Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Security Spotlight
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject ...
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ransomware
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
Ransomware
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
Cybersecurity
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Cybersecurity
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given ...
OilRig APT Uses Downloader Malware for Cyberespionage
Cybersecurity
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
Cybersecurity
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Cybersecurity
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Cybersecurity
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ...
Canadian Government's Data Security Compromised Affecting its Contractors
Cybersecurity
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) ...
Security Spotlight
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Clearview AI Fined €30.5 Million for Unlawful Data Collection
Dutch Data Protection Authority Takes Action Against Clearview AI Facial Recognition Company
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
HikkI-Chan Claims Responsibility for VK Data Breach
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
North Korean threat actors, known for their sophisticated cyberattacks, have been targeting job seekers with a fake Windows video conferencing application disguised as FreeConference.com.
What is a DDoS Attack – A Complete Guide
This comprehensive guide delves into the intricacies of DDoS attacks, their mechanisms, common types, and effective mitigation strategies, empowering enterprise businesses to safeguard their online ...
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
Security Camera Vendor Faces FTC Action for Lax Security Practices
CBIZ Discloses Data Breach Affecting Nearly 36,000 Individuals
CBIZ Benefits & Insurance Services (CBIZ), a leading provider of financial, benefits, and insurance services, has disclosed a data breach that impacted nearly 36,000 individuals
TfL Cyberattack: Transport for London Under Attack
Transport for London (TfL), the city's transportation authority, is currently investigating an ongoing cyberattack. While the attack is ongoing, TfL has assured the public that ...
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
BlackSuit Ransomware disrupts software vendor, Cyberattack on airport, nonprofit and government websites, credit union customers impacted by data breach.
DICK’S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
A Major Data Breach Impacts the Retail Giant DICK'S Sporting Goods in a Cyberattack
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
North Korean hackers have successfully exploited a recently patched Google Chrome zero-day vulnerability (CVE-2024-7971) to deploy the FudModule rootkit.
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
A new malware campaign has emerged, targeting organizations across the globe with a previously undocumented backdoor named "Voldemort."
Park ‘N Fly Data Breach Impacts Nearly a Million Customers: Sensitive Information Compromised in Cyberattack
Park 'N Fly, a Canadian airport parking service, has confirmed a data breach affecting nearly a million customers. The cyberattack, occurring between July 11-13, 2024, ...
Cucamonga Valley Water District Hit by Ransomware Attack
The Cucamonga Valley Water District (CVWD) is investigating a ransomware attack that paralyzed its phone system earlier this month, preventing customers from making phone payments. ...
US Marshals Service Disputes Ransomware Gang’s Breach Claims
US Marshals Service Denies Recent Breach
BlackSuit Ransomware Exposes Data of 950,000 Individuals in Software Vendor Breach
A Major Data Breach Hits Atlanta-Based Software Solutions Provider, BlackSuit Ransomware Exposes Data of 950,000.
McDonald’s Instagram Hacked in $700,000 Fake Crypto Scheme
A brazen cyberattack targeting McDonald's social media accounts has resulted in a $700,000 loss for unsuspecting investors.
Connecticut Nonprofit Pays $1 Million Ransom After Sophisticated Cyberattack
A Connecticut-based nonprofit, the National Association for Amateur Radio (ARRL), has fallen victim to a sophisticated cyberattack that cost them $1 million in ransom.
Sea-Tac Airport Hit by Cyberattack, Disrupting Services and Websites
Airport and Port of Seattle Systems Down, Baggage Handling Disrupted after Sea-Tac Airport faces Cyberattack.
Patelco Credit Union Suffers Ransomware Data Breach, Affecting 726,000 Customers
Patelco Credit Union Faces Ransomware Attack and Data Theft
French Government Websites Under Siege Following Telegram CEO Arrest
A Cyberattack in the Wake of Durov's Detention