Cyber Security
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
4 Crucial Automation Use Cases for Enterprise Security Automation
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Stanford Ransomware Attack: Data of 27,000 People Stolen Allegedly by Akira Ransomware
Stanford University has reported a Ransomware attack involving its Department of Public Safety (SUDPS) network. As a result of the Stanford ransomware attack, personal information ...
Hackers Abuse WordPress Plugin Flaw (CVE-2023-6000) to Infect 3,300 Websites
Hackers are compromising WordPress sites by taking advantage of a WordPress plugin flaw found in outdated versions of the Popup Builder plugin and infecting more ...
Equilend Data Stolen in a Ransomware Attack, Equiland Warns Employees
EquiLend Holdings, a securities lending platform based in New York, has confirmed in Equilend data breach notification letters that employee data was compromised in a ...
New DoNex Ransomware Targets Enterprises in the Wild
Organizations in the United States and Europe are facing a significant threat from a new strain of the “DoNex ransomware.” This malicious software has been ...
Microsoft Says Russian Hackers “Midnight Blizzard” AKA ‘Nobelium’ Stole Source Code in Cyberespionage
Microsoft recently announced that it had discovered a cyber attack conducted by Russian hackers group called “Midnight Blizzard” AKA ‘Nobelium’. Russian Hackers from Midnight Blizzard ...
Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
The Magnet Goblin hackers, driven by financial motives, use 1-day vulnerabilities to breach servers and install custom Linux malware NerbianRAT and MiniNerbian. What are 1-day ...
Play Ransomware Leaked 65,000 Stolen Swiss Government Documents
The National Cybersecurity Centre (NCSC) of Switzerland recently published a report detailing their analysis of a data breach that occurred as a result of a ...
This Week in Cybersecurity – 4th March to 8th March UnitedHealth Cyberattack Fallout Stretches Beyond Class Action Lawsuits
UnitedHealth Cyberattack Results in Class Action Lawsuits, Change Healthcare Makes a $22 Million Ransom Payment, Houser LLP and Epic Games Data Breached, OKTA Phishing Continues. ...
UnitedHealth Cyberattack is ‘A Mess’, Ongoing Fallout Poses Threat to Financial Health of Medical Providers
Impact of UnitedHealth Cyberattack on Healthcare Providers Medical providers in Minnesota are describing the aftermath of the UnitedHealth Cyberattack as an “absolute mess” that poses ...
AlphV Received a $22 Million Payment After Change Healthcare Ransomware Attack, the Second Largest Ransom Payment!
Evidence on the Bitcoin blockchain indicates that Change Healthcare, the victim of a significant may have made a substantial payment. Change Healthcare Ransomware Cause Major ...
American Express Data Breach 2024: Credit Card Data and Personal Information of Customers Compromised
UPDATE 3/4/24: American Express clarified that it was a merchant processor who was hacked and not one of their service providers. The company, under the ...
City of Hamilton Hit by Ransomware Attack
Hamilton ransomware attack has significantly disrupted city services for more than a week. During a virtual call on Monday afternoon, City manager Marnie Cluckie and ...
Class Action Lawsuits Follow Houser LLP Data Breach
Houser LLP, a business litigation law firm, is facing a class action lawsuit in California federal court. The lawsuit alleges that the firm’s negligence in ...
Ukraine Claims Russian Defense Ministry Hacked by GUR
According to an official press release on a Ukrainian government domain, the Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense has reported successfully breaching ...
Fortnite game Developer Epic Games Breached by Mogilevich Ransomware
UPDATE 3/3/24: A Mogilevich spokesperson has confirmed that the whole Epic Games Breach Fiasco was a money-minting scam and is not a ransomware operation. A ...
Epic Games Data Breach Update! Mogilievich’s Ransomware Group Confesses Epic Games Breach Was a Scam
The Mogilievich ransomware group has now admitted that their claim regarding the Epic Games data breach was false. A new ransomware group has asserted that ...
‘UNC1945’ Uses GTPDOOR Linux Malware to Target Mobile Operators
Security researcher HaxRob has recently identified a Linux backdoor called GTPDOOR that has not been previously documented. This backdoor appears to have been specifically developed ...
Hackers Leverage Okta Phishing Attacks to Target FCC and Popular Crypto Firms
Hackers are using a new phishing kit called CryptoChameleon in advanced Okta phishing attacks. The phishing kit is currently being used to target employees of ...
This Week in Cybersecurity – 26th Feb to 1st March: LockBit Ransomware Returns
LockBit Ransomware Returns, BlackCat Ransomware Disrupts Healthcare, Rhysida Ransomware Targets Hospitals! Return of the Lockbit: LockBit Ransomware Returns and ReLaunches Its Dark Web Leak Site ...
Bifrost Malware Mimics VMware Domain on Linux for Evasion
A recently discovered Linux variant of the Bifrost malware RAT (remote access Trojan) has implemented several innovative methods to evade detection. This includes the use ...