, Key Systems Forced Offline
Cybersecurity and Infrastructure Security Agency (CISA), which safeguards networks and systems across federal, state, local, tribal, and territorial governments, appears ...
Fujitsu Hacked with Malware, Company Warns of Data Breach
News
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer ...
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
News
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
AT&T has responded to a recent incident where a hacker claimed to have leaked a large amount of data on ...
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
News
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
The International Monetary Fund (IMF) has announced that it is currently investigating a cybersecurity breach that resulted in the compromise ...
This Week in Cybersecurity – 11th March to 15th March: Class Action Lawsuits Filed Against UnitedHealth Data Breach
News
This Week in Cybersecurity – 11th March to 15th March: Class Action Lawsuits Filed Against UnitedHealth Data Breach
Class Action Lawsuits Filed against UnitedHealth data breach, Acer Data Breached. Equilend and Stanford suffers ransomware attack, Play Ransomware leaks ...
StopCrypt Ransomware AKA STOP Djvu, Now Evades Detection
News
StopCrypt Ransomware AKA STOP Djvu, Now Evades Detection
A new variant of the StopCrypt ransomware, also known as STOP, has been detected in the wild. This variant utilizes ...
Another Critical Fortinet RCE Flaw Exploited by Nation State Actors
News
Another Critical Fortinet RCE Flaw Exploited by Nation State Actors
CVE-2024-48788, like many others, is another critical Fortinet RCE flaw will is an attractive target for nation-state backed actors. Fortinet ...
A Definitive Guide to Cybersecurity Compliance
Blog
Cybersecurity Compliance: A Definitive Guide
In an era defined by digital transformation and data-driven operations, cybersecurity has become paramount. Organizations across the globe face an ...
Elevate Your Security: A Guide to Essential Cyber Threat Intelligence Tools
Blog
Advanced Data Security: Threat Intelligence Tools Essential Guide
As the digital realm becomes increasingly complex, organizations are recognizing the importance of arming themselves with advanced tools and insights ...
Health Dept Office of Civil Rights Starts Probe into UnitedHealth Hack
News
Health Dept Office of Civil Rights Starts Probe into UnitedHealth Hack
The U.S. Department of Health and Human Services (HHS) is conducting an investigation into the UnitedHealth Hack caused by the ...
6 Class Action Lawsuits Filed Against UnitedHealth Data Breach, More to Follow
News
6 Class Action Lawsuits Filed Against UnitedHealth Data Breach, More to Follow
UnitedHealth Group is facing multiple class action lawsuits related to the UnitedHealth Data Breach at its payment processing unit, Change ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Starbucks and Other Retailers Face Widespread Disruption After Ransomware Attack on Tech Provider
A ransomware attack targeting a tech provider crippled Starbucks and other retailers, causing widespread operational disruptions and highlighting cybersecurity vulnerabilities.
Blue Yonder Ransomware Attack Cripples Grocery Store Supply Chains
Blue Yonder ransomware attack disrupts grocery store supply chains across the UK, impacting major retailers and highlighting vulnerabilities in critical infrastructure.
BianLian Ransomware Updated Advisory: CISA and Australian Agencies Detail Evolving Tactics and Techniques
US and Australian cybersecurity agencies have issued an updated advisory on the BianLian ransomware group, detailing new tactics, techniques, and indicators of compromise (IoCs) following ...
Thala Recovers $25.5 Million After Security Breach
DeFi protocol Thala recouped $25.5 million stolen in a security breach by negotiating a $300,000 bounty with the attacker, showcasing effective crisis management in the ...
Bojangles’ Restaurant Data Breach Exposes Sensitive Customer Information
Bojangles' Restaurants suffered a significant data breach between February and March 2024, exposing the personal information of tens of thousands of customers. The Murphy Law ...
Columbus Data Leak Has Exposed Half a Million Residents City Offers Limited Protection
Columbus data leak has compromised the personal information of an estimated 500,000 residents. The city's response has been criticized for offering credit monitoring to only ...
BianLian Ransomware Shifts Focus Exclusively to Data Theft, CISA Warns
Chinese state-sponsored hackers are using a new Linux backdoor called WolfsBane, a sophisticated malware tool that includes a dropper, launcher, and backdoor, alongside a modified ...
WolfsBane Linux Malware Unleashed by Chinese Hackers
Chinese state-sponsored hackers are using a new Linux backdoor called WolfsBane, a sophisticated malware tool that includes a dropper, launcher, and backdoor, alongside a modified ...
This Week In Cybersecurity: 18th to 22nd November
This Week In Cybersecurity: 18th to 22nd November
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
The HeptaX cyberattack represents a sophisticated, multi-stage threat targeting enterprises, particularly in healthcare. This in-depth analysis details the attack chain, technical analysis, and crucial mitigation ...
Finastra Data Breach: 400GB of Sensitive Financial Data Compromised
Finastra, serving 45 of the world's top 50 banks, is investigating a potential data breach involving its secure file transfer platform. A threat actor claimed ...
Stop and Shop Cyberattack Leaves Shelves Empty Ahead of Thanksgiving
A cyberattack on Stop & Shop and Hannaford, owned by Ahold Delhaize, has caused empty shelves just a week before Thanksgiving, impacting holiday shopping.
French Hospital Cyberattack Exposes Sensitive Data of 750,000 Patients
A major hospital data breach in France exposed the medical records of 750,000 patients. The French hospital cyberattack highlights the vulnerability of healthcare systems and ...
23andMe’s Data Breach Settlement: Are you Eligible for $10,000?
Millions of 23andMe users were affected by a data breach, leading to a $30 million settlement offering payouts up to $10,000 for those who experienced ...
Facebook Data Breach Compensation Awarded: Victims Eligible for €100
A German court has ruled that victims of the massive 2021 Facebook data breach are eligible for €100 in compensation, even without proof of misuse. ...
Hot Topic Data Breach Exposes Personal Information of 56 Million Customers
Hot Topic data breach exposed the personal information of over 56 million customers, including addresses, phone numbers, and partial credit card data. Hot Topic remains ...
Manufacturers Under Cyberattack: An Unprecedented Enterprise Cyberthreat
The manufacturing sector is experiencing an unprecedented wave of cyberattacks, surpassing all other industries in frequency. This blog delves into the reasons behind this alarming ...
AnnieMac Data Breach: Over 170,000 Customers Impacted by August Cyberattack
AnnieMac Home Mortgage suffered a data breach in August 2024, exposing the names and Social Security numbers of over 170,000 customers. The company is providing ...
Bunnings Data Breach: Facial Recognition System Violates Customer Privacy
Bunnings' use of facial recognition technology resulted in a significant privacy breach, impacting potentially hundreds of thousands of customers, according to the Australian privacy commissioner.
Maxar Space Systems Data Breach: Employee Data Compromised
Maxar Space Systems suffered a data breach exposing employee personal data, including Social Security numbers and addresses. The hacker, using a Hong Kong-based IP, accessed ...