Cyber Security
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
AT&T has responded to a recent incident where a hacker claimed to have leaked a large amount of data on a cybercrime forum. The Alleged ...
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
The International Monetary Fund (IMF) has announced that it is currently investigating a cybersecurity breach that resulted in the compromise of multiple internal email accounts. ...
This Week in Cybersecurity – 11th March to 15th March: Class Action Lawsuits Filed Against UnitedHealth Data Breach
Class Action Lawsuits Filed against UnitedHealth data breach, Acer Data Breached. Equilend and Stanford suffers ransomware attack, Play Ransomware leaks Swiss Documents, Donex ransomware on ...
StopCrypt Ransomware AKA STOP Djvu, Now Evades Detection
A new variant of the StopCrypt ransomware, also known as STOP, has been detected in the wild. This variant utilizes a multi-stage execution process that ...
Another Critical Fortinet RCE Flaw Exploited by Nation State Actors
CVE-2024-48788, like many others, is another critical Fortinet RCE flaw will is an attractive target for nation-state backed actors. Fortinet has addressed this critical remote ...
Cybersecurity Compliance: A Definitive Guide
In an era defined by digital transformation and data-driven operations, cybersecurity has become paramount. Organizations across the globe face an ever-expanding landscape of cyber threats ...
Advanced Data Security: Threat Intelligence Tools Essential Guide
As the digital realm becomes increasingly complex, organizations are recognizing the importance of arming themselves with advanced tools and insights to proactively secure their digital ...
Health Dept Office of Civil Rights Starts Probe into UnitedHealth Hack
The U.S. Department of Health and Human Services (HHS) is conducting an investigation into the UnitedHealth Hack caused by the Optum ransomware attack. Optum operates ...
6 Class Action Lawsuits Filed Against UnitedHealth Data Breach, More to Follow
UnitedHealth Group is facing multiple class action lawsuits related to the UnitedHealth Data Breach at its payment processing unit, Change Healthcare. Multiple class action lawsuits ...
Roku Data Breached: 15,000 Roku Accounts Sold for Only 50¢ Each on Dark Web
Roku Data Breach has resulted in more than 15,000 Roku accounts sold at a mere 50¢ price. Analysts say there is more to this incident. ...
Acer Data Breached: Acer Philippines Employee Data Leaked on a Hacking Forum
Acer Philippines has officially confirmed a huge employee data leak. The breach occurred through a third-party vendor responsible for managing Acer’s employee attendance data. The ...
Stanford Ransomware Attack: Data of 27,000 People Stolen Allegedly by Akira Ransomware
Stanford University has reported a Ransomware attack involving its Department of Public Safety (SUDPS) network. As a result of the Stanford ransomware attack, personal information ...
Hackers Abuse WordPress Plugin Flaw (CVE-2023-6000) to Infect 3,300 Websites
Hackers are compromising WordPress sites by taking advantage of a WordPress plugin flaw found in outdated versions of the Popup Builder plugin and infecting more ...
Equilend Data Stolen in a Ransomware Attack, Equiland Warns Employees
EquiLend Holdings, a securities lending platform based in New York, has confirmed in Equilend data breach notification letters that employee data was compromised in a ...
New DoNex Ransomware Targets Enterprises in the Wild
Organizations in the United States and Europe are facing a significant threat from a new strain of the “DoNex ransomware.” This malicious software has been ...
Microsoft Says Russian Hackers “Midnight Blizzard” AKA ‘Nobelium’ Stole Source Code in Cyberespionage
Microsoft recently announced that it had discovered a cyber attack conducted by Russian hackers group called “Midnight Blizzard” AKA ‘Nobelium’. Russian Hackers from Midnight Blizzard ...
Magnet Goblin Hackers Exploit 1-day Vulnerabilities to Deploy NerbianRAT Linux Malware
The Magnet Goblin hackers, driven by financial motives, use 1-day vulnerabilities to breach servers and install custom Linux malware NerbianRAT and MiniNerbian. What are 1-day ...
Play Ransomware Leaked 65,000 Stolen Swiss Government Documents
The National Cybersecurity Centre (NCSC) of Switzerland recently published a report detailing their analysis of a data breach that occurred as a result of a ...
This Week in Cybersecurity – 4th March to 8th March UnitedHealth Cyberattack Fallout Stretches Beyond Class Action Lawsuits
UnitedHealth Cyberattack Results in Class Action Lawsuits, Change Healthcare Makes a $22 Million Ransom Payment, Houser LLP and Epic Games Data Breached, OKTA Phishing Continues. ...
UnitedHealth Cyberattack is ‘A Mess’, Ongoing Fallout Poses Threat to Financial Health of Medical Providers
Impact of UnitedHealth Cyberattack on Healthcare Providers Medical providers in Minnesota are describing the aftermath of the UnitedHealth Cyberattack as an “absolute mess” that poses ...
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Tesco, Aldi Supplier Peter Green Chilled Hit by Ransomware, Disrupting UK Retail Supply Chains
SK Telecom Malware Breach Lasted 3 Years, Exposed 27 Million Phone Numbers
PowerSchool Hacker Pleads Guilty to Student Data Extortion Scheme
Mobile Carrier Cellcom Breached, Company Confirms Cyberattack Behind Extended Outages
VanHelsing Ransomware Builder Leaked by Former Developer on Hacking Forum
Arla Foods Upahl Site Hit by Cyberattack—What It Means for Food Supply Chains
Bypassing Antivirus: What Defendnot Reveals About the Weak Spots in Windows Security
BreachRx Raises $15M to Automate the Chaos of Incident Response
Scattered Spider Breached M&S via Third-Party TCS Credentials, Sources Confirm
Trojanized KeePass Installer Leads to Ransomware on VMware ESXi Servers
TeleMessage Breach Exposes U.S. Government Messaging Data, 410GB Archive Published by DDoSecrets
Arla Foods Cyberattack Disrupts German Production Site, Causes Delivery Delays
O2 Flaw Leaked Customer Geolocation Data to Any Caller
110,000+ Records Compromised: The NRS Cybersecurity Failure
Coinbase Insider Breach Exposes Customer Data and Government IDs; $20M Ransom Rejected
Hackers Target VMware ESXi and Microsoft SharePoint Zero-Days at Pwn2Own Berlin 2025
Adidas and Dior Confirm Customer Data Breaches Following Targeted Cyberattacks
CISA Flags Chrome Vulnerability CVE-2025-4664: Patch Before June 5th
Ransomware Gangs Adopt Skitnet Malware for Post-Exploitation Attacks in Enterprise Environments