Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
This Week in Cybersecurity – April 15th to April 19th: Giant Tiger Data Breached
Giant Tiger Data Breached, RansomHub Ransomware Leaks Change Healthcare data, Cerebral Settles Facebook Pixel Data Case at $7 Million  Giant Tiger Data Breached, 2.8M Records ...
Identity Management Giant Okta Warns of Credential Stuffing Attacks
Identity and access management provider Okta has warned customers of a significant uptick in credential stuffing attacks targeting their accounts in recent weeks. Credential stuffing ...
Kaiser Data Breach May Have Exposed Data of Over 13 Million Patients
The Kaiser Permanente data breach leaked personal information on around 13.4 million individuals across the United States. Details of the Kaiser Data Breach 2024 In ...
Georgia County Hit with Ransomware Attack Disrupting Voter Registration System
On April 22nd, 2024, Coffee County, Georgia fell victim to a sophisticated ransomware attack that crippled many of the county’s computer systems and disrupted access ...
Patients Data Exposed in Phishing Attack Targeting LA County Health Services
The Los Angeles County Department of Health Services (LACDHS) recently disclosed a major data breach impacting an unknown number of patients after their personal and ...
This Week in Cybersecurity: April 22 – April 26, UnitedHealth Group Pays Ransom
UnitedHealth Group Pays Ransom, Hackers leak Code of El Salvador’s Chivo Wallet, Volkswagen Breached, Synlab Italia hit by ransomware, Frontier Communications Cyberattack Disrupts IT Systems ...
ArcaneDoor Hackers Exploit Cisco Zero-Days to Breach Government Networks
Cisco has warned of a sophisticated state-backed hacking group known as UAT4356 exploiting two zero-day vulnerabilities in Cisco firewall devices since November 2023 to breach ...
Hackers leak Code of El Salvador’s Official State Bitcoin Wallet “Chivo”
In early April, the hacker group CiberInteligenciaSV leaked the complete database of Chivo users. Since then, they have been gradually releasing the code of the ...
What are Insider Threats: Preventing Cyber Threats from Malicious Insiders
Organizations face cybersecurity threats both from external sources and from within their own ranks. Insider threats, in particular, have become a growing concern for businesses ...
UnitedHealth Group Confirms Ransom Payment to Prevent Data Leak
The UnitedHealth Group has recently acknowledged that it made a payment to cybercriminals to safeguard sensitive data that was stolen during the Optum ransomware attack ...
Hackers Exploit eScan Antivirus Updates to Drop GuptiMiner Malware
North Korean hackers have recently been utilizing the updating mechanism of eScan antivirus software to infiltrate large corporate networks. They achieve this by deploying GuptiMiner ...
Volkswagen Breached by Chinese Hackers
Volkswagen Group has experienced a huge security breach, with reports indicating that over 19,000 intellectual property documents were stolen by attackers. German media suggests that ...
Synlab Italia Forced to Halt Operations After a Ransomware Attack
Synlab Italia, a subsidiary of the global Synlab group, has temporarily halted its medical diagnostic and testing services due to a ransomware attack. Synlab Ransomware ...
APT28 Uses GooseEgg to Exploit Windows Flaw
Microsoft has issued a warning regarding the activities of the APT28 threat group. APT28 is currently exploiting a vulnerability in the Windows Print Spooler to ...
Frontier Communications Cyberattack Disrupts IT Systems
Frontier Communications, a prominent American telecom provider known for its high-speed internet services, recently experienced a cyberattack. To contain the breach, certain systems were temporarily ...
Akira Ransomware Extorted $42 Million from 250+ Victims: FBI and CISA Issues Joint Advisory
According to a joint advisory from the FBI, CISA, Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cybersecurity Centre (NCSC-NL), the Akira ransomware operation ...
FIN7 Attempts Phishing at American Automaker’s IT Staff
The financially motivated threat actor known as FIN7 recently executed a targeted attack against a prominent U.S. car manufacturer. Their modus operandi involved employing spear-phishing ...
8Base Ransomware Claims Breach on Atlantic States Marine Fisheries Commission
A fisheries management organization on the East Coast is currently addressing a cyber incident in response to claims made by the 8Base ransomware gang regarding ...
Cerebral Settles Suit at $7 Million in Facebook Pixel Data Leak Case
The U.S. Federal Trade Commission has recently reached a settlement with telehealth firm Cerebral. As part of the settlement, Cerebral has agreed to pay $7,000,000 ...
UnitedHealth Reports that Change Healthcare Cyberattack Caused $872 Million Loss
UnitedHealth Group has disclosed that its first-quarter earnings were significantly affected by a ransomware attack that disrupted the U.S. healthcare system starting in February. The ...