Cyber Security
New Chrome Extensions Disguised as HR Tools Pose Security Threat
Verizon Offers Compensation after Nationwide Wireless Service Outage
Microsoft Patch Tuesday Update Sparks Unrest in PCs
HPE OneView Mass Vulnerability Exploitation Threatens Government Agencies
Project Eleven Secures $20 Million Funding to Propel Post-Quantum Security
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
XSS Vulnerability in StealC Malware’s Control Panel Uncovered
Analyzing AI in Security Testing: SQL Injection Strong yet Fails in Controls
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
New Attack Method, Reprompt, Poses Significant Risk to AI Chatbots
Critical Security Vulnerabilities: Redis Found at Risk of Unauthenticated RCE
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Visual Studio Code’s Copilot Studio Extension Now Widely Available
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
Critical Vulnerability in Modular DS WordPress Plugin Exploited
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Fried Frank Data Breach: Implications for High-Profile Clients
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...