Cyber Security
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
This Week In Cybersecurity: 9th December to 13th December
Krispy Kreme Cyberattack Disrupts Online Orders, Impacts US Operations
Salt Typhoon: Chinese Hacking Group Behind Metadata Theft Targets US Telecoms
Colonial Behavioral Health Files Data Breach Notice: October 2024 Incident Impacts Consumer Data
This Week In Cybersecurity: 25th November to 29th November
LifeLabs Data Breach Report Finally Public After Four-Year Legal Battle
Thala Recovers $25.5 Million After Security Breach
WolfsBane Linux Malware Unleashed by Chinese Hackers
This Week In Cybersecurity: 18th to 22nd November
This Week In Cybersecurity: 11th November to 15th November
₹2,000 Crore WazirX Cyberattack Culprit Arrested
Singtel Data Breach: Volt Typhoon’s Test Run Before Targeting US Telecoms
Central Bank Cyprus Says 14.3% of Businesses Hit by Cyberattacks
This Week In Cybersecurity: 28th October to 1st November
This Week In Cybersecurity: 21st October to 25th October
This Week In Cybersecurity: 14th October to 18th October
This Week In Cybersecurity: 7th October to 11th October
Salt Typhoon APT Subverts Law Enforcement Wiretapping
American Water Cyberattack: Major US Utility Shuts Down Systems After Security Breach
This Week In Cybersecurity: 30th September to 4th October
AFP Cyberattack: Security Breach at French News Agency Exposes Critical Infrastructure Vulnerabilities
What is DNS Spoofing/DNS Cache Poisoning and How Can It Compromise Your Network?
This Week In Cybersecurity: 23rd September to 27th September
23andMe Board Resigns Amidst CEO’s Takeover Bid: A Battle for Control
Change Healthcare Data Breach Class Action Lawsuits Update
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Blog
  • Cybersecurity
  • Cybersecurity Newsletter
  • Network Security
  • News
  • Phishing
  • Ransomware
  • Resources
  • Security Spotlight
  • Threat Actors
  • Uncategorized
Cyberattack On ETISALAT Claimed by LockBit Ransomware Group, Demands $100K for Stolen Data
The Cactus ransomware group announced that they successfully infiltrated Schneider Electric’s network and seized approximately 1.5TB of data. As evidence, they have leaked 25MB of ...
Critical RCE bugs Found in SolarWinds Access Rights Manager (ARM)
SolarWinds has successfully addressed multiple critical RCE bugs that were present in its Access Rights Manager (ARM) solution. Access Rights Manager (ARM) is a software ...
Hackers Claim Robert Half Data Breach, Put Sensitive Data on Sale
The notorious hackers, known as IntelBroker and Sanggiero, have announced that they possess a significant amount of data from Robert Half data breach and are ...
Blackcat/ALPHV Ransomware Claims loanDepot and Prudential Financial Breaches
The Blackcat/ALPHV ransomware gang has announced that they are responsible for infiltrating the networks of Prudential Financial, and for the loanDepot data breach. However, the ...
This Week in Cybersecurity: Feb 12th – Feb 16th, Ransomware Attack Takes 18 Romanian Hospitals Offline
Ransomware Attack Takes 18 Romanian Hospitals Offline A ransomware attack encrypted the database of the Hipocrate Information System, a medical services management platform used by ...
Health NZ Data Breach Compromises Personal Information of 12k Patients
Around 12,000 individuals have been affected in the Health NZ Data Breach cause by a data leak at Te Whatu Ora Covid 19, a healthcare ...
RansomHouse Performs Automated VMware ESXi Attack with MrAgent Tool
The RansomHouse ransomware group recently developed a tool called ‘MrAgent’ for VMware ESXi attacks and streamline the deployment of their data encrypter on multiple VMware ...
Microsoft Critical Exchange Bug Exploited as ‘zero-day’
Microsoft has issued an updated security advisory, warning about a critical vulnerability in Exchange Server. The Microsoft critical Exchange bug was exploited as a zero-day ...
Trans-Northern Pipelines Hit by ALPHV Ransomware Attack
Trans-Northern Pipelines (TNPI) has confirmed and ALPHV ransomware attack that caused a breach within its internal network in November 2023. The company is currently conducting ...
LockBit Ransomware Claims Cyberattack on Fulton County, Georgia
The cyberattack on Fulton County, Georgia has been attributed to the LockBit ransomware gang. They are claiming responsibility for the breach and are threatening to ...
Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations
Proofpoint research has revealed that the Bumblebee malware has resurfaced after being absent from the cyber threat landscape for four months. The new Bumblebee malware ...
Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data
Prudential Financial recently experienced a network breach where unauthorized individuals gained access to employee and contractor data. The Prudential Financial breach affected the main systems ...
Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform
Hackers have allegedly abused a stolen private key to generate and steal approximately $290 million worth of PLA tokens. These tokens are used within the ...
What is the SLAM Method? Identify Phishing Emails with SLAM Method
SLAM method stands for: Stop, Look, Ask, and Manage. The method is four step framework that involves double-checking the Sender, Link, Attachment, and Message. What ...
Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a recently detected vulnerability in Roundcube email servers. This vulnerability, which was patched ...
Bank of America Data Breached: Customers Warned After Vendor Hacked  
The Bank of America data breach exposed personal information after Infosys McCamish Systems (IMS), one of its service providers, was hacked last year. The compromised ...
Free Rhysida Ransomware Decryptor Released for Windows
South Korean researchers have recently made a discovery regarding the Rhysida ransomware encryptor. They have identified an encryption flaw in the system, which allowed the ...
New Fortinet RCE flaw in SSL VPN Exploited in the Wild
Fortinet has issued a warning regarding a serious vulnerability in FortiOS SSL VPN. This Fortinet RCE flaw, identified as CVE-2024-21762 / FG-IR-24-015, poses a significant ...
Black Basta Ransomware Attack Hits Hyundai Motor Europe
Hyundai Motor Europe, the European division of Hyundai Motor Company based in Germany, recently fell victim to a Black Basta ransomware attack known as Black ...
Raspberry Robin Malware Uses One-Day Exploits to Target Windows
Recent versions of the Raspberry Robin malware have become more covert and employ one-day exploits that specifically target vulnerable systems. One-day exploits refer to code ...