Cyber Security
Interlock Ransomware Suspected in Kettering Health System-Wide Outage
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Chinese Hackers Exploiting SAP NetWeaver Servers via Zero-Day Vulnerability
iClicker Website Compromised in ClickFix Malware Attack Targeting Students and Faculty
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
FIN7 Attempts Phishing at American Automaker’s IT Staff
News
FIN7 Attempts Phishing at American Automaker’s IT Staff
The financially motivated threat actor known as FIN7 recently executed a targeted attack against a prominent U.S. car manufacturer. Their ...
8Base Ransomware Claims Breach on Atlantic States Marine Fisheries Commission
News
8Base Ransomware Claims Breach on Atlantic States Marine Fisheries Commission
A fisheries management organization on the East Coast is currently addressing a cyber incident in response to claims made by ...
Cerebral Settles Suit at $7 Million in Facebook Pixel Data Leak Case
News
Cerebral Settles Suit at $7 Million in Facebook Pixel Data Leak Case
The U.S. Federal Trade Commission has recently reached a settlement with telehealth firm Cerebral. As part of the settlement, Cerebral ...
Daixin Ransomware Claims Omni Hotels Cyberattack
Ransomware
Daixin Ransomware Claims Omni Hotels Cyberattack
The Daixin Team ransomware gang has taken responsibility for a recent cyberattack on Omni Hotels & Resorts and is currently ...
Chipmaker Nexperia Data Breached, Ransomware Gang Leaks Data on Dunghill Leaks
Ransomware
Chipmaker Nexperia Data Breached, Ransomware Gang Leaks Data on Dunghill Leaks
Nexperia, a Dutch chipmaker, recently confirmed that its network was compromised by hackers in March 2024. The breach came to ...
RansomHub Ransomware Gang Leaks Stolen Change Healthcare Data
Ransomware
RansomHub Ransomware Gang Leaks Stolen Change Healthcare Data
The ransomware group known as RansomHub has started releasing what they assert to be corporate and patient data obtained from ...
Giant Tiger Data Breached, 2.8M Records Leaked Online
News
Giant Tiger Data Breached, 2.8M Records Leaked Online
In March 2024, Canadian retail chain Giant Tiger made a public announcement regarding a data breach. A threat actor has ...
Major Data Breach at US Environmental Protection Agency, Over 8.5 Million Records Leaked by USDoD
News
Major Data Breach at US Environmental Protection Agency, Over 8.5 Million Records Leaked by USDoD
The United States Environmental Protection Agency (EPA) has suffered a massive data breach resulting in the leak of personal information ...
CVS Cyberattack Disrupts Veterinary Operations
News
CVS Cyberattack Disrupts Veterinary Operations
CVS Group, a prominent veterinary services provider in the UK, has recently experienced a cyberattack that has caused disruptions to ...
Targus Hit by Cyberattack, File Systems Compromised
News
Targus Hit by Cyberattack, File Systems Compromised
Mobile device accessory manufacturer Targus has disclosed a cyberattack targeting its internal systems earlier this month. In a regulatory filing, ...
Home Depot Data Breach Leaks Over 10,000 Employee Records
News
Home Depot Data Breach Leaks Over 10,000 Employee Records
Home improvement retail giant Home Depot has disclosed a third-party data breach that exposed personal information of approximately 10,000 employees. ...
Jackson County Goes into Emergency Mode After Ransomware Attack
News
Jackson County Goes into Emergency Mode After Ransomware Attack
Jackson County, Missouri, is currently facing a state of emergency following a ransomware attack that occurred on Tuesday. This cyberattack ...
10 Class Action Lawsuits Filed Against AT&T After Admitting 73 Million Customer Records Exposed in Data Breach
News
10 Class Action Lawsuits Filed Against AT&T After Admitting 73 Million Customer Records Exposed in Data Breach
AT&T got Sued for Negligence After Admitting that 73 Million Customer Records Were Exposed in a data breach. No less ...
JIT Probe Reveals 2.7M Pakistani Citizens’ Data Breached for 5 Years, NADRA Blamed for Data Leak
Cybersecurity
JIT Probe Reveals 2.7M Pakistani Citizens’ Data Breached for 5 Years, NADRA Blamed for Data Leak
According to a probe by a joint investigation team, the personal records of over 2.7 million Pakistani citizens have been ...
FMU Suffers Widespread Cyberattack by INC Ransomware
News
FMU Suffers Widespread Cyberattack by INC Ransomware
Florida Memorial University (FMU) has reportedly experienced a cybersecurity breach by the INC Ransom group. The exact details of the ...
Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack
Cybersecurity
Omni Hotels Nationwide IT Outage Due to a Possible Cyberattack
Omni Hotels & Resorts has recently faced a system-wide IT outage that resulted in the disruption of its IT systems ...
AT&T Confirms Data Breach: Over 73 MILLION Accounts Compromised
News
AT&T Confirms Data Breach: Over 73 MILLION Accounts Compromised
AT&T, one of the largest telecom companies in the US, has confirmed a massive data breach impacting over 73 million ...
Poh Heng Jewellery Data Breached, Customer Info Compromised
News
Poh Heng Jewellery Data Breached, Customer Info Compromised
Poh Heng Jewellery data breached. Reports say that customers’ personal information may have been compromised. Poh Heng Jewellery recently informed ...
MarineMax Confirms Data Breach, Rhysida Claims the Cyberattack!
News
MarineMax Confirms Data Breach, Rhysida Claims the Cyberattack!
One of the world’s leading names in luxury boats, MarineMax, just revealed that hackers gained access to sensitive customer information ...
CWU Tech Trade Union Confirms Cyberattack Behind Email Outage  
News
CWU Tech Trade Union Confirms Cyberattack Behind Email Outage  
The Communications Workers Union (CWU), representing a large number of employees in various sectors of the UK economy, including technology ...

