Cyber Security
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
This Week In Cybersecurity: 30th December to 03rd January
US Treasury Hack: Escalating Cyber Warfare Between US and China
Massive Healthcare Breaches Prompt Overhaul of US Cybersecurity Rules
WhatsApp Wins Against NSO Group: Judge Finds NSO Liable for Pegasus
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Trans-Northern Pipelines Hit by ALPHV Ransomware Attack
Trans-Northern Pipelines (TNPI) has confirmed and ALPHV ransomware attack that caused a breach within its internal network in November 2023. The company is currently conducting ...
LockBit Ransomware Claims Cyberattack on Fulton County, Georgia
The cyberattack on Fulton County, Georgia has been attributed to the LockBit ransomware gang. They are claiming responsibility for the breach and are threatening to ...
Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations
Proofpoint research has revealed that the Bumblebee malware has resurfaced after being absent from the cyber threat landscape for four months. The new Bumblebee malware ...
Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data
Prudential Financial recently experienced a network breach where unauthorized individuals gained access to employee and contractor data. The Prudential Financial breach affected the main systems ...
Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform
Hackers have allegedly abused a stolen private key to generate and steal approximately $290 million worth of PLA tokens. These tokens are used within the ...
What is the SLAM Method? Identify Phishing Emails with SLAM Method
SLAM method stands for: Stop, Look, Ask, and Manage. The method is four step framework that involves double-checking the Sender, Link, Attachment, and Message. What ...
Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a recently detected vulnerability in Roundcube email servers. This vulnerability, which was patched ...
Bank of America Data Breached: Customers Warned After Vendor Hacked  
The Bank of America data breach exposed personal information after Infosys McCamish Systems (IMS), one of its service providers, was hacked last year. The compromised ...
Free Rhysida Ransomware Decryptor Released for Windows
South Korean researchers have recently made a discovery regarding the Rhysida ransomware encryptor. They have identified an encryption flaw in the system, which allowed the ...
New Fortinet RCE flaw in SSL VPN Exploited in the Wild
Fortinet has issued a warning regarding a serious vulnerability in FortiOS SSL VPN. This Fortinet RCE flaw, identified as CVE-2024-21762 / FG-IR-24-015, poses a significant ...
Black Basta Ransomware Attack Hits Hyundai Motor Europe
Hyundai Motor Europe, the European division of Hyundai Motor Company based in Germany, recently fell victim to a Black Basta ransomware attack known as Black ...
Raspberry Robin Malware Uses One-Day Exploits to Target Windows
Recent versions of the Raspberry Robin malware have become more covert and employ one-day exploits that specifically target vulnerable systems. One-day exploits refer to code ...
Ransomware Attack Takes 18 Romanian Hospitals Offline
A recent cyber attack has disrupted the operations of 18 hospitals in Romania. The targeted healthcare management system, known as the Hipocrate Information System (HIS), ...
CISA Confirms New Fortinet RCE Bug Being Actively Exploited
Today, the Cybersecurity and Infrastructure Security Agency (CISA) has confirmed the active exploitation of a critical remote code execution (RCE) vulnerability that was recently patched ...
French Healthcare Data Breach Puts Data of Millions at Risk
Viamedis, a French healthcare services firm, recently experienced a cyberattack that resulted in the exposure of data belonging to policyholders and healthcare professionals in the ...
Verizon Data Breach Compromises Data of 63,000 Employees, Insider Leaks Data
Verizon Communications, a prominent telecommunications and mass media company in the United States, has recently disclosed an insider data breach that has affected nearly half ...
Lurie Children’s Hospital Cyberattack Cripples Healthcare Systems
Lurie Children’s Hospital in Chicago recently encountered a cyberattack that led to a temporary shutdown of its IT systems. Consequently, regular operations were disrupted, and ...
HPE Data Breached: HPE Investigates Data Breach After Data Being Stolen from a ‘Test Environment’
Hewlett Packard Enterprise (HPE) is currently conducting an investigation into the HPE Data Breach that led to massive data theft. This comes after a threat ...
ResumeLooters Gang Steal Data of 2 Million in XSS Attacks Using SQL injection
A threat group known as ‘ResumeLooters’ has successfully stolen the personal information of over two million job seekers by exploiting vulnerabilities in 65 legitimate job ...
CISA Advises Vendors to Secure SOHO Routers Against Volt Typhoon Attacks
The Cybersecurity and Infrastructure Security Agency has advised SOHO router manufacturers to strengthen their security against the ongoing Volt Typhoon attacks. CISA’s Guidelines Against Volt ...