Cyber Security
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
The AI Cyber Threat: How to Secure your Systems in the Age of Artificial Intelligence
The Rising Tide of Cybersecurity Threats in Hospitality: How Hotels Can Stay Secure this Summer
Why External Attack Surface Management Belongs at the Core of Your Cybersecurity Strategy
64 Million T-Mobile Customer Records Allegedly Exposed in New Data Leak
How to Defend Your Organization Against Scattered Spider’s Service Desk Attacks
Ivanti Workspace Control Exposes SQL Credentials Through Hardcoded Key Flaws
The Exploding Threat of Cybercrime-as-a-Service (CaaS): How it’s Reshaping the Cybercrime Landscape
Quantum Hacking Is Coming: How to Prepare with Post-Quantum Security Today
Interlock Ransomware Suspected in Kettering Health System-Wide Outage
RVTools Supply Chain Attack Delivered Bumblebee Malware via Trojanized Installer
Chinese Hackers Exploiting SAP NetWeaver Servers via Zero-Day Vulnerability
iClicker Website Compromised in ClickFix Malware Attack Targeting Students and Faculty
The Truth About Identity Attacks: How to Protect Your Business and Data
CISA Warns of Ongoing Cyber Threats to U.S. Oil and Gas Infrastructure
Play Ransomware Exploited Windows Logging Vulnerability in Zero-Day Attacks
The Rising Tide of Supply Chain Cybersecurity Risks in 2025
Fighting AI with AI: Using Artificial Intelligence to Strengthen Enterprise Cybersecurity
27 Million Records Allegedly Leaked from French Retailer Boulanger
13 Cybersecurity Assumptions That Are Getting You Hacked (And What to Do Instead)
Navigating the Complex Intersection of AI and Data Privacy
Cookie-Bite Attack Uses Chrome Extension to Steal Microsoft Session Tokens and Bypass MFA
Ad Fraud Operation ‘Scallywag’ Used WordPress Plugins to Generate 1.4 Billion Daily Ad Requests
FBI Warns of IC3 Impersonation Scam Targeting Victims of Online Fraud
Remote Desktop Protocol (RDP): A Double-Edged Sword for IT Teams
Google Faces £5 Billion UK Antitrust Lawsuit Over Search Advertising Practices
Skyward Specialty Insurance Data Breach Exposes Sensitive Information
Hacker Forum ‘Cracked’ Resurfaces Online After FBI Seizure in Global Cybercrime Operation
Wolters Kluwer Data Breach Claim Raises Alarms Across Fortune 500 Network
Fall River Public Schools Responds to Cybersecurity Breach
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Cyber Security News

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Detection Tools
  • Uncategorized
POC Exploit Released for Fortinet RCE Bug, Patch Now!
A critical vulnerability in Fortinet’s FortiClient Enterprise Management Server (EMS) software has been discovered and is currently being actively exploited in attacks. Security researchers have ...
This Week in Cybersecurity: 18th March to 22nd March, CISA Hacked!
CISA Hacked, IMF Breached, AT&T Data Leaked, United Healthcare Pays $2B CISA Hacked, Key Systems Forced Offline Unknown hackers have breached the systems of the ...
ZTA 101: A Comprehensive Guide to Understanding ‘Zero Trust Architecture’
Zero Trust Architecture (ZTA), often encapsulated in the phrase “Never Trust, Always Verify,” represents a paradigm shift in how organizations approach data and network security. ...
Mintlify Data Breached Through Compromised GitHub Tokens
Mintlify Data Breached, Revokes Compromised Github Tokens and Implements New Security Measures! Mintlify recently encountered a data breach that led to the exposure of GitHub ...
CISA Shares Advisory on Defending Critical Infrastructure Against Volt Typhoon
The Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and various other domestic and ...
Iranian Hackers Claimed Breach at Dimona Nuclear Facility in Israel
A group of Iranian hackers claim to have successfully breached the networks of the Dimona nuclear facility in Israel’s Negev desert. Israeli cybersecurity teams are ...
Hackers Breaching US Water Systems, White House and EPA Issues Warning
U.S. National Security Advisor, Jake Sullivan, and Environmental Protection Agency (EPA) Administrator, Michael Regan, issued a joint letter to governors, warning them about the increasing ...
Chinese APT ‘Earth Krahang’ Breaches 70 Organizations Across 45 Countries
The Earth Krahang hacking group has been conducting a large-scale cyber espionage campaign since early 2022 according to Trend Micro. Government agencies have been their ...
United Healthcare Pays $2B After Change Healthcare Cyber Attack, Health Insurers Split Over the Relief
Insurance industry executives and US health officials are optimistic that the impact of the Change Healthcare cyber attack is gradually diminishing, and the crisis is ...
Enhanced OSINT with DarkGPT, An AI Tool to Detect Leaked Databases
A Spanish security researcher “luijait “, recently unveiled an AI-powered tool called DarkGPT that aims to streamline the process of open-source intelligence (OSINT) gathering. DarkGPT ...
Timeline of Change Healthcare Cyberattack
On February 21, a highly significant and impactful cyberattack commenced against UnitedHealth Group’s Change Healthcare, causing severe disruption to the financial operations of hospitals, insurers, ...
CISA Hacked, Key Systems Forced Offline
Cybersecurity and Infrastructure Security Agency (CISA), which safeguards networks and systems across federal, state, local, tribal, and territorial governments, appears to have had one or ...
Fujitsu Hacked with Malware, Company Warns of Data Breach
Fujitsu Limited has reported the detection of malware on some of its operational computers, leading to possible personal and customer data breach. In response to ...
AT&T Data Leaked Impacting 70 Million but AT&T Denies Despite Strong Evidence
AT&T has responded to a recent incident where a hacker claimed to have leaked a large amount of data on a cybercrime forum. The Alleged ...
IMF Investigates Cybersecurity Breach that Compromised its Email Accounts
The International Monetary Fund (IMF) has announced that it is currently investigating a cybersecurity breach that resulted in the compromise of multiple internal email accounts. ...
This Week in Cybersecurity – 11th March to 15th March: Class Action Lawsuits Filed Against UnitedHealth Data Breach
Class Action Lawsuits Filed against UnitedHealth data breach, Acer Data Breached. Equilend and Stanford suffers ransomware attack, Play Ransomware leaks Swiss Documents, Donex ransomware on ...
StopCrypt Ransomware AKA STOP Djvu, Now Evades Detection
A new variant of the StopCrypt ransomware, also known as STOP, has been detected in the wild. This variant utilizes a multi-stage execution process that ...
Another Critical Fortinet RCE Flaw Exploited by Nation State Actors
CVE-2024-48788, like many others, is another critical Fortinet RCE flaw will is an attractive target for nation-state backed actors. Fortinet has addressed this critical remote ...
Cybersecurity Compliance: A Definitive Guide
In an era defined by digital transformation and data-driven operations, cybersecurity has become paramount. Organizations across the globe face an ever-expanding landscape of cyber threats ...
Advanced Data Security: Threat Intelligence Tools Essential Guide
As the digital realm becomes increasingly complex, organizations are recognizing the importance of arming themselves with advanced tools and insights to proactively secure their digital ...