Cyber Security
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Clearview AI Fined €30.5 Million for Unlawful Data Collection
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
DICK’S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
Voldemort Malware: A New Threat Abusing Google Sheets for Data Exfiltration
French Government Websites Under Siege Following Telegram CEO Arrest
This Week in Cybersecurity: 19th August to 23rd August, Halliburton Hit by Cyberattack
QNAP Bolsters NAS Security with Enhanced Ransomware Protection in Latest QTS Update
This Week in Cybersecurity: 12th August to 16th August, National Public Data Breach Exposed Personal Information of Billions
NetSuite Stores Leak: Sensitive Customer Data Exposed due to Access Control Misconfiguration
APT31 and APT27 Target Russian Organizations in Sophisticated Cyberespionage Campaign
This Week in Cybersecurity: 05th August to 09th August, National Public Data Breach
ADT Data Breach, Customer Information Impacted in Major Security Incident
This Week in Cybersecurity: 22nd July to 26th, Microsoft CrowdStrike IT Outage Affects 8.5 Million
This Week in Cybersecurity: 15th July to 19th July  
Microsoft CrowdStrike IT Outage Affected 8.5 Million Windows Devices
AI Cybersecurity: Leveraging Generative AI to Combat Threats & Data Breaches
Enterprise Attack Surface Management (ASM) and Best Security Practices
RansomHub Ransomware Group Exploits ZeroLogon Vulnerability to Spread Malware
This Week in Cybersecurity, 27th May to 31st May: City of Helsinki Data Breach
This Week in Cybersecurity: 20th May – 24th May, American Radio Relay League Cyberattack Disrupts Services
Banking Malware Grandoreiro is Back After Police Disruption to Target Banks Globally
This Week in Cybersecurity: 13th to 17th May, Dell Data Breached
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Blog
  • Cybersecurity
  • News
  • Phishing
  • Ransomware
  • Resources
  • Security Spotlight
Lockbit Ransomware Disrupts Healthcare Systems at German KHO Network of Hospitals
Katholische Hospitalvereinigung Ostwestfalen (KHO), a hospital network in Germany, has confirmed that the recent service disruptions experienced at three of its hospitals were a result ...
First American Cyber Attack Disrupts Closings: No New Updates from the American Title Insurance Firm
The nation’s second-largest title insurer, and its subsidiaries are currently experiencing an ongoing system outage following the First American cyber attack on December 20th. This ...
Liberty Hospital Cyber Attack Forces Kansas City to Transfer Patients and Reschedule Appointments
A hospital in the vicinity of Kansas City, Missouri, is facing challenges in delivering patient care due to a cyberattack that has affected its computer ...
Yakult Cyber Incident Leads to 95 GB Data Leak – DragonForce Claims the Cyber Attack
Yakult Australia, the manufacturer of a popular probiotic milk drink, recently faced a cyber incident. The Yakult Cyber Incident has impacted both their IT systems ...
Barracuda Zero Day Vulnerability Exploited by UNC4841 – Barracuda Remotely Patches Email Security Gateway Appliances
According to Barracuda, a leading network and email security firm, they have successfully applied remote patches to all active Barracuda Email Security Gateway (ESG) appliances ...
Integris Health Data Breached: Patients Receive Extortion Emails, Data of 2 Million Compromised
Integris Health, Oklahoma’s largest not-for-profit health network, has recently experienced a cyberattack resulting in the theft of patient data. The Integris Health data breach led ...
Mr. Cooper Data Breach Affects 14.7 Million – Mortgage Firm Shuts Down IT Systems
Mr. Cooper Data Breach has sent shockwaves amongst the cybersecurity community as the mortgage lending firm was forced to shut down its IT systems to ...
GTA 5 Source Code Leaked a Year After GTA 6 Leaks in Rockstar Hack
Recent reports have surfaced the internet that on Christmas Eve, the source code for GTA 5 source code leaked on GTA leak channel on the ...
Synology Security Advisory SA-22:15 GLPI Disclosed Multiple Remote Access Vulnerabilities
Synology Security Advisor SA-22:15 revealed multiple vulnerabilities that allow remote access to sensitive information, add web scripts, HTML, or inject SQL command(s) via the vulnerable ...
Ace Hardware Cyber Attack Disrupts Operations and Cripples IT Systems
Ace Hardware, the American hardware retailers’ cooperative, has experienced significant disruptions to its operations following a cyber attack in 2023. Ace Hardware Cyber Attack 2023 ...
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...
German Radio Station Hit by Cyberattack: “Emergency Tape” Plays On as Hackers Demand Ransom
Hunters International Ransomware Claims Breach of ICBC London, Threatens Data Leak
Data Breaches Surge to Three-Year High in Australia: A Growing Threat to Privacy and Security
23andMe to Pay $30 Million in Class Action Settlement for Data Breach Exposing 6.4 Million Customers
FlyCASS Cockpit Security Breach: A Case Study of SQL Injection and its Impact on Critical Infrastructure
What is a Whaling Phishing Attack?
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Indodax Hack: A Major Blow to Indonesian Crypto Security
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
This Week In Cybersecurity: 02nd September to 06th September, VK Data Leak Exposes 390 Million Users
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Clearview AI Fined €30.5 Million for Unlawful Data Collection
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign