#cybersecurity

[ follow ]
#data-breach
EU data protection
fromDatabreaches
1 day ago

'Deep concern' for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors' addresses

Sensitive information about domestic abuse survivors may be exposed due to a data breach, placing their safety at risk.
Cryptocurrency
fromTechCrunch
2 days ago

Coinbase says its data breach affects at least 69,000 customers | TechCrunch

Coinbase confirmed a significant data breach affecting over 69,000 customers, involving theft of personal and financial information.
Information security
fromDatabreaches
1 day ago

Hack of Opexus Was at Root of Massive Federal Data Breach

Opexus, a software company for US federal agencies, suffered a major data breach caused by two employees with a hacking past.
Digital life
fromTechCrunch
22 hours ago

Microsoft says Lumma password stealer malware found on 394,000 Windows PCs | TechCrunch

Microsoft and law enforcement have dismantled the Lumma malware operation affecting over 394,000 PCs, primarily targeting users through malicious downloads.
Information security
fromZDNET
21 minutes ago

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more

A massive breach exposed over 184 million unencrypted account credentials, compromising sensitive user information across numerous platforms.
EU data protection
fromDatabreaches
1 day ago

'Deep concern' for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors' addresses

Sensitive information about domestic abuse survivors may be exposed due to a data breach, placing their safety at risk.
Cryptocurrency
fromTechCrunch
2 days ago

Coinbase says its data breach affects at least 69,000 customers | TechCrunch

Coinbase confirmed a significant data breach affecting over 69,000 customers, involving theft of personal and financial information.
Information security
fromDatabreaches
1 day ago

Hack of Opexus Was at Root of Massive Federal Data Breach

Opexus, a software company for US federal agencies, suffered a major data breach caused by two employees with a hacking past.
Digital life
fromTechCrunch
22 hours ago

Microsoft says Lumma password stealer malware found on 394,000 Windows PCs | TechCrunch

Microsoft and law enforcement have dismantled the Lumma malware operation affecting over 394,000 PCs, primarily targeting users through malicious downloads.
Information security
fromZDNET
21 minutes ago

Massive data breach exposes 184 million passwords for Google, Microsoft, Facebook, and more

A massive breach exposed over 184 million unencrypted account credentials, compromising sensitive user information across numerous platforms.
#crowdstrike
#ransomware
fromIT Pro
1 hour ago
Information security

US healthcare firm postponed procedures after cyber attack knocked systems offline

Healthcare
fromMedCity News
3 days ago

The Changing Landscape of Ransomware: Why Healthcare Organizations Are Paying Less - MedCity News

Healthcare organizations are increasingly resisting ransom payments due to better cybersecurity measures and backup strategies.
Cryptocurrency
fromIT Pro
2 days ago

Why DragonForce is growing in prominence - with retailer attacks boosting its reputation

DragonForce is rapidly expanding its impact on cybersecurity with its innovative ransomware as a service model.
Information security
fromIT Pro
1 hour ago

US healthcare firm postponed procedures after cyber attack knocked systems offline

Kettering Health faced a cyberattack leading to the cancellation of patient appointments and potential threats to patient information.
Online marketing
fromThe Hacker News
4 hours ago

300 Servers and 3.5M Seized as Europol Strikes Ransomware Networks Worldwide

Operation Endgame has successfully dismantled cybercriminal infrastructures targeting ransomware, seizing €3.5 million and issuing arrest warrants against 20 key actors.
fromMedCity News
3 days ago
Healthcare

The Changing Landscape of Ransomware: Why Healthcare Organizations Are Paying Less - MedCity News

fromIT Pro
2 days ago
Cryptocurrency

Why DragonForce is growing in prominence - with retailer attacks boosting its reputation

#social-media
Marketing tech
fromThe Hacker News
2 days ago

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Counterfeit pages on Facebook are used to trick users into downloading malware disguised as Kling AI.
fromZDNET
2 hours ago
Social media marketing

Oversharing online? 5 ways it makes you an easy target for cybercriminals

Marketing tech
fromThe Hacker News
2 days ago

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

Counterfeit pages on Facebook are used to trick users into downloading malware disguised as Kling AI.
fromZDNET
2 hours ago
Social media marketing

