Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Russian Sandworm Hackers Lurked Inside KyivStar Systems in KyivStar Cyber Attack
News
Russian Sandworm Hackers Lurked Inside KyivStar Systems in KyivStar Cyber Attack
The Russian Sandworm hackers successfully breached Kyivstar and stayed inside KyivStar systems for several months. Ukraine’s largest telecommunications service provider, ...
HealthEC Data Breach Exposes Data of Almost 4.5 Million Patients
News
HealthEC Data Breach Exposes Data of Almost 4.5 Million Patients
HealthEC LLC, a New Jersey-based provider of health management solutions, has suffered a major data breach that exposed personally identifiable ...
Orbit Chain Lost $86 Million in a Cross-Chain Bridge Exploit Attack
News
Orbit Chain Lost $86 Million in a Cross-Chain Bridge Exploit Attack
Orbit Chain Lost $86 Million in cryptocurrency, specifically Ether, Dai, Tether, and USD Coin. Orbit Chain is a blockchain platform ...
Victoria Court Hack Exposes Victorian Court Recordings: Sensitive Witness Testimonies Stolen
News
Victoria Court Hack Exposes Victorian Court Recordings: Sensitive Witness Testimonies Stolen
The Victoria Court Hack resulted in hackers gaining unauthorized access to the audio-visual network and stealing Victorian court recordings. The ...
Ohio Lottery Cyber Attack: Another Cybersecurity Incident Claimed by DragonForce Ransomware
News
Ohio Lottery Cyber Attack: Another Cybersecurity Incident Claimed by DragonForce Ransomware
The Ohio Lottery cyber attack on Christmas Eve resulted in the shutdown of certain internal applications. While the exact details ...
Eagers Automotive Cyberattack Forces the Company to Suspend Trades
Security Spotlight
Eagers Automotive Cyberattack Forces the Company to Suspend Trades
Eagers Automotive cyberattack lead to a temporary suspension of trading on the stock exchange. Eagers Automotive operates a vast network ...
Black Basta Decryptor Recovers Files Exploiting a Ransomware Flaw
Blog
Black Basta Decryptor Recovers Files Exploiting a Ransomware Flaw
A team of researchers has developed a Black Basta decryptor that takes advantage of a vulnerability in the Black Basta ...
Google Settles $5 Billion Lawsuit for Tracking Users in 'Incognito' Mode
Cybersecurity
Google Settles $5 Billion Lawsuit for Tracking Users in Incognito Mode
Google settles $5 billion lawsuit that revolved around Google’s Chrome browser’s “incognito” mode. The plaintiffs argued that this feature misled ...
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
Cybersecurity
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
In the complex realm of cyber warfare, the Albanian Parliament and One Albania Telecom have made the headlines. As the ...
Anna Jaques Hospital Cyberattack on Christmas Day Hits Medical Record Systems
News
Anna Jaques Hospital Cyberattack on Christmas Day Disrupts Medical Record Systems
On Christmas Day, Anna Jaques Hospital in Newburyport, MA, was targeted by a cyberattack. The Anna Jaques Hospital Cyberattack on ...
Steam Game Mod Breached to Push Password-Stealing Malware
News
Steam Game Mod Breached to Push Password-Stealing Malware
On Christmas Day, the fan expansion called “Downfall” for the indie strategy game Slay the Spire was compromised in the ...
APT28 Hacking Collective Targets Ukraine with MASEPIE Malware – Ukraine’s CERT-UA Issues Security Alert
Security Spotlight
APT28 Hacking Collective Targets Ukraine with MASEPIE Malware – CERT-UA Issues Security Alert
The Computer Emergency Response Team (CERT) of Ukraine has issued a warning regarding a recent phishing campaign. The threat actor ...
Lockbit Ransomware Disrupts Healthcare Systems at German KHO Network of Hospitals
Ransomware
Lockbit Ransomware Disrupts Healthcare Systems at German KHO Network of Hospitals
Katholische Hospitalvereinigung Ostwestfalen (KHO), a hospital network in Germany, has confirmed that the recent service disruptions experienced at three of ...
First American Cyber Attack Disrupts Closings: No New Updates from the American Title Insurance Firm
Security Spotlight
First American Cyber Attack Disrupts Closings: No New Updates from the American Title Insurance Firm
The nation’s second-largest title insurer, and its subsidiaries are currently experiencing an ongoing system outage following the First American cyber ...
