Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
22-10Help Net Security

Palo Alto Networks extends security into harsh industrial environments

22-10Help Net Security

Roundcube XSS flaw exploited to steal credentials, email (CVE-2024-37383)

22-10Help Net Security

Ivanti Neurons for App Control strengthens endpoint security

22-10Help Net Security

Fastly DDoS Protection blocks malicious traffic

22-10Tweakers

Internet Archive getroffen door nieuw datalek via supportplatform

22-10BBC

Blade Runner 2049 maker sues Musk over robotaxi images

22-10Infosecurity

Think Tanks Urge Action to Curb Misuse of Spyware and Hack-for-Hire

22-10Infosecurity

AI-Powered Attacks Flood Retail Websites

22-10The Hacker News

VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability

22-10Bleepingcomputer

Over 6,000 WordPress hacked to install plugins pushing infostealers

22-10Bleepingcomputer

Over 6,000 WordPress hacked to install plugins pushing infostealers

22-10Help Net Security

IT security and government services: Balancing transparency and security

22-10Help Net Security

IT security and government services: Balancing transparency and security

22-10Help Net Security

Myths holding women back from cybersecurity careers

22-10Help Net Security

Myths holding women back from cybersecurity careers

22-10Help Net Security

Hackers are finding new ways to leverage AI

22-10Help Net Security

Hackers are finding new ways to leverage AI

22-10Help Net Security

Whitepaper: Securing GenAI

22-10Help Net Security

Whitepaper: Securing GenAI

22-10Help Net Security

Fortinet releases patches for undisclosed critical FortiManager vulnerability

22-10Help Net Security

Fortinet releases patches for undisclosed critical FortiManager vulnerability

22-10Tweakers

Sophos wil Dells securitybedrijf Secureworks voor 859 miljoen dollar overnemen

22-10Infosecurity

Severe Flaws Discovered in Major E2EE Cloud Storage Services

22-10Infosecurity

Stolen Access Tokens Lead to New Internet Archive Breach

22-10Infosecurity

50,000 Files Exposed in Nidec Ransomware Attack

22-10Infosecurity

Netskope Reports Possible Bumblebee Loader Resurgence

22-10Infosecurity

Australia's Privacy Watchdog Publishes Guidance on Commercial AI Products

22-10Security Magazine

Redrawing the line of perimeter protection

22-10Security Magazine

SolarWinds Help Desk software vulnerability added to CISA catalogue

22-10Security Magazine

A CISO’s guide to creating a cyber resilience toolkit

22-10The Hacker News

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

22-10The Hacker News

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

22-10The Hacker News

Guide:  The Ultimate Pentest Checklist for Full-Stack Security

22-10The Hacker News

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20)

21-10Help Net Security

The Internet Archive breach continues

21-10Help Net Security

Ataccama ONE v15.3 empowers data teams to monitor, manage, and utilize data

21-10Infosecurity

Half of Organizations Have Unmanaged Long-Lived Cloud Credentials

21-10Infosecurity

Half of Organizations Have Unmanaged Long-Lived Cloud Credentials

21-10The Hacker News

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

21-10Bleepingcomputer

Severe flaws in E2EE cloud storage platforms used by millions

21-10Bleepingcomputer

Internet Archive breached again through stolen access tokens

21-10Help Net Security

Building secure AI with MLSecOps

21-10Help Net Security

Evolving cybercriminal tactics targeting SMBs

21-10Help Net Security

Aranya: Open-source toolkit to accelerate secure by design concepts

21-10Help Net Security

Aranya: Open-source toolkit to accelerate secure by design concepts

21-10Help Net Security

Should the CISOs role be split into two functions?

21-10Help Net Security

Should the CISOs role be split into two functions?

