Cyber Security
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
Russian Ransomware Operator Admits Guilt in U.S. Court
Meta’s Smart Glasses Face Privacy Investigation in Britain
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
HungerRush POS Platform Targeted in Data Extortion Scheme
Fake OpenClaw Installers on GitHub Are Stealing User Data
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
LexisNexis Data Breach Claimed by Fulcrumsec Group
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Madison Square Garden Cyber Incident Revealed Months Later
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
ShinyHunters Leak Exposes Millions of CarGurus User Records
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut down its IT systems to ...
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on GTA leak channel on the ...
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject SQL command(s) via the vulnerable ...
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. Ace Hardware Cyber Attack 2023 ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...