Cyber Security
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Clearview AI Fined €30.5 Million for Unlawful Data Collection
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
DICK’S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
French Government Websites Under Siege Following Telegram CEO Arrest
This Week in Cybersecurity: 19th August to 23rd August, Halliburton Hit by Cyberattack
QNAP Bolsters NAS Security with Enhanced Ransomware Protection in Latest QTS Update
This Week in Cybersecurity: 12th August to 16th August, National Public Data Breach Exposed Personal Information of Billions
NetSuite Stores Leak: Sensitive Customer Data Exposed due to Access Control Misconfiguration
APT31 and APT27 Target Russian Organizations in Sophisticated Cyberespionage Campaign
This Week in Cybersecurity: 05th August to 09th August, National Public Data Breach
ADT Data Breach, Customer Information Impacted in Major Security Incident
This Week in Cybersecurity: 22nd July to 26th, Microsoft CrowdStrike IT Outage Affects 8.5 Million
This Week in Cybersecurity: 15th July to 19th July  
Microsoft CrowdStrike IT Outage Affected 8.5 Million Windows Devices
AI Cybersecurity: Leveraging Generative AI to Combat Threats & Data Breaches
Enterprise Attack Surface Management (ASM) and Best Security Practices
RansomHub Ransomware Group Exploits ZeroLogon Vulnerability to Spread Malware
This Week in Cybersecurity, 27th May to 31st May: City of Helsinki Data Breach
This Week in Cybersecurity: 20th May – 24th May, American Radio Relay League Cyberattack Disrupts Services
Banking Malware Grandoreiro is Back After Police Disruption to Target Banks Globally
This Week in Cybersecurity: 13th to 17th May, Dell Data Breached
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

  • All
  • Blog
  • Cybersecurity
  • News
  • Phishing
  • Ransomware
  • Resources
  • Security Spotlight
Finland Says APT31 Behind the 2021 Parliament Breach
The Finnish Police have officially confirmed that the APT31 hacking group, which has ties to the Chinese Ministry of State Security (MSS), was responsible for ...
Inc Ransom Threatens to Leak 3 Terabytes of Data From NHS Patient Records
The INC Ransom extortion gang has issued a threat to release three terabytes of data, claiming to have obtained it by breaching the National Health ...
CISA Issues Advisory to Devs to Address SQL Injection Vulnerabilities
CISA and the FBI have advised technology manufacturing company executives to conduct thorough reviews of their software and take necessary measures to address SQL injection ...
APT29 Russian Hackers Use WineLoader Malware to Target German Political Parties
The APT29 group is employing phishing attacks to distribute a backdoor called WineLoader malware. This malicious software enables the hackers to remotely access compromised devices ...
Local College in Illinois County Affected by Medusa Ransomware Attack
Henry County, located on the border of Illinois and Iowa, has recently experienced a Medusa ransomware attack. The cyberattack, which began on March 18, has ...
POC Exploit Released for Fortinet RCE Bug, Patch Now!
A critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have ...
This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!
CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the ...
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations approach data and network security. ...
Mintlify Data Breached Through Compromised GitHub Tokens
Mintlify Data Breached, Revokes Compromised Github Tokens and Implements New Security Measures! Mintlify recently encountered a data breach that led to the exposure of GitHub ...
CISA Shares Advisory on Defending Critical Infrastructure Against Volt Typhoon
The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and various other domestic and ...
Iranian Hackers Claimed Breach at Dimona Nuclear Facility in Israel
A group of Iranian hackers claim to have successfully breached the networks of the Dimona nuclear facility in Israel’s Negev desert. Israeli cybersecurity teams are ...
Hackers Breaching US Water Systems, White House and EPA Issues Warning
U.S. National Security Advisor, Jake Sullivan, and Environmental Protection Agency (EPA) Administrator, Michael Regan, issued a joint letter to governors, warning them about the increasing ...
Chinese APT ‘Earth Krahang’ Breaches 70 Organizations Across 45 Countries
The Earth Krahang hacking group has been conducting a large-scale cyber espionage campaign since early 2022 according to Trend Micro. Government agencies have been their ...
United Healthcare Pays $2B After Change Healthcare Cyber Attack, Health Insurers Split Over the Relief
Insurance industry executives and US health officials are optimistic that the impact of the Change Healthcare cyber attack is gradually diminishing, and the crisis is ...
Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases
A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of open-source intelligence (OSINT) gathering. DarkGPT ...
Timeline of Change Healthcare Cyberattack
On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group’s Change Healthcare, causing severe disruption to the financial operations of hospitals, insurers, ...
CISA Hacked, Key Systems Forced Offline
Cybersecurity and Infrastructure Security Agency (CISA), which safeguards networks and systems across federal, state, local, tribal, and territorial governments, appears to have had one or ...
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer data breach. In response to ...
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
AT&T has responded to a recent incident where a hacker claimed to have leaked a large amount of data on a cybercrime forum. The Alleged ...
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
The International Monetary Fund (IMF) has announced that it is currently investigating a cybersecurity breach that resulted in the compromise of multiple internal email accounts. ...
German Radio Station Hit by Cyberattack: “Emergency Tape” Plays On as Hackers Demand Ransom
Hunters International Ransomware Claims Breach of ICBC London, Threatens Data Leak
Data Breaches Surge to Three-Year High in Australia: A Growing Threat to Privacy and Security
23andMe to Pay $30 Million in Class Action Settlement for Data Breach Exposing 6.4 Million Customers
FlyCASS Cockpit Security Breach: A Case Study of SQL Injection and its Impact on Critical Infrastructure
What is a Whaling Phishing Attack?
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Clearview AI Fined €30.5 Million for Unlawful Data Collection
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign