Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Equilend Cyberattack Brings the Financial Tech Firm Down, Trades with Systems Offline
The EquiLend Cyberattack has forced the loan lending firm to trade manually with systems going offline. Lockbit ransomware gang is said to be behind the ...
Bucks County Cybersecurity Incident Disrupts Computer-Aided Dispatch System
The Bucks County Cybersecurity Incident impacted the county’s computer-aided dispatch (CAD) system leading to suspension of 911 call automation. Authorities in Bucks County, Pennsylvania, have ...
Jason’s Deli Breach Exposes Data of Over 350K Users in Credential Stuffing Attack
Jason’s Deli has recently discovered a data breach that has affected its online platform. In notifications sent to customers, the company has informed them that ...
Mother of All Breaches (MOAB) Exposes 26 Billion Records
The recently discovered supermassive leak is an extensive collection of data from various past breaches. It includes a staggering 12 terabytes of information, encompassing a ...
Veolia North America Water Service Provider Hit by Ransomware Attack
Veolia North America faced a Ransomware Attack that caused disruptions to the bill payment systems. The Veolia ransomware attack forced the organization to shut down ...
10 Common Types of Cyber Attacks and How to Prevent Them
The digital age has brought convenience and connection, but it’s also opened the door to a growing threat: cyberattacks. These malicious attempts can steal data, ...
SEC Says Sim Swapping Attack Caused X Account Hack
SEC SIM swapping attack reportedly the cause of SEC X account hack that resulted in a fake Bitcoin ETF Approval tweet. The U.S. Securities and ...
loanDepot Cyberattack Results in Data Breach of 16.6 Million
The mortgage lender has confirmed that loanDepot cyberattack resulted in a Data Breach that compromised sensitive information of 16.6 Million people. loanDepot, a mortgage lender, ...
Ukraine’s Monobank DDoS Attack Hits ‘Non Stop’ and Cripples Bank’s Operations
Over the weekend, Monobank, a prominent Ukraine’s largest mobile-only bank, experienced a distributed denial-of-service (DDoS) attack. This Monobank DDoS Attack is part of a series ...
CISA Issues Emergency Directive on Ivanti Zero-Day, Demands Immediate Action from Federal Agencies
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive to Federal Civilian Executive Branch (FCEB) agencies. The directive aims to address two ...
Tietoevry Ransomware Attack Causes Widespread Disruptions for Swedish Customers, Akira Ransomware Behind the Incident
Tietoevry, a Finnish IT services and enterprise cloud hosting provider, experienced a ransomware attack that affected their cloud hosting customers in one of their data ...
This Week in Cybersecurity: 15th Jan – 19th Jan: 178K SonicWall Firewalls Fell to DoS and RCE Attacks
Over 178K SonicWall Firewalls Exposed to DoS and RCE Attacks 178k SonicWall firewalls are exposed online and vulnerable to DoS and potential RCE attacks due ...
Trezor Security Breach Affects 66k Users in a Phishing Scam
Trezor Security Breach: What Happened? Trezor, a manufacturer of hardware wallets, recently reported a security breach. Approximately 66,000 user’s contact information was exposed due to ...
Ukraine Blackjack Hackers Steal 500 Russian MoD’s Objects
According to sources from RBC-Ukraine, Ukrainian Blackjack Hackers, who are believed to be associated with the Security Service of Ukraine (SSU), have successfully breached a ...
Kansas State University Cyberattack Disrupts Email, Phone, Payment Systems
The Kansas State University Cyberattack has disrupted IT network and services including Email, Phone and Payment Systems. Kansas State University cybersecurity incident has caused disruptions ...
Bigpanzi Botnet Targets 170k Android TV Set Top Boxes with Bigpanzis Custom Malware
The Bigpanzi cybercrime gang has been generating substantial profits by infecting Android TV, Android TV boxes and various eCos set-top boxes with Bigpanzi botnet malware, ...
Google Discreetly Changes Chrome’s Incognito Warning Amidst the Google Class Action lawsuit
Google recently made a quiet update to the description of its private browsing feature in the latest Canary build of Google Chrome Browser, version 122.0.6251.0. ...
Hackers Use Androxgh0st Malware Botnet to Steal AWS and Microsoft credentials: CISA and FBI Issues Warning
The FBI and Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about the Androxgh0st malware botnet. They have been conducting investigations to understand ...
Windows SmartScreen Vulnerability Exploited: Phemedrone Stealer Malware Used for Crypto Siphoning
A recent Crypto Siphoning malware campaign called Phemedrone has been discovered. Phemedrone is an information-stealing malware that takes advantage of a Microsoft Windows SmartScreen Vulnerability ...
Over 178K SonicWall Firewalls Exposed to DoS and RCE Attacks
Security researchers have discovered that more than 178k SonicWall firewalls are vulnerable to DOS and RCE attacks. This flaw was found in vulnerable SonicWall firewalls ...