Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer data breach. In response to ...
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
AT&T has responded to a recent incident where a hacker claimed to have leaked a large amount of data on a cybercrime forum. The Alleged ...
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
The International Monetary Fund (IMF) has announced that it is currently investigating a cybersecurity breach that resulted in the compromise of multiple internal email accounts. ...
This Week in Cybersecurity – 11th March to 15th March: Class Action Lawsuits Filed Against UnitedHealth Data Breach
Class Action Lawsuits Filed against UnitedHealth data breach, Acer Data Breached. Equilend and Stanford suffers ransomware attack, Play Ransomware leaks Swiss Documents, Donex ransomware on ...
StopCrypt Ransomware AKA STOP Djvu, Now Evades Detection
A new variant of the StopCrypt ransomware, also known as STOP, has been detected in the wild. This variant utilizes a multi-stage execution process that ...
Another Critical Fortinet RCE Flaw Exploited by Nation State Actors
CVE-2024-48788, like many others, is another critical Fortinet RCE flaw will is an attractive target for nation-state backed actors. Fortinet has addressed this critical remote ...
Cybersecurity Compliance: A Definitive Guide
In an era defined by digital transformation and data-driven operations, cybersecurity has become paramount. Organizations across the globe face an ever-expanding landscape of cyber threats ...
Advanced Data Security: Threat Intelligence Tools Essential Guide
As the digital realm becomes increasingly complex, organizations are recognizing the importance of arming themselves with advanced tools and insights to proactively secure their digital ...
Health Dept Office of Civil Rights Starts Probe into UnitedHealth Hack
The U.S. Department of Health and Human Services (HHS) is conducting an investigation into the UnitedHealth Hack caused by the Optum ransomware attack. Optum operates ...
6 Class Action Lawsuits Filed Against UnitedHealth Data Breach, More to Follow
UnitedHealth Group is facing multiple class action lawsuits related to the UnitedHealth Data Breach at its payment processing unit, Change Healthcare. Multiple class action lawsuits ...
Roku Data Breached: 15,000 Roku Accounts Sold for Only 50¢ Each on Dark Web
Roku Data Breach has resulted in more than 15,000 Roku accounts sold at a mere 50¢ price. Analysts say there is more to this incident. ...
Acer Data Breached: Acer Philippines Employee Data Leaked on a Hacking Forum
Acer Philippines has officially confirmed a huge employee data leak. The breach occurred through a third-party vendor responsible for managing Acer’s employee attendance data. The ...
Stanford Ransomware Attack: Data of 27,000 People Stolen Allegedly by Akira Ransomware
Stanford University has reported a Ransomware attack involving its Department of Public Safety (SUDPS) network. As a result of the Stanford ransomware attack, personal information ...
Hackers Abuse WordPress Plugin Flaw (CVE-2023-6000) to Infect 3,300 Websites
Hackers are compromising WordPress sites by taking advantage of a WordPress plugin flaw found in outdated versions of the Popup Builder plugin and infecting more ...
Equilend Data Stolen in a Ransomware Attack, Equiland Warns Employees
EquiLend Holdings, a securities lending platform based in New York, has confirmed in Equilend data breach notification letters that employee data was compromised in a ...
New DoNex Ransomware Targets Enterprises in the Wild
Organizations in the United States and Europe are facing a significant threat from a new strain of the “DoNex ransomware.” This malicious software has been ...
Microsoft Says Russian Hackers “Midnight Blizzard” AKA ‘Nobelium’ Stole Source Code in Cyberespionage
Microsoft recently announced that it had discovered a cyber attack conducted by Russian hackers group called “Midnight Blizzard” AKA ‘Nobelium’. Russian Hackers from Midnight Blizzard ...
Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
The Magnet Goblin hackers, driven by financial motives, use 1-day vulnerabilities to breach servers and install custom Linux malware NerbianRAT and MiniNerbian. What are 1-day ...
Play Ransomware Leaked 65,000 Stolen Swiss Government Documents
The National Cybersecurity Centre (NCSC) of Switzerland recently published a report detailing their analysis of a data breach that occurred as a result of a ...
This Week in Cybersecurity – 4th March to 8th March UnitedHealth Cyberattack Fallout Stretches Beyond Class Action Lawsuits
UnitedHealth Cyberattack Results in Class Action Lawsuits, Change Healthcare Makes a $22 Million Ransom Payment, Houser LLP and Epic Games Data Breached, OKTA Phishing Continues. ...