Cyber Security
React2Shell Exploit Continues to Deliver Undetected Malware Families
Microsoft Advances Teams Security With New Suspicious Traffic Analysis Feature
Microsoft Faces Criticism Over Unresolved .NET Vulnerability
.NET Framework Vulnerability SOAPwn: Impact on Enterprise Applications
Teen Hacker Arrested in Spain for Major Data Breach Scheme
Satellite Signal Interruption Causes Porsche Immobilization in Russia
Ivanti Urges Immediate Patch for Endpoint Manager Vulnerability
Prime Security Secures $20 Million to Advance AI-Powered Security Tools
Microsoft Appoints New Operating CISOs to Enhance AI-Driven Cyberdefense
Fortinet Releases Fixes for Critical Vulnerabilities Affecting FortiOS and Other Products
Adobe’s Comprehensive Security Update Targets Massive Vulnerabilities Array
Microsoft Enhances PowerShell Security With Script Warning Functionality
Microsoft Patches Critical Zero-Day Vulnerability in Windows
Google Introduces Layered Defenses in Chrome to Combat Prompt Injection Vulnerabilities
Microsoft Works to Mitigate Copilot Access Issues in Europe
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Proofpoint Completes Acquisition of Hornetsecurity: A Strategic Move in Cybersecurity
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Mirai-based Broadside Botnet Exploits TBK Vision DVRs in Maritime Sector
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
EtherRAT Malware Implant Utilizes Linux Persistence Mechanisms in React2Shell Attack
OpenAI Responds to ChatGPT Plus Subscription Controversy Over Ads
Portugal Establishes Legal Safe Harbor for Ethical Hackers
Clickjacking Tactics Exploit SVG and CSS: Understanding the New Threat
IDEsaster: Uncovering Security Flaws in AI-Powered IDEs
FBI Warns of Social Media Images Exploited for Virtual Kidnapping Scams
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
India Reverses Decision on Mandating Preinstalled Cybersecurity App on Smartphones
Virginia Brothers Face Conspiracy Charges Over Alleged Data Theft and Database Destruction

Sorry, we couldn't find any posts. Please try a different search.

Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data
Application Security
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data
Docker Hub Data Exposure Puts Thousands of Containers at Risk
Data Security
Docker Hub Data Exposure Puts Thousands of Containers at Risk
React2Shell Exploit Continues to Deliver Undetected Malware Families
Cybersecurity
React2Shell Exploit Continues to Deliver Undetected Malware Families
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Application Security
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Yakult Australia, the manufacturer of a popular probiotic milk drink, recently faced a cyber incident. The Yakult Cyber Incident has impacted both their IT systems ...
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
According to Barracuda, a leading network and email security firm, they have successfully applied remote patches to all active Barracuda Email Security Gateway (ESG) appliances ...
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Integris Health, Oklahoma’s largest not-for-profit health network, has recently experienced a cyberattack resulting in the theft of patient data. The Integris Health data breach led ...
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut down its IT systems to ...
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on GTA leak channel on the ...
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject SQL command(s) via the vulnerable ...
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. Ace Hardware Cyber Attack 2023 ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...