Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
ResumeLooters Gang Steal Data of 2 Million in XSS Attacks Using SQL injection
A threat group known as ‘ResumeLooters’ has successfully stolen the personal information of over two million job seekers by exploiting vulnerabilities in 65 legitimate job ...
CISA Advises Vendors to Secure SOHO Routers Against Volt Typhoon Attacks
The Cybersecurity and Infrastructure Security Agency has advised SOHO router manufacturers to strengthen their security against the ongoing Volt Typhoon attacks. CISA’s Guidelines Against Volt ...
Ivanti Reveals Second Connect Secure zero-day Exploit, Urges Immediate Patching
Today, Ivanti issued a warning regarding two additional Connect Secure zero-day exploits that are affecting Connect Secure, Policy Secure, and ZTA gateways. One of these ...
Data of 750 million Indian Mobile Users Sold on the Dark Web
According to a report from cybersecurity company CloudSEK, a vast database containing the personal information of approximately 750 million Indian Mobile Users made available for ...
Cloudflare Hacked by a State Sponsored Hacker Using Auth Tokens Stolen in the Okta Attack
Cloudflare has announced that its internal Atlassian server was breached by a ‘nation state attacker’. Hacker performing the Cloudflare hack gained unauthorized access to Cloudflare’s ...
Blackbaud Data Breach: FTC Holds Blackbaud Responsible for Linient Data Protection Policies
Blackbaud has reached a settlement agreement with the Federal Trade Commission (FTC) following charges of inadequate security measures and irresponsible data retention practices that led ...
This Week in Cybersecurity: 29th Jan – 2nd Feb: Medusa Ransomware Strikes Again
Medusa Ransomware Attacks Kansas City Public Transportation Authority The Kansas City Area Transportation Authority (KCATA) revealed it was hit by a Medusa ransomware attack on ...
Fulton County Cyberattack: Cyberattack Hits Georgia County Where Trump Faces Charges
The recent Fulton County cyberattack on Georgia had a widespread impact on various departments, including the office of District Attorney Fani Willis. This incident disrupted ...
Schneider Electric Hit by Cactus Ransomware Attack
Schneider Electric ransomware attack has been claimed by Cactus ransomware. The attackers stole valuable corporate data from Sustainability Business division. Schneider Electric Ransomware Attack Schneider ...
DarkGate Malware Pushed in Phishing Attacks via Group Chats of Microsoft Teams
Recent phishing attacks have exploited Microsoft Teams group chat requests to distribute malicious attachments containing DarkGate malware. The attackers exploited a compromised Teams user or ...
Linux glibc Flaw Lets Attackers Exploit Root Access on Major Linux Distros
A newly discovered vulnerability in the GNU C Library (glibc) enables attackers to gain root access on default configurations of major Linux distributions. This Linux ...
Johnson Controls Ransomware Attack Cost $27 Million After Data Breach
Johnson Controls Ransomware Attack Cost $27 Million in total and data was breached with sensitive corporate data stolen. According to official confirmation from Johnson Controls ...
Keenan Warns 1.5 Million People of Data Breach: Personal Information Stolen
Keenan Warns 1.5 Million People of a significant data breach. Keenan Data Breach compromised the data of 1.5 Million customers and employees Keenan Data Breach ...
Ukrainian Hackers Wiped 2 Petabytes of Data from Russian Research Center
Pro-Ukrainian Hackers wiped 2 petabytes of data from Russian Center for Space Hydrometeorology, a state research center that uses satellite data to monitor climatic activities ...
Medusa Ransomware Attacks Kansas City Public Transportation Authority
The Kansas City Area Transportation Authority (KCATA) disclosed that it experienced a targeted Medusa ransomware attack on Tuesday, January 23. KCATA (Kansas City Area Transportation ...
Critical Jenkins RCE Flaw (CVE-2024-23897) Exploited in the Wild
Numerous proof-of-concept (PoC) exploits have been disclosed for the Critical Jenkins RCE flaw (CVE-2024-23897), which has recently been patched. There are indications that this vulnerability ...
This Week in Cybersecurity: 22nd Jan – 25th Jan: Mother of All Breaches Exposes 26 Billion Records
Mother of All Breaches (MOAB) Exposes 26 Billion Records Researchers found a data breach containing 26 billion records from various sources, dubbed “Mother of All ...
Blackwood Hackers Use AitM to Hijack WPS Office Update and Install NSPX30 Malware
The ‘Blackwood hackers’ have been engaging in cyberespionage attacks since 2018 and employs a highly sophisticated malware called NSPX30. Interestingly, the NSPX30 malware is built ...
Hackers Stole Raw Genotype Data, Health Reports in the 23andMe Data Breach
Raw genotype data of almost 5.1 million people was stolen in the 23andMe Data Breach that went unnoticed for months.   23andMe Data Breach Gave ...
HPE Hacked by Russian Hacker Group ‘Midnight Blizzard’ that Hacked Microsoft
The HPE hack was attributed to a group of suspected Russian hackers known as Midnight Blizzard, also referred to as Cozy Bear, APT29, and Nobelium. ...