Oversharing online? 5 ways it makes you an easy target for cybercriminals

Germany news
fromwww.dw.com
2 hours ago

Can Germany withstand massive cyberattacks? DW 05/23/2025

DDoS attacks are increasingly common and can disrupt essential services, highlighting the need for enhanced cybersecurity measures.
Roam Research
fromThe Hacker News
3 hours ago

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Threat actor ViciousTrap has compromised over 5,300 network devices globally, exploiting a critical Cisco vulnerability to create honeypot networks.
#malware
fromWIRED
20 hours ago
US news

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

Remote teams
fromThe Hacker News
1 day ago

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

UAT-6382 exploited a vulnerability in Trimble Cityworks to establish persistent access through advanced malware and web shells.
Social media marketing
fromTechzine Global
3 hours ago

TikTok videos are the latest malware attack vector

Malware is spreading via TikTok through social engineering, promoting infostealers like Vidar and StealC via user instructions.
TikTok's algorithm enhances the reach of malicious content, presenting challenges for traditional cybersecurity measures.
US news
fromWIRED
20 hours ago

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

The DanaBot operation exemplifies the intersection of cybercrime, state-sponsored activities, and espionage in Russia's hacker ecosystem.
#espionage
Privacy professionals
fromDatabreaches
5 hours ago

Mysterious hacking group Careto was run by the Spanish government, sources say

Researchers identified a sophisticated hacking group, Careto, linked to espionage efforts against the Cuban government, possibly connected to Spanish state actors.
Privacy professionals
fromDatabreaches
5 hours ago

Mysterious hacking group Careto was run by the Spanish government, sources say

Researchers identified a sophisticated hacking group, Careto, linked to espionage efforts against the Cuban government, possibly connected to Spanish state actors.
#data-security
fromComputerWeekly.com
2 days ago
Data science

Capital One pushes out data tokenisation | Computer Weekly

Capital One has expanded its data tokenisation tool availability to enhance data security for IT departments.
fromInfoQ
2 days ago
DevOps

HashiCorp's HCP Vault Radar Achieves General Availability with Vault Import Feature

HCP Vault Radar streamlines the identification and management of leaked secrets by integrating with HashiCorp Vault for improved security.
Privacy technologies
fromThe Atlantic
1 day ago

The Secrets of the World's Greatest Privacy Experts

Extreme-privacy consultants help individuals make their personal information difficult to find through sophisticated tools and strategies.
fromInfoQ
2 days ago
DevOps

HashiCorp's HCP Vault Radar Achieves General Availability with Vault Import Feature

#ethical-hacking
fromHackernoon
1 year ago
Growth hacking

The TechBeat: Police Officers Are Turning Into Reddit Mods Thanks to Amazon's Neighborhood Watch (5/23/2025) | HackerNoon

fromHackernoon
1 year ago
Growth hacking

The TechBeat: Police Officers Are Turning Into Reddit Mods Thanks to Amazon's Neighborhood Watch (5/23/2025) | HackerNoon

fromthehackernews.com
5 hours ago

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

SafeLine effectively blocks a wide range of common and advanced web attacks, achieving a detection rate of 99.45% and a false positive rate of 0.07%.
Web frameworks
#hacking
Information security
fromThe Hacker News
1 day ago

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

Ivanti Endpoint Manager Mobile vulnerabilities exploited by a China-based group pose significant risks across multiple sectors worldwide.
UK news
fromDatabreaches
1 day ago

Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

Russian hacking group APT28 was blamed for a widespread digital campaign posing serious risks across various sectors globally.
Coronavirus
fromTechCrunch
6 hours ago

Mysterious hacking group Careto was run by the Spanish government, sources say | TechCrunch

Careto is a sophisticated hacking group suspected to operate on behalf of the Spanish government, discovered by Kaspersky researchers.
Information security
fromThe Hacker News
1 day ago

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

Ivanti Endpoint Manager Mobile vulnerabilities exploited by a China-based group pose significant risks across multiple sectors worldwide.
UK news
fromDatabreaches
1 day ago

Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

Russian hacking group APT28 was blamed for a widespread digital campaign posing serious risks across various sectors globally.
Coronavirus
fromTechCrunch
6 hours ago

Mysterious hacking group Careto was run by the Spanish government, sources say | TechCrunch

Careto is a sophisticated hacking group suspected to operate on behalf of the Spanish government, discovered by Kaspersky researchers.
#ukraine
fromeuronews
7 hours ago
Russo-Ukrainian War

Report: Russian army hackers target Western aid supply to Ukraine

Russian military intelligence hackers targeted Western firms aiding Ukraine
Operations include breaching logistics and transport sectors for intelligence
Cyber attacks involved accessing thousands of internet-connected cameras
fromwww.independent.co.uk
2 days ago
UK news

UK and allies expose Russian cyber attacks on logistics firms aiding Ukraine

The Independent highlights critical issues in journalism and the importance of funding investigative reporting against the backdrop of Russian cyber activities targeting Ukraine.
Russo-Ukrainian War
fromeuronews
7 hours ago

Report: Russian army hackers target Western aid supply to Ukraine

Russian military intelligence hackers targeted Western firms aiding Ukraine
Operations include breaching logistics and transport sectors for intelligence
Cyber attacks involved accessing thousands of internet-connected cameras
#ai
#training
fromHackernoon
2 years ago
Information security

INE Security Partners With Abadnet Institute For Cybersecurity Training Programs In Saudi Arabia | HackerNoon

fromDevOps.com
1 day ago
Information security

INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia - DevOps.com

fromHackernoon
2 years ago
Information security

INE Security Partners With Abadnet Institute For Cybersecurity Training Programs In Saudi Arabia | HackerNoon

fromDevOps.com
1 day ago
Information security

INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia - DevOps.com

#data-protection
fromZDNET
1 day ago
Information security

How to safeguard your small business in the hybrid work era: 5 top cybersecurity solutions

fromHackernoon
2 years ago
Information security

Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls For Its Attack Surface | HackerNoon

fromZDNET
1 day ago
Information security

How to safeguard your small business in the hybrid work era: 5 top cybersecurity solutions

fromHackernoon
2 years ago
Information security

Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls For Its Attack Surface | HackerNoon

Marketing tech
fromHackernoon
2 years ago

ThreatBook Named a Notable Vendor In Global Network Analysis And Visibility (NAV) Independent Report | HackerNoon

ThreatBook's Threat Detection Platform has gained recognition in Forrester's NAV solutions report, highlighting its innovation and market presence.
fromNextgov.com
22 hours ago

An 18th-century war power resurfaces in cyber policy talks

The idea of privateering contracts - historically used for piracy - is being discussed to provide legal authority for private sector cyberattacks against adversaries like China.
Growth hacking
Information security
fromSecuritymagazine
1 day ago

Deepfake Scam or Inside Job? Rethinking the BEC Threat

The growing sophistication of BEC attacks, using deepfake technology, presents new challenges for businesses in verifying incidents and handling potential insider threats.
fromThe Hacker News
1 day ago

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

dMSA allows users to create them as a standalone account, or to replace an existing standard service account. When a dMSA supersedes an existing account, authentication...
Growth hacking
#vulnerabilities
Information security
fromMail Online
1 day ago

Experts warn of vulnerabilities as Chinese 'kill switches' revealed

Chinese devices may have 'kill switches' that allow remote access to Western energy infrastructure, posing significant security risks.
Information security
fromMail Online
1 day ago

Experts warn of vulnerabilities as Chinese 'kill switches' revealed

Chinese devices may have 'kill switches' that allow remote access to Western energy infrastructure, posing significant security risks.
fromThe Hacker News
1 day ago

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

A clear definition of 'reasonable' cybersecurity and why it matters to courts, regulators, and insurers.
Information security
Information security
fromThe Hacker News
1 day ago

Identity Security Has an Automation Problem-And It's Bigger Than You Think

Identity security is compromised by human error, with less than 4% of organizations fully automating identity workflows.
Automation gaps in identity security lead to vulnerabilities, as human reliance increases the risk of breaches.
#russia
Europe news
fromTheregister
1 day ago

