Cyber Security
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
COBIT 2019 vs. COBIT 5: What’s New and Why It Matters
The Soaring Cost of Data Breaches for Enterprise Businesses in 2024
ChatGPT is Down Worldwide Impacting Millions
Chinese Weaver Ant Hackers Spied on Telco Network for Four Years
10 Key Benefits of Cyber Tabletop Exercises
Network Security in a Digital World: Understanding and Mitigating Risks
WhatsApp Patches Zero-Day Flaw Exploited by Paragon Spyware
The Mirai Botnet: The Infamous DDoS Weapon
Compliance Isn’t Security: Why a Checklist Alone Won’t Stop Cyberattacks
Outsourcing Cybersecurity Could Save Your Company Millions – Here’s How
CISA Warns of Craft CMS Code Injection Flaw
Top Cyber Threats Facing Enterprise Businesses in 2025: A Comprehensive Guide
State-Sponsored Hackers Abuse Google’s Gemini AI for Attacks
Apple CPU Side-Channel Attacks (SLAP & FLOP) Threaten Safari Browser Security
Top 15 Networking Certifications to Supercharge Your Career in 2025
Top 10 Ransomware Groups of 2024: The Year’s Most Active Cyber Threats
Top 15 Cyberattacks of 2024: The Worst Incidents for Enterprise
Nuclei Vulnerability Allows Signature Bypass and Code Execution
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
CISA Issues Emergency Directive on Ivanti Zero-Day, Demands Immediate Action from Federal Agencies
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive to Federal Civilian Executive Branch (FCEB) agencies. The directive aims to address two ...
Tietoevry Ransomware Attack Causes Widespread Disruptions for Swedish Customers, Akira Ransomware Behind the Incident
Tietoevry, a Finnish IT services and enterprise cloud hosting provider, experienced a ransomware attack that affected their cloud hosting customers in one of their data ...
This Week in Cybersecurity: 15th Jan – 19th Jan: 178K SonicWall Firewalls Fell to DoS and RCE Attacks
Over 178K SonicWall Firewalls Exposed to DoS and RCE Attacks 178k SonicWall firewalls are exposed online and vulnerable to DoS and potential RCE attacks due ...
Trezor Security Breach Affects 66k Users in a Phishing Scam
Trezor Security Breach: What Happened? Trezor, a manufacturer of hardware wallets, recently reported a security breach. Approximately 66,000 user’s contact information was exposed due to ...
Ukraine Blackjack Hackers Steal 500 Russian MoD’s Objects
According to sources from RBC-Ukraine, Ukrainian Blackjack Hackers, who are believed to be associated with the Security Service of Ukraine (SSU), have successfully breached a ...
Kansas State University Cyberattack Disrupts Email, Phone, Payment Systems
The Kansas State University Cyberattack has disrupted IT network and services including Email, Phone and Payment Systems. Kansas State University cybersecurity incident has caused disruptions ...
Bigpanzi Botnet Targets 170k Android TV Set Top Boxes with Bigpanzis Custom Malware
The Bigpanzi cybercrime gang has been generating substantial profits by infecting Android TV, Android TV boxes and various eCos set-top boxes with Bigpanzi botnet malware, ...
Google Discreetly Changes Chrome’s Incognito Warning Amidst the Google Class Action lawsuit
Google recently made a quiet update to the description of its private browsing feature in the latest Canary build of Google Chrome Browser, version 122.0.6251.0. ...
Hackers Use Androxgh0st Malware Botnet to Steal AWS and Microsoft credentials: CISA and FBI Issues Warning
The FBI and Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about the Androxgh0st malware botnet. They have been conducting investigations to understand ...
Windows SmartScreen Vulnerability Exploited: Phemedrone Stealer Malware Used for Crypto Siphoning
A recent Crypto Siphoning malware campaign called Phemedrone has been discovered. Phemedrone is an information-stealing malware that takes advantage of a Microsoft Windows SmartScreen Vulnerability ...
Over 178K SonicWall Firewalls Exposed to DoS and RCE Attacks
Security researchers have discovered that more than 178k SonicWall firewalls are vulnerable to DOS and RCE attacks. This flaw was found in vulnerable SonicWall firewalls ...
Juniper Fixes Junos OS Critical RCE Vulnerability in its SRX and EX Devices
Juniper Networks has recently addressed a Critical RCE Vulnerability in their SRX Series firewalls and EX Series switches. This issue, labeled as CVE-2024-21591, is a ...
This Week in Cybersecurity: 8th Jan – 12th Jan – SEC X Account Hack Creates Chaos
US SEC X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet The U.S. Securities and Exchange Commission’s X account experienced a security breach. As ...
SEC Account Hack Again Catches News Spotlight Amidst Security Concerns
The recent SEC account hack on X has raised fresh concerns regarding the security of the social media platform. These concerns have been amplified since ...
10 Major Data Breaches and Cyber Attacks 2023
Cyber attacks today have become a daily occurrence in today’s hyperconnected world. With more users and devices getting online each day, there is an ever-increasing ...
Ivanti Critical EPM Bug Allows Hackers to Hijack EPM Devices
Ivanti has successfully addressed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM). The Ivanti critical EPM bug had the potential ...
US SEC’s X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet
The U.S. Securities and Exchange Commission’s X account experienced a security breach. As a result, a false Bitcoin ETF Approval Tweet on security exchanges was ...
LockBit Ransomware Claims Capital Health Attack, Threatens to Leak Sensitive Data
The LockBit ransomware group has acknowledged their involvement in the Capital Health attack that took place in November 2023. The adversaries are now issuing a ...
Ukrainian Hacker Group Takes Down Moscow ISP as a Revenge for Kyivstar Cyber Attack
A Ukrainian hacker group, believed to be connected to Ukraine’s intelligence took and carried out a destructive attack on the servers of a Moscow-based internet ...
Hackers Can Now Access Your Google Accounts Without Password
Security researchers have recently discovered a sophisticated hacking technique that enables cyber criminals to gain unauthorized entry into individuals’ Google accounts without passwords. In-depth analysis ...