Cyber Security
Implementing Access Reviews to Enhance Security in Microsoft 365
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Endesa Cyberattack Results in Customer Data Exposure
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
Meta Addresses Security Vulnerability in Instagram Password Resets
AI and Security: Block’s CISO Discusses AI Agents’ Potential
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Target’s Source Code Allegedly Exposed in Cyber Breach
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
California Privacy Protection Agency Takes Action Against Datamasters for Unauthorized Data Sales
Instagram Data Breach Affects 17.5 Million Users: Security Implications Explored
U.S. Immigration and Customs Enforcement’s Surveillance Tactics Scrutinized
UK Government Faces Rising Cybersecurity Concerns Amid Legal Aid and Foreign Office Attacks
Ireland Recalls Thousands of Passports Due to Software-Induced Printing Defect
BreachForums Re-emerges Only to Fall Victim to Data Breach
Anthropic Responds to Viral Allegations of Account Bans
CISA Streamlines Security Measures With Vulnerability Catalog Adoption
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Email Security’s True Challenge: Evaluating Post-access Threats
APT28 Intensifies Credential Harvesting on Nuclear and Energy Sectors
NSA Announces Tim Kosiba as New Deputy Director
Threat Actors Target Vulnerable Proxy Servers in the Hunt for LLM Services
Illinois Department’s Database Error Leads to Massive Data Exposure
Trend Micro Addresses Vulnerabilities in Apex Central, Mitigates Security Risks
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Vibe Hacking: How AI is Transforming Cybercrime’s Landscape
Logitech’s macOS Applications Disrupted by Expired Code-Signing Certificate
Ni8mare Vulnerability Threatens N8N Workflow Automation Platform
OwnCloud Urges Users to Implement Multi-factor Authentication for Enhanced Security
Navigating the Challenges of Fileless Malware in Cybersecurity

Sorry, we couldn't find any posts. Please try a different search.

Microsoft Enhances Secure Boot Certificates for Windows 11
Application Security
Microsoft Enhances Secure Boot Certificates for Windows 11

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Telegram's Proxy Link Vulnerability Exposes IP Addresses
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Application Security
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
BreachForums Re-emerges Only to Fall Victim to Data Breach
Application Security
BreachForums Re-emerges Only to Fall Victim to Data Breach
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Application Security
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
This Week in Cybersecurity: 8th Jan – 12th Jan – SEC X Account Hack Creates Chaos
US SEC X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet The U.S. Securities and Exchange Commission’s X account experienced a security breach. As ...
SEC Account Hack Again Catches News Spotlight Amidst Security Concerns
The recent SEC account hack on X has raised fresh concerns regarding the security of the social media platform. These concerns have been amplified since ...
10 Major Data Breaches and Cyber Attacks 2023
Cyber attacks today have become a daily occurrence in today’s hyperconnected world. With more users and devices getting online each day, there is an ever-increasing ...
Ivanti Critical EPM Bug Allows Hackers to Hijack EPM Devices
Ivanti has successfully addressed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM). The Ivanti critical EPM bug had the potential ...
US SEC’s X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet
The U.S. Securities and Exchange Commission’s X account experienced a security breach. As a result, a false Bitcoin ETF Approval Tweet on security exchanges was ...
LockBit Ransomware Claims Capital Health Attack, Threatens to Leak Sensitive Data
The LockBit ransomware group has acknowledged their involvement in the Capital Health attack that took place in November 2023. The adversaries are now issuing a ...
Ukrainian Hacker Group Takes Down Moscow ISP as a Revenge for Kyivstar Cyber Attack
A Ukrainian hacker group, believed to be connected to Ukraine’s intelligence took and carried out a destructive attack on the servers of a Moscow-based internet ...
Hackers Can Now Access Your Google Accounts Without Password
Security researchers have recently discovered a sophisticated hacking technique that enables cyber criminals to gain unauthorized entry into individuals’ Google accounts without passwords. In-depth analysis ...
CISA Identifies Actively Exploited Bugs in Chrome and Excel Parsing Library
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified two Actively Exploited Bugs in Chrome and Excel Parsing Library and has included them in ...
Mandiant Security Breached: Account on X Hacked for Crypto Scam
The X account of Mandiant, an American cybersecurity firm and subsidiary of Google, was compromised. The Mandiant Security Breach resulted in an unauthorized individual to ...
Russian Sandworm Hackers Lurked Inside KyivStar Systems in KyivStar Cyber Attack
The Russian Sandworm hackers successfully breached Kyivstar and stayed inside KyivStar systems for several months. Ukraine’s largest telecommunications service provider, in December, resulting in the ...
HealthEC Data Breach Exposes Data of Almost 4.5 Million Patients
HealthEC LLC, a New Jersey-based provider of health management solutions, has suffered a major data breach that exposed personally identifiable information of individuals who received ...
Orbit Chain Lost $86 Million in a Cross-Chain Bridge Exploit Attack
Orbit Chain Lost $86 Million in cryptocurrency, specifically Ether, Dai, Tether, and USD Coin. Orbit Chain is a blockchain platform that serves as a versatile ...
Victoria Court Hack Exposes Victorian Court Recordings: Sensitive Witness Testimonies Stolen
The Victoria Court Hack resulted in hackers gaining unauthorized access to the audio-visual network and stealing Victorian court recordings. The Victorian Court Cyber attack is ...
Ohio Lottery Cyber Attack: Another Cybersecurity Incident Claimed by DragonForce Ransomware
The Ohio Lottery cyber attack on Christmas Eve resulted in the shutdown of certain internal applications. While the exact details of the cybersecurity incident and ...
Eagers Automotive Cyberattack Forces the Company to Suspend Trades
Eagers Automotive cyberattack lead to a temporary suspension of trading on the stock exchange. Eagers Automotive operates a vast network of car dealerships across Australia ...
Black Basta Decryptor Recovers Files Exploiting a Ransomware Flaw
A team of researchers has developed a Black Basta decryptor that takes advantage of a vulnerability in the Black Basta ransomware. The Black Basta Ransomware ...
Google Settles $5 Billion Lawsuit for Tracking Users in Incognito Mode
Google settles $5 billion lawsuit that revolved around Google’s Chrome browser’s “incognito” mode. The plaintiffs argued that this feature misled users into thinking their online ...
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
In the complex realm of cyber warfare, the Albanian Parliament and One Albania Telecom have made the headlines. As the cyberattack targets Albanian parliament, Albania ...
Anna Jaques Hospital Cyberattack on Christmas Day Disrupts Medical Record Systems
On Christmas Day, Anna Jaques Hospital in Newburyport, MA, was targeted by a cyberattack. The Anna Jaques Hospital Cyberattack on Christmas Day resulted in an ...