TOP CYBERSECURITY HEADLINES

SECURITYWEEK INDUSTRY EXPERTS

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Data Breaches Surge to Three-Year High in Australia: A Growing Threat to Privacy and Security
Data Breaches Surge to Three-Year High in Australia
23andMe to Pay $30 Million in Class Action Settlement for Data Breach Exposing 6.4 Million Customers
DNA testing giant 23andMe has agreed to pay $30 million to settle a class-action lawsuit stemming from a data breach that compromised the personal ...
FlyCASS Cockpit Security Breach: A Case Study of SQL Injection and its Impact on Critical Infrastructure
The recent discovery of a critical SQL injection vulnerability in the FlyCASS cockpit access security system should serve as a stark reminder for enterprise businesses: cybersecurity ...
This Week In Cybersecurity: 9th September to 13th September
Avis has reported a data breach involving unauthorized access to its business application, exposing customer names and potentially sensitive information.
What is a Whaling Phishing Attack?
Whaling phishing, also known simply as whaling, is a highly targeted and sophisticated form of phishing attack that specifically targets high-level executives within an organization, such ...
Veeam Backup & Replication RCE Flaw: A Looming Threat for Enterprises
A critical vulnerability, CVE-2024-40711, affecting Veeam Backup & Replication (VBR), has emerged as a significant threat to enterprises, with ransomware gangs poised to exploit it for data ...
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has emerged, posing a significant threat to businesses worldwide. The group has already claimed 19 victims on its ...
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
A major credit card data breach has impacted nearly 1.7 million individuals, raising concerns about the security of sensitive financial information.
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
A novel acoustic attack named ‘PIXHELL’ can leak secrets from audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.
Indodax Hack: A Major Blow to Indonesian Crypto Security
Hackers targeted Indodax's hot wallet, which is a cryptocurrency wallet that is connected to the internet and used for frequent transactions.
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
A critical severity vulnerability has been discovered in LiteSpeed Cache, a popular caching plugin used by over 6 million WordPress sites. The flaw, tracked as ...
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
GRU Unit 29155: A Growing Threat to Global Security
This Week In Cybersecurity: 2nd September to 6th September, VK Data Leak Exposes 390 Million Users
VK Data Leak, Voldemort Malware Abusing Google Sheets, DICK’S Sporting Goods Cyberattack and more.
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
This vulnerability, tracked as CVE-2024-7591, allows attackers to remotely execute commands on vulnerable devices, posing a significant risk to organizations relying on these products.
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Car Rental Giant Avis Suffers Data Breach, Exposing Customer Information
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Ransomware attacks targeting critical national infrastructure (CNI) organizations have reached alarming heights, with costs soaring to unprecedented levels. A new report from Sophos reveals a ...
Clearview AI Fined €30.5 Million for Unlawful Data Collection
Dutch Data Protection Authority Takes Action Against Clearview AI Facial Recognition Company
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
HikkI-Chan Claims Responsibility for VK Data Breach
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
North Korean threat actors, known for their sophisticated cyberattacks, have been targeting job seekers with a fake Windows video conferencing application disguised as FreeConference.com.
What is a DDoS Attack – A Complete Guide
This comprehensive guide delves into the intricacies of DDoS attacks, their mechanisms, common types, and effective mitigation strategies, empowering enterprise businesses to safeguard their online ...
BlackSuit (Royal) Ransomware: Conti Ransomware Reborn
Ivanti Workspace Control Exposes SQL Credentials Through Hardcoded Key Flaws
Texas Dept. of Transportation Breach Exposes 300,000 Crash Records in May 2025
Mirai Botnet Exploits Wazuh Servers via Remote Code Execution Vulnerability
FIN6 Hackers Target Recruiters with Fake Job Seekers and Malware-Loaded Resumes
4,000+ Fake Sites Used in Scam Marketplace Ads on Facebook to Impersonate Top Retail Brands
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
INC Ransomware: Master of Double Extortion
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
UNFI Breach: How One Cyberattack Shook the North American Food Supply
Ticketmaster Data from Snowflake Attack Appears Briefly on Arkana Security Extortion Site
Ransomware Attack on Sensata Technologies Leads to Data Breach Impacting Employee Information
United Natural Foods Cyberattack Disrupts Operations Across North America
Over 84,000 Roundcube Webmail Servers Exposed to Actively Exploited Remote Code Flaw
SentinelOne Targeted in Sophisticated China-Linked Supply Chain Attack Attempt
Scattered Spider: A Web of Social Engineering
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
Hacker Claims Massive Claro, Movistar Data Breach — Companies Dispute Authenticity
The New Era of AI in Cybersecurity: How AI-Generated Malware is Shaping Threats
ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap