Cyber Security
Ransomware-as-a-Service (RaaS): The Industrialization of Cybercrime and What Enterprises Must Do
Why is Activity Logging Crucial for Detecting Cyberattacks
Say Goodbye to Manual Identity Processes and Hello to Scalable IAM Automation
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
The AI Cyber Threat: How to Secure your Systems in the Age of Artificial Intelligence
The Rising Tide of Cybersecurity Threats in Hospitality: How Hotels Can Stay Secure this Summer
Why External Attack Surface Management Belongs at the Core of Your Cybersecurity Strategy
64 Million T-Mobile Customer Records Allegedly Exposed in New Data Leak
How to Defend Your Organization Against Scattered Spider’s Service Desk Attacks
Ivanti Workspace Control Exposes SQL Credentials Through Hardcoded Key Flaws
The Exploding Threat of Cybercrime-as-a-Service (CaaS): How it’s Reshaping the Cybercrime Landscape
Quantum Hacking Is Coming: How to Prepare with Post-Quantum Security Today
Interlock Ransomware Suspected in Kettering Health System-Wide Outage
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Chinese Hackers Exploiting SAP NetWeaver Servers via Zero-Day Vulnerability
iClicker Website Compromised in ClickFix Malware Attack Targeting Students and Faculty
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
NCC Group's Cyber Threat Intelligence Report Reveals Record Ransomware Attacks
News
Hackers Spoof Microsoft ADFS Login Pages in Phishing Attacks
Hackers spoof Microsoft ADFS login pages, bypassing MFA to steal credentials and launch further phishing attacks targeting corporate email accounts. This highlights the threat of ...
Connecticut Healthcare Data Breach Exposes 1 Millions Records
News
Connecticut Healthcare Data Breach Exposes 1 Millions Records
The Connecticut healthcare data breach has affected over one million Connecticut residents, marking one of the largest healthcare data breaches in recent history.
Ransomware Payments Drop 35%: Chainalysis Reports Victims Refuse to Pay Ransom
News
Ransomware Payments Drop 35%: Chainalysis Reports Victims Refuse to Pay Ransom
Ransomware payments plummeted by 35% in 2024, totaling $814 million. This significant drop, reported by Chainalysis, suggests increased law enforcement effectiveness and victim resistance to ...
State-Sponsored Hackers Abuse Google's Gemini AI for Attacks
Cybersecurity
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Multiple state-sponsored groups are using Google's Gemini AI assistant. They use it primarily for productivity improvements. However, they also use it for reconnaissance and attack ...
US Healthcare Provider Data Breach at Connecticut Impacts 1 Million Patients
News
US Healthcare Provider Data Breach at Connecticut Impacts 1 Million Patients
A massive healthcare provider data breach at Connecticut's Community Health Center exposed the personal and health data of over 1 million patients, including Social Security ...
Prevent Data Breaches with Amazon Redshift Enhanced Security
News
Prevent Data Breaches with Amazon Redshift Enhanced Security
Amazon Redshift enhances security defaults to prevent data breaches and ransomware by restricting public access, enabling encryption, and enforcing SSL connections, mitigating risks like the ...
GrubHub Data Breach Exposes Customer, Driver, and Merchant Data
News
GrubHub Data Breach Exposes Customer, Driver, and Merchant Data
The GrubHub data breach has compromised the personal information of an unspecified number of customers, merchants, and drivers. The attack ...
Mississippi Electric Utility Data Breach Affects 20,000 Residents
News
Mississippi Electric Utility Data Breach Affects 20,000 Residents
The Mississippi electric utility, Yazoo Valley Electric Power Association, suffered a data breach affecting 20,000 residents. The breach exposed personal information, prompting identity theft protection ...
New York Blood Center Ransomware Attack
News
New York Blood Center Ransomware Attack: Critical Blood Supplies at Risk
The New York Blood Center Enterprises (NYBCe) suffered a ransomware attack on January 26th, disrupting operations and impacting blood supplies amid a pre-existing blood shortage.
BRS Cyber Attack: Data Breach at Business Registration Exposes Sensitive Business Information
News
BRS Cyber Attack: Data Breach at Business Registration Exposes Sensitive Business Information
Cyberattack on Kenya's Business Registration Services (BRS) has exposed sensitive company data, sold on the dark web. Authorities investigate, ruling out ransomware.
