Cyber Security
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Unveiling the Extent of Leaked API Keys in Front-End Applications
Microsoft Teams Service Outage Frustrates Users Worldwide
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
New Android Malware Identified in Device Firmware Raising Alarms
Italian University Struggles With Disruption After Cyberattack
DKnife Toolkit: A Persistent Threat to Network Security
Lema AI Secures $24 Million to Bolster Supply Chain Security
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Vega Expands with $120 Million Series B Funding
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
European Commission Gives Nod to Google’s Acquisition of Wiz
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
Conduent Breach Expands in Scope, Affecting 25 Million: Impact on Volvo Group
New Malicious Packages in npm and PyPI Tied to Lazarus Group
DavaIndia Security Breach Exposed Critical System Control
Cloud-Based Password Managers Face New Security Vulnerabilities
South Korean Fine Imposed on Dior, Louis Vuitton, and Tiffany Following Salesforce Breach
Odido Faces Cybersecurity Breach Threatening Customer Data
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...