Cyber Security
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Google’s New AI Search, Or a Gateway to Malware and Scams?
Search engines play a crucial role in guiding users to relevant and trustworthy information. Google, being the most popular search engine, constantly tries to improve ...
CWU Tech Trade Union Confirms Cyberattack Behind Email Outage  
The Communications Workers Union (CWU), representing a large number of employees in various sectors of the UK economy, including technology and telecommunications, is struck by ...
Finland Says APT31 Behind the 2021 Parliament Breach
The Finnish Police have officially confirmed that the APT31 hacking group, which has ties to the Chinese Ministry of State Security (MSS), was responsible for ...
Inc Ransom Threatens to Leak 3 Terabytes of Data From NHS Patient Records
The INC Ransom extortion gang has issued a threat to release three terabytes of data, claiming to have obtained it by breaching the National Health ...
CISA Issues Advisory to Devs to Address SQL Injection Vulnerabilities
CISA and the FBI have advised technology manufacturing company executives to conduct thorough reviews of their software and take necessary measures to address SQL injection ...
APT29 Russian Hackers Use WineLoader Malware to Target German Political Parties
The APT29 group is employing phishing attacks to distribute a backdoor called WineLoader malware. This malicious software enables the hackers to remotely access compromised devices ...
Local College in Illinois County Affected by Medusa Ransomware Attack
Henry County, located on the border of Illinois and Iowa, has recently experienced a Medusa ransomware attack. The cyberattack, which began on March 18, has ...
POC Exploit Released for Fortinet RCE Bug, Patch Now!
A critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have ...
This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!
CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the ...
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations approach data and network security. ...
Mintlify Data Breached Through Compromised GitHub Tokens
Mintlify Data Breached, Revokes Compromised Github Tokens and Implements New Security Measures! Mintlify recently encountered a data breach that led to the exposure of GitHub ...
CISA Shares Advisory on Defending Critical Infrastructure Against Volt Typhoon
The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and various other domestic and ...
Iranian Hackers Claimed Breach at Dimona Nuclear Facility in Israel
A group of Iranian hackers claim to have successfully breached the networks of the Dimona nuclear facility in Israel’s Negev desert. Israeli cybersecurity teams are ...
Hackers Breaching US Water Systems, White House and EPA Issues Warning
U.S. National Security Advisor, Jake Sullivan, and Environmental Protection Agency (EPA) Administrator, Michael Regan, issued a joint letter to governors, warning them about the increasing ...
Chinese APT ‘Earth Krahang’ Breaches 70 Organizations Across 45 Countries
The Earth Krahang hacking group has been conducting a large-scale cyber espionage campaign since early 2022 according to Trend Micro. Government agencies have been their ...
United Healthcare Pays $2B After Change Healthcare Cyber Attack, Health Insurers Split Over the Relief
Insurance industry executives and US health officials are optimistic that the impact of the Change Healthcare cyber attack is gradually diminishing, and the crisis is ...
Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases
A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of open-source intelligence (OSINT) gathering. DarkGPT ...
Timeline of Change Healthcare Cyberattack
On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group’s Change Healthcare, causing severe disruption to the financial operations of hospitals, insurers, ...
CISA Hacked, Key Systems Forced Offline
Cybersecurity and Infrastructure Security Agency (CISA), which safeguards networks and systems across federal, state, local, tribal, and territorial governments, appears to have had one or ...
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer data breach. In response to ...
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Tesco, Aldi Supplier Peter Green Chilled Hit by Ransomware, Disrupting UK Retail Supply Chains
SK Telecom Malware Breach Lasted 3 Years, Exposed 27 Million Phone Numbers
PowerSchool Hacker Pleads Guilty to Student Data Extortion Scheme
Mobile Carrier Cellcom Breached, Company Confirms Cyberattack Behind Extended Outages
VanHelsing Ransomware Builder Leaked by Former Developer on Hacking Forum
Arla Foods Upahl Site Hit by Cyberattack—What It Means for Food Supply Chains
Bypassing Antivirus: What Defendnot Reveals About the Weak Spots in Windows Security
BreachRx Raises $15M to Automate the Chaos of Incident Response
Scattered Spider Breached M&S via Third-Party TCS Credentials, Sources Confirm
Trojanized KeePass Installer Leads to Ransomware on VMware ESXi Servers
TeleMessage Breach Exposes U.S. Government Messaging Data, 410GB Archive Published by DDoSecrets
Arla Foods Cyberattack Disrupts German Production Site, Causes Delivery Delays
O2 Flaw Leaked Customer Geolocation Data to Any Caller
110,000+ Records Compromised: The NRS Cybersecurity Failure
Coinbase Insider Breach Exposes Customer Data and Government IDs; $20M Ransom Rejected
Hackers Target VMware ESXi and Microsoft SharePoint Zero-Days at Pwn2Own Berlin 2025
Adidas and Dior Confirm Customer Data Breaches Following Targeted Cyberattacks
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
Ransomware Gangs Adopt Skitnet Malware for Post-Exploitation Attacks in Enterprise Environments