DeepSeek AI Data Breach Causes National Security Risks and Data Privacy Concerns
News
DeepSeek AI Data Breach Causes National Security Risks and Data Privacy Concerns
The DeepSeek AI data breach exposed sensitive user data, raising national security concerns and prompting warnings from U.S. officials about privacy violations and corporate espionage.
Phemex Crypto Firm Breached With $85 Million in Cryptocurrency Stolen
News
Phemex Crypto Firm Breached With $85 Million in Cryptocurrency Stolen
Phemex suffered a major security breach, resulting in the theft of over $85 million in cryptocurrency. The attack targeted hot wallets, prompting immediate suspension of ...
ENGlobal Cybersecurity Breach and CenterPoint Energy Data Leak Probes Investigation
News
ENGlobal Cybersecurity Breach and CenterPoint Energy Data Leak Probes Investigation
Williams stated,
RCSD Warns Community of Data Breach: 134,000 Records Potentially Accessed
News
RCSD Warns Community of Data Breach: 134,000 Records Potentially Accessed
The Rochester City School District (RCSD) warns its community of a significant data breach. The breach exposed sensitive personal information, prompting immediate action and investigation. ...
UK's Morrisons Breached: Cyber Attack at Technology Provider Dents Christmas Sales
News
UK’s Morrisons Breached: Cyber Attack at Technology Provider Dents Christmas Sales
A November cyber attack at Morrisons' technology provider, Blue Yonder, disrupted operations, impacting Christmas sales and resulting in lower-than-expected first-quarter growth.
All American Poly Data Breached, 2024 Cyberattack Exposes Sensitive Consumer Data
News
All American Poly Data Breached, 2024 Cyberattack Exposes Sensitive Consumer Data
All American Poly Corporation (American Poly) confirmed a data breach stemming from a 2024 cyberattack, exposing customer names and Social Security numbers. A data breach ...
Microsoft Teams Exploited in Sophisticated Ransomware Attacks
News
Microsoft Teams Exploited in Sophisticated Ransomware Attacks
Cybercriminals are exploiting Microsoft Teams for ransomware attacks, using spam emails, Teams messages, and calls to infiltrate companies, steal data, and deploy malware. Sophos identified ...
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Cybersecurity
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
New Apple CPU side-channel attacks, dubbed SLAP and FLOP, exploit flaws in speculative execution to steal data from web browsers. Researchers demonstrated the attacks' ability ...
Clone2Leak Attacks Exploit Git Flaws to Steal Credentials
News
Clone2Leak Attacks Exploit Git Flaws to Steal Credentials
Clone2Leak attacks exploit Git vulnerabilities, allowing attackers to steal credentials from GitHub Desktop, Git LFS, and other tools via carriage return smuggling, newline injection, and ...
Microsoft and OpenAI Investigate Data Breach
News
Microsoft and OpenAI Investigate Data Breach
Microsoft and OpenAI are investigating a data breach linked to DeepSeek, a Chinese AI startup, raising concerns about data security and intellectual property in the ...

TOP CYBERSECURITY HEADLINES

SECURITYWEEK INDUSTRY EXPERTS

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Massive 1.33 Million-Device Botnet Drives Unprecedented DDoS Attacks Surge in Q1 2025
A record-breaking 1.33 million-device botnet has driven a 110% surge in DDoS attacks in Q1 2025, targeting fintech, e-commerce, and telecom sectors.
Blue Shield of California Exposes Health Data of 4.7 Million Members to Google Due to Analytics Misconfiguration
Blue Shield of California disclosed a data breach impacting 4.7 million members after misconfigured Google Analytics exposed protected health information to Google Ads platforms.
Cybercrime Losses in the U.S. Reached $16.6 Billion in 2024, FBI Reports
Cybercrime losses in the U.S. hit $16.6 billion in 2024, with older adults and businesses suffering the most, according to new FBI complaint data.
Marks & Spencer Cyberattack Disrupts Services and Delays Customer Orders
Marks & Spencer confirms a cyberattack disrupting services, leading to delayed orders and affecting contactless payments, while assuring customers of ongoing efforts to resolve the ...
