Cyber Security
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
The AI Cyber Threat: How to Secure your Systems in the Age of Artificial Intelligence
The Rising Tide of Cybersecurity Threats in Hospitality: How Hotels Can Stay Secure this Summer
Why External Attack Surface Management Belongs at the Core of Your Cybersecurity Strategy
64 Million T-Mobile Customer Records Allegedly Exposed in New Data Leak
How to Defend Your Organization Against Scattered Spider’s Service Desk Attacks
Ivanti Workspace Control Exposes SQL Credentials Through Hardcoded Key Flaws
The Exploding Threat of Cybercrime-as-a-Service (CaaS): How it’s Reshaping the Cybercrime Landscape
Quantum Hacking Is Coming: How to Prepare with Post-Quantum Security Today
Interlock Ransomware Suspected in Kettering Health System-Wide Outage
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Chinese Hackers Exploiting SAP NetWeaver Servers via Zero-Day Vulnerability
iClicker Website Compromised in ClickFix Malware Attack Targeting Students and Faculty
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
Neiman Marcus Data Breach Compromises Personal Information of 64,000
Neiman Marcus Discloses Data Breach as Hacker Offers Stolen Customer Data for Sale
CISA’s CSAT Tool Hacked – Sensitive Data from Chemical Facilities Potentially Compromised
The Cybersecurity and Infrastructure Security Agency (CISA) recently disclosed that its Chemical Security Assessment Tool (CSAT) was hacked by malicious actors between January 23-26, 2024. ...
Levi’s Data Breach Exposes Personal Data of Over 72,000 Customers
The iconic American clothing brand pioneering in denim jeans has suffered a data breach that may have compromised personal information of over 72,000 Customers.
IRS Publicly Apologizes for Ken Griffin Tax Data Breach, Ken Griffin’s Data Leak Suit Ends in Settlement
Large-scale IRS tax data breach leads to a public apology from IRS. The Ken Griffin's Data Leak Suit has now ended up in settlement.
CDK Ransomware Attack Update: CDK Global Provides Update on Recovery Efforts
CDK Global, a leading provider of automotive retail software, has informed its dealer clients that systems impacted by a recent ransomware attack likely will not ...
Truist Bank Data Breach Confirmed After Data Shows Up on Hacking Forums
Truist Bank Confirms Cyberattack After Stolen Data Surfaces Online
The Ascension Hack: How an Honest Mistake of an Employee Resulted in One of the Biggest Data Breaches
Ascension, one of the largest healthcare networks in the United States, revealed that a ransomware attack in May 2024 was caused after an employee downloaded ...
Jollibee Data Breach Affects 32 Million Customers
Fast food giant Jollibee investigates cybersecurity incident reported to involve customer data
BlackSuit Ransomware Gang Behind Massive Cyber Attack on CDK Global
The BlackSuit Ransomware Group is Held Responsible for Ongoing Outages and Disruption at Automotive SaaS Provider
Kaspersky Antivirus Software Banned in the US Over National Security Concerns
US Bans Kaspersky to Safeguard National Security Over Alleged Ties of the Antivirus Company With Russia.
Apple Data Breach Claimed by IntelBroker: Source Code Allegedly Exposed
IntelBroker Claims to Have Gained Access to Internal Source Code Renowned threat actor IntelBroker has claimed responsibility for the Apple data breach targeting one of ...
Cyber Attack on CDK Global Impacts Thousands of US Car Dealerships
Car dealership management software provider CDK Global was hit by a significant cyberattack that forced the company to take its systems offline, severely impacting thousands ...
This Week in Cybersecurity: 17th June to 21st June, AMD Data Breach
Maxicare and AMD Data Breach, Cyber Attack on CDK, US Bans Kaspersky AMD Data Breach: Intelbroker Violates AMD Again and Releases Sensitive Data The hacking ...
Data Breach at Maxicare Philippines Exposed Personal Records of Thousands of Members
Maxicare Healthcare Corp, one of the largest health maintenance organizations (HMOs) in the Philippines, has reported a major data breach to the National Privacy Commission ...
AMD Data Breach: Intelbroker Violates AMD Again and Releases Sensitive Data
Hacking Group Intelbroker Claims Possession of Stolen AMD Data
Email Spoofing 101: Understanding the Basics and How to Protect Your Enterprise Data
Email address spoofing is a deception technique used in spam and phishing attacks. Spoofers manipulate email headers to disguise their real identity and trick recipients ...
Cybersecurity 101 for Enterprise Privacy and Protection
Imagine a single event bringing your business to a standstill. Lost revenue, damaged reputation, and a scramble to contain the fallout – this is the ...
How AI is Revolutionizing Phishing Attacks
Phishing attacks have long been a major concern for enterprise organizations wordwide. As technology continues to advance, cybercriminals are finding new and innovative ways to ...
Enterprise Attack Surface Management (ASM) and Best Security Practices
Imagine a sprawling digital castle, brimming with sensitive data and critical operations. Every door, window, and hidden passage represents a potential entry point for cybercriminals. ...
How to Identify Fake Emails: A Guide to Email Threat Detection
Email remains a cornerstone of communication and business transactions in the digital age. However, this convenience comes with a hidden threat: cybercrime. Phishing scams, malware-laden ...