21-10Security Magazine

Navigating the new terrain: Pioneering smart solutions in retail

21-10Security Magazine

Navigating the new terrain: Pioneering smart solutions in retail

20-10The Hacker News

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

20-10Techcrunch

Women in AI: Dr. Rebecca Portnoff is protecting children from harmful deepfakes

20-10Techcrunch

23andMe faces an uncertain future — so does your genetic data 

20-10Bleepingcomputer

Microsoft creates fake Azure tenants to pull phishers into honeypots

20-10CyberExperts

Short-Term Profitability vs. Long-Term Cybersecurity

20-10CyberExperts

Short-Term Profitability vs. Long-Term Cybersecurity

19-10The Hacker News

Acronym Overdose – Navigating the Complex Data Security Landscape

19-10The Hacker News

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

19-10Help Net Security

Microsoft lost some customers’ cloud security logs

19-10Help Net Security

Israeli orgs targeted with wiper malware via ESET-branded emails

19-10Techcrunch

Fluid Truck files for Chapter 11 bankruptcy and pursues sale after leadership shakeup

19-10Techcrunch

Acrew Capital hits five years, raises $700M

19-10Bleepingcomputer

Cisco takes DevHub portal offline after hacker publishes stolen data

19-10Bleepingcomputer

Tech giant Nidec confirms data breach following ransomware attack

19-10Bleepingcomputer

How to leverage $200 million FCC program boosting K-12 cybersecurity

19-10BBC

Alleged Bitcoin hacker searched 'signs the FBI is after you'

19-10Infosecurity

Internet Archive and Wayback Machine Resurrect After DDoS Wave

19-10Infosecurity

macOS Vulnerability Could Expose User Data, Microsoft Warns

19-10Infosecurity

Instagram Rolls Out New Sextortion Protection Measures

19-10Tweakers

FBI houdt 25-jarige man aan wegens hacken X-account van beurstoezichthouder SEC

19-10Security Magazine

93% of hackers believe enterprise AI tools create a new attack vector

19-10Security Magazine

68% of healthcare workers experienced a supply chain attack

19-10The Hacker News

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

19-10The Hacker News

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

19-10The Hacker News

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

19-10The Hacker News

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

18-10Help Net Security

Arrested: USDoD, Anonymous Sudan, SEC X account hacker

18-10Infosecurity

US Arrest Man for SEC X Account Hack

18-10The Hacker News

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

18-10Techcrunch

Feds arrest man who allegedly participated in hack of the SEC’s X account, boosting Bitcoin’s

18-10Bleepingcomputer

Microsoft warns it lost some customer's security logs for a month

18-10Bleepingcomputer

FBI arrest Alabama man suspected of hacking SEC's X account

18-10Bleepingcomputer

Undercover North Korean IT workers now steal data, extort employers

18-10Bleepingcomputer

BianLian ransomware claims attack on Boston Children's Health Physicians

18-10Bleepingcomputer

Hackers blackmail Globe Life after stealing customer data

18-10Bleepingcomputer

Top 5 Cloud Security Automations for SecOps Teams

18-10Techcrunch

Microsoft said it lost weeks of security logs for its customers’ cloud products

18-10Help Net Security

Despite massive security spending, 44% of CISOs fail to detect breaches

18-10Help Net Security

What to do if your iPhone or Android smartphone gets stolen?

18-10Help Net Security

Cybercrime’s constant rise is becoming everyone’s problem

18-10Help Net Security

New infosec products of the week: October 18, 2024

18-10Help Net Security

Fake Google Meet pages deliver infostealers

18-10Tweakers

FileZilla Server 1.9.3

18-10Tweakers

AIVD en RDI noemen defensief gebruik generatieve AI 'onvermijdelijk'

18-10BBC

Netflix hikes prices in some countries as growth fades

18-10Infosecurity

Cicada3301 Ransomware Targets Critical Sectors in US and UK

18-10Infosecurity

US Charges Anonymous Sudan Members in DDoS Cybercrime Case

18-10Infosecurity

Iranian Hackers Target Critical Infrastructure with Brute Force Attacks

18-10Infosecurity

North Korea Escalates Fake IT Worker Schemes to Extort Employers

18-10Security Magazine

5 reasons why healthcare organizations need a SIEM tool

18-10Security Magazine

Research observes threat activity targeting 2024 Presidential Election

Onze partners

Ook partner worden?