Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
RansomHouse Performs Automated VMware ESXi Attack with MrAgent Tool
The RansomHouse ransomware group recently developed a tool called ‘MrAgent’ for VMware ESXi attacks and streamline the deployment of their data encrypter on multiple VMware ...
Microsoft Critical Exchange Bug Exploited as ‘zero-day’
Microsoft has issued an updated security advisory, warning about a critical vulnerability in Exchange Server. The Microsoft critical Exchange bug was exploited as a zero-day ...
Trans-Northern Pipelines Hit by ALPHV Ransomware Attack
Trans-Northern Pipelines (TNPI) has confirmed and ALPHV ransomware attack that caused a breach within its internal network in November 2023. The company is currently conducting ...
LockBit Ransomware Claims Cyberattack on Fulton County, Georgia
The cyberattack on Fulton County, Georgia has been attributed to the LockBit ransomware gang. They are claiming responsibility for the breach and are threatening to ...
Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations
Proofpoint research has revealed that the Bumblebee malware has resurfaced after being absent from the cyber threat landscape for four months. The new Bumblebee malware ...
Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data
Prudential Financial recently experienced a network breach where unauthorized individuals gained access to employee and contractor data. The Prudential Financial breach affected the main systems ...
Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform
Hackers have allegedly abused a stolen private key to generate and steal approximately $290 million worth of PLA tokens. These tokens are used within the ...
What is the SLAM Method? Identify Phishing Emails with SLAM Method
SLAM method stands for: Stop, Look, Ask, and Manage. The method is four step framework that involves double-checking the Sender, Link, Attachment, and Message. What ...
Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a recently detected vulnerability in Roundcube email servers. This vulnerability, which was patched ...
Bank of America Data Breached: Customers Warned After Vendor Hacked  
The Bank of America data breach exposed personal information after Infosys McCamish Systems (IMS), one of its service providers, was hacked last year. The compromised ...
Free Rhysida Ransomware Decryptor Released for Windows
South Korean researchers have recently made a discovery regarding the Rhysida ransomware encryptor. They have identified an encryption flaw in the system, which allowed the ...
New Fortinet RCE flaw in SSL VPN Exploited in the Wild
Fortinet has issued a warning regarding a serious vulnerability in FortiOS SSL VPN. This Fortinet RCE flaw, identified as CVE-2024-21762 / FG-IR-24-015, poses a significant ...
Black Basta Ransomware Attack Hits Hyundai Motor Europe
Hyundai Motor Europe, the European division of Hyundai Motor Company based in Germany, recently fell victim to a Black Basta ransomware attack known as Black ...
Raspberry Robin Malware Uses One-Day Exploits to Target Windows
Recent versions of the Raspberry Robin malware have become more covert and employ one-day exploits that specifically target vulnerable systems. One-day exploits refer to code ...
Ransomware Attack Takes 18 Romanian Hospitals Offline
A recent cyber attack has disrupted the operations of 18 hospitals in Romania. The targeted healthcare management system, known as the Hipocrate Information System (HIS), ...
CISA Confirms New Fortinet RCE Bug Being Actively Exploited
Today, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed the active exploitation of a critical remote code execution (RCE) vulnerability that was recently patched ...
French Healthcare Data Breach Puts Data of Millions at Risk
Viamedis, a French healthcare services firm, recently experienced a cyberattack that resulted in the exposure of data belonging to policyholders and healthcare professionals in the ...
Verizon Data Breach Compromises Data of 63,000 Employees, Insider Leaks Data
Verizon Communications, a prominent telecommunications and mass media company in the United States, has recently disclosed an insider data breach that has affected nearly half ...
Lurie Children’s Hospital Cyberattack Cripples Healthcare Systems
Lurie Children’s Hospital in Chicago recently encountered a cyberattack that led to a temporary shutdown of its IT systems. Consequently, regular operations were disrupted, and ...
HPE Data Breached: HPE Investigates Data Breach After Data Being Stolen from a ‘Test Environment’
Hewlett Packard Enterprise (HPE) is currently conducting an investigation into the HPE Data Breach that led to massive data theft. This comes after a threat ...