Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
17-09Help Net Security

ManageEngine enhances Log360 to reduce alert fatigue for SOC teams

17-09Help Net Security

How a fake ICS network can reveal real cyberattacks

17-09Help Net Security

Creating a compliance strategy that works across borders

17-09Infosecurity

Shai-Hulud Worm Prowls npm to Steal Hundreds of Secrets

17-09The Hacker News

Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims

17-09The Hacker News

DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM

17-09Help Net Security

Rayhunter: EFF releases open-source tool to detect cellular spying

17-09Help Net Security

Rayhunter: EFF releases open-source tool to detect cellular spying

17-09Help Net Security

Bots vs. humans? Why intent is the game-changer

17-09Help Net Security

Bots vs. humans? Why intent is the game-changer

17-09Help Net Security

Old file types, new tricks: Attackers turn everyday files into weapons

17-09Help Net Security

Old file types, new tricks: Attackers turn everyday files into weapons

17-09Help Net Security

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

17-09Help Net Security

Self-replicating worm hits 180+ npm packages in (largely) automated supply chain attack

17-09Help Net Security

Neon Cyber exits stealth with Workforce Cybersecurity Platform

17-09Help Net Security

Neon Cyber exits stealth with Workforce Cybersecurity Platform

17-09Help Net Security

Digital.ai brings expert-level cryptography to any developer team

17-09Help Net Security

Digital.ai brings expert-level cryptography to any developer team

17-09Help Net Security

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

17-09Help Net Security

Ransomware attackers used incorrectly stored recovery codes to disable EDR agents

17-09Help Net Security

N-able strengthens backup threat protection

17-09Help Net Security

N-able strengthens backup threat protection

17-09Techcrunch

Samsung patches zero-day security flaw used to hack into its customers’ phones

17-09Techcrunch

Samsung patches zero-day security flaw used to hack into its customers’ phones

17-09Bleepingcomputer

BreachForums hacking forum admin resentenced to three years in prison

17-09Bleepingcomputer

Self-propagating supply chain attack hits 187 npm packages

17-09Bleepingcomputer

Team-Wide VMware Certification: Your Secret Weapon for Security

17-09Bleepingcomputer

Jaguar Land Rover extends shutdown after cyberattack by another week

17-09Bleepingcomputer

Apple backports zero-day patches to older iPhones and iPads

17-09Bleepingcomputer

Webinar: Your browser is the breach — securing the modern web edge

17-09BBC

Deal is done to keep TikTok in the US, says Trump

17-09BBC

Deal is done to keep TikTok in the US, says Trump

17-09Infosecurity

Fifteen Ransomware Gangs “Retire,” Future Unclear

17-09Infosecurity

Fifteen Ransomware Gangs “Retire,” Future Unclear

17-09Infosecurity

Gucci and Alexander McQueen Hit by Customer Data Breach

17-09Infosecurity

Gucci and Alexander McQueen Hit by Customer Data Breach

17-09Infosecurity

Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads

17-09Infosecurity

Chinese AI Villager Pen Testing Tool Hits 11,000 PyPI Downloads

17-09Infosecurity

UK: Tax Refund-Themed Phishing Slows in 2025

17-09Infosecurity

UK: Tax Refund-Themed Phishing Slows in 2025

17-09Infosecurity

JLR Extends Production Halt After Cyber-Attack

17-09Infosecurity

JLR Extends Production Halt After Cyber-Attack

17-09CyberExperts

Unraveling SnakeDisk: Mustang Panda Targets Thailand with Yokai Cyberattack

17-09Security Magazine

When Employees Help Hackers: How Threat Actors Bypass MFA

17-09Security Magazine

Reading, Heeding, and Leading

17-09Security Magazine

Security Leaders Discuss Restaurant Brands International’s Vulnerabilities

17-09The Hacker News

RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains

17-09The Hacker News

RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains

17-09The Hacker News

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

17-09The Hacker News

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover

17-09The Hacker News

SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

17-09The Hacker News

SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

17-09The Hacker News

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

17-09The Hacker News

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

17-09The Hacker News

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

17-09The Hacker News

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

17-09The Hacker News

Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane

17-09The Hacker News

Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane

16-09Help Net Security

GitHub adds post-quantum protection for SSH access

16-09Help Net Security

Salt Security secures AI agent actions across enterprise APIs

16-09Help Net Security

Building security that protects customers, not just auditors

16-09Help Net Security

Google introduces VaultGemma, a differentially private LLM built for secure data handling

16-09Help Net Security

AI video surveillance could end privacy as we know it

16-09Infosecurity

API Threats Surge to 40,000 Incidents in 1H 2025

16-09Infosecurity

API Threats Surge to 40,000 Incidents in 1H 2025

16-09Infosecurity

FinWise Bank Warns of Insider Data Breach

16-09Infosecurity

FinWise Bank Warns of Insider Data Breach

16-09Security Magazine

U.S. Senator Calls for Investigation of Microsoft

16-09Security Magazine

U.S. Senator Calls for Investigation of Microsoft

16-09The Hacker News

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

16-09The Hacker News

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

16-09The Hacker News

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

16-09The Hacker News

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

16-09Help Net Security

Product showcase: Clean Links exposes what’s hiding behind a QR code

16-09Help Net Security

OT security needs continuous operations, not one-time fixes

16-09Help Net Security

Cybersecurity jobs available right now: September 16, 2025

16-09Help Net Security

Phishing campaign targets Rust developers

16-09Help Net Security

Proofpoint launches agentic AI to detect risks in communication channels

16-09Techcrunch

Company that owns Gucci, Balenciaga, other brands confirms hack

16-09Bleepingcomputer

Google confirms fraudulent account created in law enforcement portal

16-09Bleepingcomputer

New Phoenix attack bypasses Rowhammer defenses in DDR5 memory

16-09Bleepingcomputer

Microsoft says Windows September updates break SMBv1 shares

16-09BBC

Gucci, Balenciaga and Alexander McQueen private data ransomed by hackers

16-09Infosecurity

HybridPetya Mimics NotPetya, Adds UEFI Compromise

16-09Infosecurity

SEO Poisoning Targets Chinese Users with Fake Software Sites

16-09Infosecurity

AI-Forged Military IDs Used in North Korean Phishing Attack

16-09CyberExperts

Unveiling the Future: Tribal Conference Explores AI in Cybersecurity

16-09CyberExperts

Unveiling the Future: Tribal Conference Explores AI in Cybersecurity

16-09Security Magazine

When the Breach Isn’t Yours but the Headline Is: Managing Association Risk

16-09The Hacker News

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

16-09The Hacker News

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

16-09The Hacker News

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

15-09Help Net Security

Most enterprise AI use is invisible to security teams

15-09Help Net Security

Most enterprise AI use is invisible to security teams

15-09Help Net Security

Arkime: Open-source network analysis and packet capture system

15-09Help Net Security

Arkime: Open-source network analysis and packet capture system

15-09Infosecurity

CISA at Risk After OIG Accuses it of Wasting Federal Funds

15-09Infosecurity

CISA at Risk After OIG Accuses it of Wasting Federal Funds

15-09Infosecurity

Phishing Campaigns Drop RMM Tools for Remote Access

15-09Infosecurity

Phishing Campaigns Drop RMM Tools for Remote Access

Onze partners

Ook partner worden?