Cyber Security
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Clearview AI Fined €30.5 Million for Unlawful Data Collection
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
DICK’S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
French Government Websites Under Siege Following Telegram CEO Arrest
This Week in Cybersecurity: 19th August to 23rd August, Halliburton Hit by Cyberattack
QNAP Bolsters NAS Security with Enhanced Ransomware Protection in Latest QTS Update
This Week in Cybersecurity: 12th August to 16th August, National Public Data Breach Exposed Personal Information of Billions
NetSuite Stores Leak: Sensitive Customer Data Exposed due to Access Control Misconfiguration
APT31 and APT27 Target Russian Organizations in Sophisticated Cyberespionage Campaign
This Week in Cybersecurity: 05th August to 09th August, National Public Data Breach
ADT Data Breach, Customer Information Impacted in Major Security Incident
This Week in Cybersecurity: 22nd July to 26th, Microsoft CrowdStrike IT Outage Affects 8.5 Million
This Week in Cybersecurity: 15th July to 19th July  
Microsoft CrowdStrike IT Outage Affected 8.5 Million Windows Devices
AI Cybersecurity: Leveraging Generative AI to Combat Threats & Data Breaches
Enterprise Attack Surface Management (ASM) and Best Security Practices
RansomHub Ransomware Group Exploits ZeroLogon Vulnerability to Spread Malware
This Week in Cybersecurity, 27th May to 31st May: City of Helsinki Data Breach
This Week in Cybersecurity: 20th May – 24th May, American Radio Relay League Cyberattack Disrupts Services
Banking Malware Grandoreiro is Back After Police Disruption to Target Banks Globally
This Week in Cybersecurity: 13th to 17th May, Dell Data Breached
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Blog
  • Cybersecurity
  • News
  • Phishing
  • Ransomware
  • Resources
  • Security Spotlight
10 Major Data Breaches and Cyber Attacks 2023
Cyber attacks today have become a daily occurrence in today’s hyperconnected world. With more users and devices getting online each day, there is an ever-increasing ...
Ivanti Critical EPM Bug Allows Hackers to Hijack EPM Devices
Ivanti has successfully addressed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM). The Ivanti critical EPM bug had the potential ...
US SEC’s X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet
The U.S. Securities and Exchange Commission’s X account experienced a security breach. As a result, a false Bitcoin ETF Approval Tweet on security exchanges was ...
LockBit Ransomware Claims Capital Health Attack, Threatens to Leak Sensitive Data
The LockBit ransomware group has acknowledged their involvement in the Capital Health attack that took place in November 2023. The adversaries are now issuing a ...
Ukrainian Hacker Group Takes Down Moscow ISP as a Revenge for Kyivstar Cyber Attack
A Ukrainian hacker group, believed to be connected to Ukraine’s intelligence took and carried out a destructive attack on the servers of a Moscow-based internet ...
Hackers Can Now Access Your Google Accounts Without Password
Security researchers have recently discovered a sophisticated hacking technique that enables cyber criminals to gain unauthorized entry into individuals’ Google accounts without passwords. In-depth analysis ...
CISA Identifies Actively Exploited Bugs in Chrome and Excel Parsing Library
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified two Actively Exploited Bugs in Chrome and Excel Parsing Library and has included them in ...
Mandiant Security Breached: Account on X Hacked for Crypto Scam
The X account of Mandiant, an American cybersecurity firm and subsidiary of Google, was compromised. The Mandiant Security Breach resulted in an unauthorized individual to ...
Russian Sandworm Hackers Lurked Inside KyivStar Systems in KyivStar Cyber Attack
The Russian Sandworm hackers successfully breached Kyivstar and stayed inside KyivStar systems for several months. Ukraine’s largest telecommunications service provider, in December, resulting in the ...
HealthEC Data Breach Exposes Data of Almost 4.5 Million Patients
HealthEC LLC, a New Jersey-based provider of health management solutions, has suffered a major data breach that exposed personally identifiable information of individuals who received ...
Orbit Chain Lost $86 Million in a Cross-Chain Bridge Exploit Attack
Orbit Chain Lost $86 Million in cryptocurrency, specifically Ether, Dai, Tether, and USD Coin. Orbit Chain is a blockchain platform that serves as a versatile ...
Victoria Court Hack Exposes Victorian Court Recordings: Sensitive Witness Testimonies Stolen
The Victoria Court Hack resulted in hackers gaining unauthorized access to the audio-visual network and stealing Victorian court recordings. The Victorian Court Cyber attack is ...
Ohio Lottery Cyber Attack: Another Cybersecurity Incident Claimed by DragonForce Ransomware
The Ohio Lottery cyber attack on Christmas Eve resulted in the shutdown of certain internal applications. While the exact details of the cybersecurity incident and ...
Eagers Automotive Cyberattack Forces the Company to Suspend Trades
Eagers Automotive cyberattack lead to a temporary suspension of trading on the stock exchange. Eagers Automotive operates a vast network of car dealerships across Australia ...
Black Basta Decryptor Recovers Files Exploiting a Ransomware Flaw
A team of researchers has developed a Black Basta decryptor that takes advantage of a vulnerability in the Black Basta ransomware. The Black Basta Ransomware ...
Google Settles $5 Billion Lawsuit for Tracking Users in Incognito Mode
Google settles $5 billion lawsuit that revolved around Google’s Chrome browser’s “incognito” mode. The plaintiffs argued that this feature misled users into thinking their online ...
Albanian Parliament Cyber Attack: Homeland Justice Hits Albanian Parliament and One Albania Telecom
In the complex realm of cyber warfare, the Albanian Parliament and One Albania Telecom have made the headlines. As the cyberattack targets Albanian parliament, Albania ...
Anna Jaques Hospital Cyberattack on Christmas Day Disrupts Medical Record Systems
On Christmas Day, Anna Jaques Hospital in Newburyport, MA, was targeted by a cyberattack. The Anna Jaques Hospital Cyberattack on Christmas Day resulted in an ...
Steam Game Mod Breached to Push Password-Stealing Malware
On Christmas Day, the fan expansion called “Downfall” for the indie strategy game Slay the Spire was compromised in the Steam Game Mod Breach. The ...
APT28 Hacking Collective Targets Ukraine with MASEPIE Malware – CERT-UA Issues Security Alert
The Computer Emergency Response Team (CERT) of Ukraine has issued a warning regarding a recent phishing campaign. The threat actor behind this attack is the ...
German Radio Station Hit by Cyberattack: “Emergency Tape” Plays On as Hackers Demand Ransom
Hunters International Ransomware Claims Breach of ICBC London, Threatens Data Leak
Data Breaches Surge to Three-Year High in Australia: A Growing Threat to Privacy and Security
23andMe to Pay $30 Million in Class Action Settlement for Data Breach Exposing 6.4 Million Customers
FlyCASS Cockpit Security Breach: A Case Study of SQL Injection and its Impact on Critical Infrastructure
What is a Whaling Phishing Attack?
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Clearview AI Fined €30.5 Million for Unlawful Data Collection
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign