Cyber Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
4 Crucial Automation Use Cases for Enterprise Security Automation
This Week In Cybersecurity: 9th December to 13th December
Krispy Kreme Cyberattack Disrupts Online Orders, Impacts US Operations
Salt Typhoon: Chinese Hacking Group Behind Metadata Theft Targets US Telecoms
Colonial Behavioral Health Files Data Breach Notice: October 2024 Incident Impacts Consumer Data
9 Steps to Remove Malware from Your Windows PC
This Week In Cybersecurity: 25th November to 29th November
LifeLabs Data Breach Report Finally Public After Four-Year Legal Battle
Thala Recovers $25.5 Million After Security Breach
WolfsBane Linux Malware Unleashed by Chinese Hackers
This Week In Cybersecurity: 18th to 22nd November
HeptaX Cyberattack: A Deep Dive into the Multi-Stage RDP Exploitation Targeting Enterprises
Manufacturers Under Cyberattack: An Unprecedented Enterprise Cyberthreat
This Week In Cybersecurity: 11th November to 15th November
₹2,000 Crore WazirX Cyberattack Culprit Arrested
Singtel Data Breach: Volt Typhoon’s Test Run Before Targeting US Telecoms
How the Dark Web Has Fueled the 32% Rise in Healthcare Cyberattacks
Central Bank Cyprus Says 14.3% of Businesses Hit by Cyberattacks
This Week In Cybersecurity: 28th October to 1st November
Ticking Time Bomb or Opportunity? How to Secure Remote Work Environments
This Week In Cybersecurity: 21st October to 25th October
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Feature Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Ransomware
  • Resources
  • Security Spotlight
  • Threat Actors
  • Uncategorized
Return of the Lockbit: LockBit Ransomware Returns and ReLaunches Its Dark Web Leak Site
LockBit ransomware returns and resumes its ransomware activities on a new infrastructure shortly after their servers were compromised by law enforcement. LockBit ransomware have expressed ...
Insomniac Investigates Games Rhysida Ransomware Data Breach and Alerts Employees
Insomniac Games, a subsidiary of Sony, is taking action after the Rhysida Ransomware Data Breach incident. Following a Rhysida ransomware attack in November, the personal ...
Connectwise ScreenConnect Servers Hacked in LockBit Ransomware Attack, CISA Orders Feds to Fix the Bug in a Week
Lockbit Ransomware hackers are currently taking advantage of a critical authentication bypass vulnerability in Connectwise ScreenConnect servers that have not been updated. This Connectwise Screenconnect ...
UnitedHealth Faces Outage as Optum Hack Forced Shutdown of Healthcare Billing Systems
UnitedHealth Group, a prominent healthcare company, has confirmed the Optum Hack as its subsidiary, Optum Solutions, experienced a cyberattack on the Change Healthcare platform. The ...
Migo Malware Targets Redis Servers and Disables Protection Features
Security researchers have recently uncovered a new campaign aimed at Linux hosts, specifically targeting Redis servers. This campaign employs a new Migo malware to conduct ...
PSI Software Ransomware Attack Shuts Down Company IT and Email Systems
PSI Software SE, a software developer based in Germany specializing in complex production and logistics processes, has officially confirmed that the recent cyber incident it ...
Tangerine Cyber Incident: Australian ISP Tangerine Suffers Cyberattack
Tangerine cyber incident led to a data breach where hackers obtained the personal information of over 200,000 customers. The compromised data includes full names, dates ...
Joomla Fixes Critical XSS Vulnerabilities in Joomla CMS
The open-source project responsible for maintaining Joomla, a widely used content management system, has released a patch to address Critical XSS Vulnerabilities in Joomla. These ...
iSoon Leaks Internal Documents, GitHub Data Leak Reveals Sensitive Documents & Conversation Logs from Chinese Ministry
The open-source project responsible for maintaining Joomla, a widely used content management system, has released a patch to address Critical XSS Vulnerabilities in Joomla. These ...
Cambridge University Cyberattack Claimed by Anonymous Sudan Using DDoS Attacks
The group known as Anonymous Sudan has been involved in a series of DDoS attacks targeting well-known UK universities, specifically the University of Cambridge and ...
Notorious LockBit Ransomware Disrupted by Global Police, NCA Takes Control of Website
With the LockBit ransomware disrupted, the LockBit’s Website has been taken over and replaced with law enforcement agencies’ logos from eleven nations. LockBit Ransomware Disrupted ...
Cactus Ransomware Claims to Have Stolen 1.5TB from Schneider Electric Data Breach
The Cactus ransomware group announced that they successfully infiltrated Schneider Electric’s network and seized approximately 1.5TB of data. As evidence, they have leaked 25MB of ...
Cyberattack On ETISALAT Claimed by LockBit Ransomware Group, Demands $100K for Stolen Data
The Cactus ransomware group announced that they successfully infiltrated Schneider Electric’s network and seized approximately 1.5TB of data. As evidence, they have leaked 25MB of ...
Critical RCE bugs Found in SolarWinds Access Rights Manager (ARM)
SolarWinds has successfully addressed multiple critical RCE bugs that were present in its Access Rights Manager (ARM) solution. Access Rights Manager (ARM) is a software ...
Hackers Claim Robert Half Data Breach, Put Sensitive Data on Sale
The notorious hackers, known as IntelBroker and Sanggiero, have announced that they possess a significant amount of data from Robert Half data breach and are ...
Blackcat/ALPHV Ransomware Claims loanDepot and Prudential Financial Breaches
The Blackcat/ALPHV ransomware gang has announced that they are responsible for infiltrating the networks of Prudential Financial, and for the loanDepot data breach. However, the ...
This Week in Cybersecurity: Feb 12th – Feb 16th, Ransomware Attack Takes 18 Romanian Hospitals Offline
Ransomware Attack Takes 18 Romanian Hospitals Offline A ransomware attack encrypted the database of the Hipocrate Information System, a medical services management platform used by ...
Health NZ Data Breach Compromises Personal Information of 12k Patients
Around 12,000 individuals have been affected in the Health NZ Data Breach cause by a data leak at Te Whatu Ora Covid 19, a healthcare ...
RansomHouse Performs Automated VMware ESXi Attack with MrAgent Tool
The RansomHouse ransomware group recently developed a tool called ‘MrAgent’ for VMware ESXi attacks and streamline the deployment of their data encrypter on multiple VMware ...
Microsoft Critical Exchange Bug Exploited as ‘zero-day’
Microsoft has issued an updated security advisory, warning about a critical vulnerability in Exchange Server. The Microsoft critical Exchange bug was exploited as a zero-day ...