Europe sanctions Putin's pals over 'hybrid' threats

The EU sanctions Russia-linked entities for GPS jamming and cyber threats to bolster security against hybrid attacks.
Russo-Ukrainian War
fromTheregister
1 day ago

Russia's Fancy Bear sticks its paws in transportation emails

Russian cyberspies have targeted Western logistics providers and government organizations involved in aid to Ukraine since 2022.
Europe news
fromTheregister
1 day ago

Europe sanctions Putin's pals over 'hybrid' threats

The EU sanctions Russia-linked entities for GPS jamming and cyber threats to bolster security against hybrid attacks.
Russo-Ukrainian War
fromTheregister
1 day ago

Russia's Fancy Bear sticks its paws in transportation emails

Russian cyberspies have targeted Western logistics providers and government organizations involved in aid to Ukraine since 2022.
fromNew York Post
1 day ago

We found the secret to blocking ads on streaming services, and it's life-changing

AdGuard is a powerful mobile and desktop ad blocker available for an unbeatable price of $15.97, offering lifetime access to an ad-free experience.
NYC startup
#euvd
Europe politics
fromTechzine Global
2 days ago

EUVD security database is Europe's next step towards autonomy

The EUVD serves as a necessary alternative to the threatened CVE database, emphasizing the EU's commitment to cybersecurity.
fromHackernoon
2 years ago
EU data protection

Attaxion Becomes The First EASM Platform To Integrate ENISA's EU Vulnerability Database (EUVD) | HackerNoon

Europe politics
fromTechzine Global
2 days ago

EUVD security database is Europe's next step towards autonomy

The EUVD serves as a necessary alternative to the threatened CVE database, emphasizing the EU's commitment to cybersecurity.
fromHackernoon
2 years ago
EU data protection

Attaxion Becomes The First EASM Platform To Integrate ENISA's EU Vulnerability Database (EUVD) | HackerNoon

Cryptocurrency
fromeuronews
2 days ago

Dutch citizens advised to keep cash on hand in case of emergency

The Netherlands' Central Bank advises keeping cash on hand for emergencies due to increasing geopolitical and cyber threats.
Artificial intelligence
fromIT Pro
2 days ago

Microsoft ramps up zero trust capabilities amid agentic AI push

AI agents must be treated as employees regarding security, requiring secure identification and not being trusted by default.
fromIT Pro
2 days ago

Sage wants to supercharge SMB accounting with new AI features

Sage has added AI-driven insights, automation, and improved connectivity to its Sage 50 accountancy and payroll product in a bid to drive SMB efficiency.
Business intelligence
#ms
#phishing
Privacy technologies
fromMail Online
2 days ago

Google issues warning to all 1.8b Gmail users over dangerous attack

Gmail users should be cautious of phishing emails that impersonate Google, especially those urging immediate actions regarding legal cases.
Privacy technologies
fromMail Online
2 days ago

Google issues warning to all 1.8b Gmail users over dangerous attack

Gmail users should be cautious of phishing emails that impersonate Google, especially those urging immediate actions regarding legal cases.
fromHackernoon
1 year ago

The TechBeat: There's No TensorFlow Without Tensors (5/21/2025) | HackerNoon

SnoopGame scales QA trust across indie to AAA studios by aligning early, staying lean, and delivering under pressure-when it matters most.
Growth hacking
fromHackernoon
10 months ago

Cybersecurity Giant Supercharges Apache SeaTunnel to Tame Complex Data | HackerNoon

A leading cybersecurity enterprise has enhanced Apache SeaTunnel to effectively address the challenges posed by diverse data sources and complex integration needs.
Scala
fromIT Pro
2 days ago

The UK's science funding agency is being bombarded with cyber attacks

These extensive incidents underline the severity of the threat facing public and private sector organisations on a daily basis.
Information security
Artificial intelligence
fromBusiness Matters
2 days ago

House of Lords AI Summit warns of 'relentless' cyber threats as UK races to close digital skills gap

Urgent action is needed to tackle the digital skills divide and cybersecurity threats posed by AI in the UK economy.
[ Load more ]