Cyber Security
New Chrome Extensions Disguised as HR Tools Pose Security Threat
Verizon Offers Compensation after Nationwide Wireless Service Outage
Microsoft Patch Tuesday Update Sparks Unrest in PCs
HPE OneView Mass Vulnerability Exploitation Threatens Government Agencies
Project Eleven Secures $20 Million Funding to Propel Post-Quantum Security
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
XSS Vulnerability in StealC Malware’s Control Panel Uncovered
Analyzing AI in Security Testing: SQL Injection Strong yet Fails in Controls
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
New Attack Method, Reprompt, Poses Significant Risk to AI Chatbots
Critical Security Vulnerabilities: Redis Found at Risk of Unauthenticated RCE
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Visual Studio Code’s Copilot Studio Extension Now Widely Available
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
Critical Vulnerability in Modular DS WordPress Plugin Exploited
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Fried Frank Data Breach: Implications for High-Profile Clients
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Google Settles $5 Billion Lawsuit for Tracking Users in Incognito Mode
Google settles $5 billion lawsuit that revolved around Google’s Chrome browser’s “incognito” mode. The plaintiffs argued that this feature misled users into thinking their online ...
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
In the complex realm of cyber warfare, the Albanian Parliament and One Albania Telecom have made the headlines. As the cyberattack targets Albanian parliament, Albania ...
Anna Jaques Hospital Cyberattack on Christmas Day Disrupts Medical Record Systems
On Christmas Day, Anna Jaques Hospital in Newburyport, MA, was targeted by a cyberattack. The Anna Jaques Hospital Cyberattack on Christmas Day resulted in an ...
Steam Game Mod Breached to Push Password-Stealing Malware
On Christmas Day, the fan expansion called “Downfall” for the indie strategy game Slay the Spire was compromised in the Steam Game Mod Breach. The ...
APT28 Hacking Collective Targets Ukraine with MASEPIE Malware – CERT-UA Issues Security Alert
The Computer Emergency Response Team (CERT) of Ukraine has issued a warning regarding a recent phishing campaign. The threat actor behind this attack is the ...
Lockbit Ransomware Disrupts Healthcare Systems at German KHO Network of Hospitals
Katholische Hospitalvereinigung Ostwestfalen (KHO), a hospital network in Germany, has confirmed that the recent service disruptions experienced at three of its hospitals were a result ...
First American Cyber Attack Disrupts Closings: No New Updates from the American Title Insurance Firm
The nation’s second-largest title insurer, and its subsidiaries are currently experiencing an ongoing system outage following the First American cyber attack on December 20th. This ...
Liberty Hospital Cyber Attack Forces Kansas City to Transfer Patients and Reschedule Appointments
A hospital in the vicinity of Kansas City, Missouri, is facing challenges in delivering patient care due to a cyberattack that has affected its computer ...
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Yakult Australia, the manufacturer of a popular probiotic milk drink, recently faced a cyber incident. The Yakult Cyber Incident has impacted both their IT systems ...
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
According to Barracuda, a leading network and email security firm, they have successfully applied remote patches to all active Barracuda Email Security Gateway (ESG) appliances ...
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Integris Health, Oklahoma’s largest not-for-profit health network, has recently experienced a cyberattack resulting in the theft of patient data. The Integris Health data breach led ...
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut down its IT systems to ...
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on GTA leak channel on the ...
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject SQL command(s) via the vulnerable ...
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. Ace Hardware Cyber Attack 2023 ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...