Liberty Hospital Cyber Attack Forces Kansas City to Transfer Patients and Reschedule Appointments
Ransomware
Liberty Hospital Cyber Attack Forces Kansas City to Transfer Patients and Reschedule Appointments
A hospital in the vicinity of Kansas City, Missouri, is facing challenges in delivering patient care due to a cyberattack ...
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Security Spotlight
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Yakult Australia, the manufacturer of a popular probiotic milk drink, recently faced a cyber incident. The Yakult Cyber Incident has ...
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
Security Spotlight
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
According to Barracuda, a leading network and email security firm, they have successfully applied remote patches to all active Barracuda ...
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Security Spotlight
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Integris Health, Oklahoma’s largest not-for-profit health network, has recently experienced a cyberattack resulting in the theft of patient data. The ...
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Security Spotlight
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut ...
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Security Spotlight
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Vanilla Tempest Hackers Use INC Ransomware to Target Healthcare
A recent report from Microsoft reveals that a ransomware affiliate known as Vanilla Tempest has been observed using the INC ransomware to target U.S. healthcare organizations.
Compass Group Hit by Medusa Ransomware
The Compass Group, a leading global food services company headquartered in Sydney, has confirmed a significant cyberattack targeting its systems.
German Radio Station Hit by Cyberattack: “Emergency Tape” Plays On as Hackers Demand Ransom
Radio Geretsried, a local radio station in Bavaria, has been forced to broadcast music from emergency backups after a ransomware attack crippled its systems.
Hunters International Ransomware Claims Breach of ICBC London, Threatens Data Leak
The ransomware group Hunters International has claimed responsibility for a data breach at the London branch of the Industrial and Commercial Bank of China (ICBC), ...
Data Breaches Surge to Three-Year High in Australia: A Growing Threat to Privacy and Security
Data Breaches Surge to Three-Year High in Australia
23andMe to Pay $30 Million in Class Action Settlement for Data Breach Exposing 6.4 Million Customers
DNA testing giant 23andMe has agreed to pay $30 million to settle a class-action lawsuit stemming from a data breach that compromised the personal ...
FlyCASS Cockpit Security Breach: A Case Study of SQL Injection and its Impact on Critical Infrastructure
The recent discovery of a critical SQL injection vulnerability in the FlyCASS cockpit access security system should serve as a stark reminder for enterprise businesses: cybersecurity ...
This Week In Cybersecurity: 9th September to 13th September
Avis has reported a data breach involving unauthorized access to its business application, exposing customer names and potentially sensitive information.
What is a Whaling Phishing Attack?
Whaling phishing, also known simply as whaling, is a highly targeted and sophisticated form of phishing attack that specifically targets high-level executives within an organization, such ...
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
A critical vulnerability, CVE-2024-40711, affecting Veeam Backup & Replication (VBR), has emerged as a significant threat to enterprises, with ransomware gangs poised to exploit it for data ...
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has emerged, posing a significant threat to businesses worldwide. The group has already claimed 19 victims on its ...
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
A major credit card data breach has impacted nearly 1.7 million individuals, raising concerns about the security of sensitive financial information.
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
A novel acoustic attack named ‘PIXHELL’ can leak secrets from audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.
Indodax Hack: A Major Blow to Indonesian Crypto Security
Hackers targeted Indodax's hot wallet, which is a cryptocurrency wallet that is connected to the internet and used for frequent transactions.
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
A critical severity vulnerability has been discovered in LiteSpeed Cache, a popular caching plugin used by over 6 million WordPress sites. The flaw, tracked as ...
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
GRU Unit 29155: A Growing Threat to Global Security
This Week In Cybersecurity: 2nd September to 6th September, VK Data Leak Exposes 390 Million Users
VK Data Leak, Voldemort Malware Abusing Google Sheets, DICK’S Sporting Goods Cyberattack and more.
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
This vulnerability, tracked as CVE-2024-7591, allows attackers to remotely execute commands on vulnerable devices, posing a significant risk to organizations relying on these products.
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Car Rental Giant Avis Suffers Data Breach, Exposing Customer Information
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Ransomware attacks targeting critical national infrastructure (CNI) organizations have reached alarming heights, with costs soaring to unprecedented levels. A new report from Sophos reveals a ...