Cyber Security
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
4 Crucial Automation Use Cases for Enterprise Security Automation
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Jackson County Goes into Emergency Mode After Ransomware Attack
Jackson County, Missouri, is currently facing a state of emergency following a ransomware attack that occurred on Tuesday. This cyberattack has resulted in the disruption ...
10 Class Action Lawsuits Filed Against AT&T After Admitting 73 Million Customer Records Exposed in Data Breach
AT&T got Sued for Negligence After Admitting that 73 Million Customer Records Were Exposed in a data breach. No less than 10 class action lawsuits ...
JIT Probe Reveals 2.7M Pakistani Citizens’ Data Breached for 5 Years, NADRA Blamed for Data Leak
According to a probe by a joint investigation team, the personal records of over 2.7 million Pakistani citizens have been exposed online in massive data ...
FMU Suffers Widespread Cyberattack by INC Ransomware
Florida Memorial University (FMU) has reportedly experienced a cybersecurity breach by the INC Ransom group. The exact details of the compromised data are unclear, and ...
Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack
Omni Hotels & Resorts has recently faced a system-wide IT outage that resulted in the disruption of its IT systems on Friday. This outage has ...
DinodasRAT Malware Targets Red Hat and Ubuntu Linux Servers for Cyber Espionage
Security researchers have recently detected attacks targeting Red Hat and Ubuntu systems by a Linux version of the DinodasRAT malware, also known as XDealer. These ...
AT&T Confirms Data Breach: Over 73 MILLION Accounts Compromised
AT&T, one of the largest telecom companies in the US, has confirmed a massive data breach impacting over 73 million of their current and former ...
Poh Heng Jewellery Data Breached, Customer Info Compromised
Poh Heng Jewellery data breached. Reports say that customers’ personal information may have been compromised. Poh Heng Jewellery recently informed its customers about a data ...
MarineMax Confirms Data Breach, Rhysida Claims the Cyberattack!
One of the world’s leading names in luxury boats, MarineMax, just revealed that hackers gained access to sensitive customer information in a data breach. The ...
Google’s New AI Search, Or a Gateway to Malware and Scams?
Search engines play a crucial role in guiding users to relevant and trustworthy information. Google, being the most popular search engine, constantly tries to improve ...
CWU Tech Trade Union Confirms Cyberattack Behind Email Outage  
The Communications Workers Union (CWU), representing a large number of employees in various sectors of the UK economy, including technology and telecommunications, is struck by ...
Finland Says APT31 Behind the 2021 Parliament Breach
The Finnish Police have officially confirmed that the APT31 hacking group, which has ties to the Chinese Ministry of State Security (MSS), was responsible for ...
Inc Ransom Threatens to Leak 3 Terabytes of Data From NHS Patient Records
The INC Ransom extortion gang has issued a threat to release three terabytes of data, claiming to have obtained it by breaching the National Health ...
CISA Issues Advisory to Devs to Address SQL Injection Vulnerabilities
CISA and the FBI have advised technology manufacturing company executives to conduct thorough reviews of their software and take necessary measures to address SQL injection ...
APT29 Russian Hackers Use WineLoader Malware to Target German Political Parties
The APT29 group is employing phishing attacks to distribute a backdoor called WineLoader malware. This malicious software enables the hackers to remotely access compromised devices ...
Local College in Illinois County Affected by Medusa Ransomware Attack
Henry County, located on the border of Illinois and Iowa, has recently experienced a Medusa ransomware attack. The cyberattack, which began on March 18, has ...
POC Exploit Released for Fortinet RCE Bug, Patch Now!
A critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have ...
This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!
CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the ...
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations approach data and network security. ...
Mintlify Data Breached Through Compromised GitHub Tokens
Mintlify Data Breached, Revokes Compromised Github Tokens and Implements New Security Measures! Mintlify recently encountered a data breach that led to the exposure of GitHub ...