Qilin Ransomware: Tactics, Techniques, Procedures and Mitigation
Qilin ransomware, a potent threat emerging in 2022, has rapidly gained notoriety. This blog post delves into its advanced tactics, techniques, and procedures (TTPs), providing ...
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Varonis researchers reveal Cookie-Bite, a proof-of-concept Chrome extension attack that steals Azure Entra ID session cookies to bypass MFA and access Microsoft 365 services.
SK Telecom Malware Incident Targets USIM Customer Data
SK Telecom has disclosed a malware attack that exposed sensitive USIM data, prompting swift containment, investigation, and enhanced security measures for its 34 million subscribers. ...
Baltimore City Public Schools Data Breach Impacts 25,000 Individuals After Ransomware Attack
Baltimore City Public Schools confirms 25,000 people were impacted by a February ransomware attack that exposed sensitive employee and student information, including identification documents.
Active! Mail Zero-Day RCE Vulnerability Exploited in Ongoing Attacks on Japanese Organizations
A zero-day flaw in Active! Mail is under active exploitation in Japan, affecting major providers and exposing data across enterprise, education, and government sectors.
The Second Scam: FBI Warns of IC3 Impersonators Targeting Fraud Victims
The FBI has issued a stark warning about a growing scam targeting individuals who’ve already been victimized. In this episode, we unpack how fraudsters are ...
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
The Scallywag ad fraud network used WordPress plugins to generate 1.4 billion daily ad requests, monetizing piracy and redirect sites before being dismantled.
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
The FBI warns of a scam where criminals impersonate IC3 officials, targeting prior fraud victims with false promises of fund recovery to steal financial information. ...
Abilene, Texas Shuts Down City Systems Following Cyberattack
Abilene, Texas has taken key systems offline after a cyberattack. City services are disrupted but emergency response remains intact. Investigation and recovery efforts continue.
Imaflex Inc. Data Breach Exposes Personal and Employment Data
Imaflex Inc. Data Breach Exposes Personal and Employment Data: Legal Investigation Underway Imaflex Inc. has disclosed a data breach that exposed sensitive personal and employment-related ...
Google Confirms Sophisticated Phishing Attack Targeting Gmail Users Through DKIM and OAuth Abuse
Google confirms a phishing campaign targeting Gmail users that abused DKIM and Google Sites to send spoofed legal requests and steal user credentials undetected.
Evil Corp (UNC2165): The Russian Syndicate Behind Global Cyber Chaos
Evil Corp, a prolific Russian cybercrime syndicate, deploys sophisticated malware and ransomware, targeting diverse sectors globally, including healthcare and finance, for financial gain and potential ...
This Week In Cybersecurity: April 1st to 5th, 2025
This week in cybersecurity covers a range of incidents, including the shutdown of openSNP over privacy concerns, a data breach affecting 173,000 patients, and a ...
This Week In Cybersecurity: March 3rd to 7th, 2025
This Week in Cybersecurity: Data Breaches, Ransomware, Threat Actors, Ransomware Protection and more!
Ransomware Victims on Dark Web – 10th March, 2025
This report summarizes recent ransomware attacks across various sectors, detailing the victims, threat actors, and available information on the incidents. Due to the nature of ...
Ransomware Victims on Dark Web – 04th March, 2025
This report summarizes recent ransomware attacks across various sectors, detailing the victims, threat actors, and available information on the incidents. Due to the nature of ...
Minnesota Deploys National Guard Cyber Unit Following Major Cyberattack on St. Paul City Systems
Tea App Disables Messaging After Second Breach Exposes Over One Million Private Conversations
ShinyHunters Behind Salesforce-Related Data Breaches at Qantas, Allianz Life, LVMH
RiteCheck Confirms Data Breach Affecting Nearly 70,000 Customers and Employees
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
Hackers Exploit SAP NetWeaver Flaw to Deploy Advanced Auto-Color Malware on U.S. Chemical Firm
Aeroflot Flights Canceled After Hacktivist Cyberattack Cripples Airline Systems
Scattered Spider Ransomware Group Ramps Up Sophisticated Attacks Targeting Enterprises Globally
Cheap McDonald’s Deal Turns Into Subscription Scam: Over 10,000 Romanians Targeted via Facebook and Instagram Ads
Orange Discloses Cyberattack, Service Disruptions in France Following Breach
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline