Cyber Security
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
This Week In Cybersecurity: 16th December to 20th December
4 Crucial Automation Use Cases for Enterprise Security Automation
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Notorious LockBit Ransomware Disrupted by Global Police, NCA Takes Control of Website
With the LockBit ransomware disrupted, the LockBit’s Website has been taken over and replaced with law enforcement agencies’ logos from eleven nations. LockBit Ransomware Disrupted ...
Cactus Ransomware Claims to Have Stolen 1.5TB from Schneider Electric Data Breach
The Cactus ransomware group announced that they successfully infiltrated Schneider Electric’s network and seized approximately 1.5TB of data. As evidence, they have leaked 25MB of ...
Cyberattack On ETISALAT Claimed by LockBit Ransomware Group, Demands $100K for Stolen Data
The Cactus ransomware group announced that they successfully infiltrated Schneider Electric’s network and seized approximately 1.5TB of data. As evidence, they have leaked 25MB of ...
Critical RCE bugs Found in SolarWinds Access Rights Manager (ARM)
SolarWinds has successfully addressed multiple critical RCE bugs that were present in its Access Rights Manager (ARM) solution. Access Rights Manager (ARM) is a software ...
Hackers Claim Robert Half Data Breach, Put Sensitive Data on Sale
The notorious hackers, known as IntelBroker and Sanggiero, have announced that they possess a significant amount of data from Robert Half data breach and are ...
Blackcat/ALPHV Ransomware Claims loanDepot and Prudential Financial Breaches
The Blackcat/ALPHV ransomware gang has announced that they are responsible for infiltrating the networks of Prudential Financial, and for the loanDepot data breach. However, the ...
This Week in Cybersecurity: Feb 12th – Feb 16th, Ransomware Attack Takes 18 Romanian Hospitals Offline
Ransomware Attack Takes 18 Romanian Hospitals Offline A ransomware attack encrypted the database of the Hipocrate Information System, a medical services management platform used by ...
Health NZ Data Breach Compromises Personal Information of 12k Patients
Around 12,000 individuals have been affected in the Health NZ Data Breach cause by a data leak at Te Whatu Ora Covid 19, a healthcare ...
RansomHouse Performs Automated VMware ESXi Attack with MrAgent Tool
The RansomHouse ransomware group recently developed a tool called ‘MrAgent’ for VMware ESXi attacks and streamline the deployment of their data encrypter on multiple VMware ...
Microsoft Critical Exchange Bug Exploited as ‘zero-day’
Microsoft has issued an updated security advisory, warning about a critical vulnerability in Exchange Server. The Microsoft critical Exchange bug was exploited as a zero-day ...
Trans-Northern Pipelines Hit by ALPHV Ransomware Attack
Trans-Northern Pipelines (TNPI) has confirmed and ALPHV ransomware attack that caused a breach within its internal network in November 2023. The company is currently conducting ...
LockBit Ransomware Claims Cyberattack on Fulton County, Georgia
The cyberattack on Fulton County, Georgia has been attributed to the LockBit ransomware gang. They are claiming responsibility for the breach and are threatening to ...
Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations
Proofpoint research has revealed that the Bumblebee malware has resurfaced after being absent from the cyber threat landscape for four months. The new Bumblebee malware ...
Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data
Prudential Financial recently experienced a network breach where unauthorized individuals gained access to employee and contractor data. The Prudential Financial breach affected the main systems ...
Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform
Hackers have allegedly abused a stolen private key to generate and steal approximately $290 million worth of PLA tokens. These tokens are used within the ...
What is the SLAM Method? Identify Phishing Emails with SLAM Method
SLAM method stands for: Stop, Look, Ask, and Manage. The method is four step framework that involves double-checking the Sender, Link, Attachment, and Message. What ...
Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a recently detected vulnerability in Roundcube email servers. This vulnerability, which was patched ...
Bank of America Data Breached: Customers Warned After Vendor Hacked  
The Bank of America data breach exposed personal information after Infosys McCamish Systems (IMS), one of its service providers, was hacked last year. The compromised ...
Free Rhysida Ransomware Decryptor Released for Windows
South Korean researchers have recently made a discovery regarding the Rhysida ransomware encryptor. They have identified an encryption flaw in the system, which allowed the ...
New Fortinet RCE flaw in SSL VPN Exploited in the Wild
Fortinet has issued a warning regarding a serious vulnerability in FortiOS SSL VPN. This Fortinet RCE flaw, identified as CVE-2024-21762 / FG-IR-24-015, poses a significant ...