Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
02-10Help Net Security

Week in review: MS Exchange zero-days exploited, AD attack paths, developing secure APIs

02-10Help Net Security

Kyndryl and Citrix join forces to help businesses improve workplace collaboration

02-10Nu.nl

Lifehack: Zo maak je een schermopname met je smartphone

01-10Forbes

New Microsoft Security Alert: Exchange 0-Days Confirmed, State-Sponsored Attacks Underway

01-10The Hacker News

Pay What You Want for This Collection of White Hat Hacking Courses

01-10The Hacker News

State-Sponsored Hackers Likely Exploited MS Exchange 0-Days Against ~10 Organizations

01-10The Hacker News

CISA Warns of Hackers Exploiting Critical Atlassian Bitbucket Server Vulnerability

01-10Help Net Security

SafePaaS announces extended identity governance and security capabilities

01-10Help Net Security

LMG Security expands its cybersecurity solutions and services

01-10Help Net Security

Cloudflare partners with Yubico to help customers in adopting a hardware key security model

01-10Help Net Security

Attackers use novel technique, malware to compromise hypervisors and virtual machines

01-10Bleepingcomputer

The Week in Ransomware - September 30th 2022 - Emerging from the Shadows

01-10Bleepingcomputer

CISA: Hackers exploit critical Bitbucket Server flaw in attacks

01-10Bleepingcomputer

Optus breach victims will get 'supercharged' fraud protection

01-10Bleepingcomputer

Germany arrests hacker for stealing €4 million via phishing attacks

01-10Infosecurity

Hackers Hide Malware in Windows Logo, Target Middle East Governments

01-10Infosecurity

Hackers Backdoor Pirated Windows OS With Cryptominer and Xtreme RAT

01-10Infosecurity

Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries

01-10Infosecurity

Microsoft Confirms Two Exchange Zero-Day Vulnerabilities

01-10Infosecurity

NCSC: UK Organizations Can Learn from Ukraine's Impressive Cyber Defenses

01-10Tweakers

ESET: Lazarus-hackers vielen defensiebedrijf aan door bekende bug in Dell-driver

01-10Tweakers

Microsoft waarschuwt voor actief misbruikte kwetsbaarheden in Exchange Server

01-10Security Magazine

Hacker groups assist Iranian protestors

01-10Security Magazine

How to mitigate the threat of deepfakes to enterprise organizations

01-10Security Magazine

Healthcare workers remain on the front line: Now against cyber threats

01-10Security Magazine

Security magazine opens up nominations for Top Cybersecurity Leaders

01-10The Hacker News

New Malware Families Found Targeting VMware ESXi Hypervisors

01-10The Hacker News

Cyber Attacks Against Middle East Governments Hide Malware in Windows logo

01-10The Hacker News

New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons

01-10The Hacker News

Why Organisations Need Both EDR and NDR for Complete Network Protection

01-10The Hacker News

North Korean Hackers Weaponizing Open-Source Software in Latest Cyber Attacks

30-09Bleepingcomputer

New Microsoft Exchange zero-days actively exploited in attacks

30-09Help Net Security

Two Microsoft Exchange zero-days exploited by attackers (CVE-2022-41040, CVE-2022-41082)

30-09Infosecurity

Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under New European Rules

30-09The Hacker News

Microsoft Confirms 2 New Exchange Zero-Day Flaws Being Used in the Wild

30-09Bleepingcomputer

New Microsoft Exchange zero-day actively exploited in attacks

30-09Bleepingcomputer

Hacking group hides backdoor malware inside Windows logo image

30-09Bleepingcomputer

Matrix: Install security update to fix end-to-end encryption flaws

30-09Bleepingcomputer

Microsoft: Lazarus hackers are weaponizing open-source software

30-09Bleepingcomputer

New Royal Ransomware emerges in multi-million dollar attacks

30-09Bleepingcomputer

How to protect your Mac against ransomware and other cyberthreats

30-09Bleepingcomputer

Upgraded Prilex Point-of-Sale malware bypasses credit card security

30-09Forbes

WhatsApp Issues Important Security Fix—Check Your App Version Now

30-09Help Net Security

New infosec products of the week: September 30, 2022

30-09Help Net Security

The current state of cloud security

30-09Help Net Security

The significance of parallel tasks execution for security teams

30-09Help Net Security

Top issues driving cybersecurity: Growing number of cybercriminals, variety of attacks

30-09Help Net Security

Are you inundated by a never-ending stream of cyberattacks?

30-09Help Net Security

Kanguru Defender LifePlanner secures personal information for the everyday user

30-09Help Net Security

Illumio Endpoint prevents breaches from spreading across endpoints

30-09Help Net Security

Trust Stamp Privtech helps government agencies protect against fraud

30-09Help Net Security

Identity Automation Universal Authentication Director improves security for students and educators

30-09Help Net Security

Truecaller Assistant filters out fraud and scam calls

30-09Infosecurity

Researchers Discover Chaos, a Golang Multipurpose Botnet

30-09Infosecurity

Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads

30-09Infosecurity

LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed

30-09Security Magazine

Quantifying the risk of cybersecurity

30-09Security Magazine

Why construction sites need proactive security

30-09Security Magazine

Security leaders talk lessons learned in SECURITY 500 Conference panel

30-09Security Magazine

Privacy and data protection in the wake of Dobbs

30-09Security Magazine

Attacker infiltrates Fast Company's systems

30-09Security Magazine

One-third of organizations lack complete enterprise risk management plans

30-09Security Magazine

Mitigating brand impersonation cyberattacks

30-09Security Magazine

81% of organizations suffered a cloud security incident last year

30-09The Hacker News

WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation

30-09The Hacker News

Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware

30-09The Hacker News

Researchers Uncover Covert Attack Campaign Targeting Military Contractors

30-09The Hacker News

Five Steps to Mitigate the Risk of Credential Exposure

30-09The Hacker News

Swachh City Platform Suffers Data Breach Leaking 16 Million User Records

30-09The Hacker News

Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks

29-09Help Net Security

Phishing activity exploded in Q2 2022

29-09Help Net Security

Embedded IoT security threats and challenges

29-09Help Net Security

Office exploits continue to spread more than any other category of malware

29-09Infosecurity

Mobile, Cloud and Email Are Top Threat Vectors For 2023

29-09Infosecurity

Crypto-Thieves Cost Victims 53 Times What They Make

29-09Infosecurity

IRS Warns of 'Industrial Scale' Smishing Surge

29-09Forbes

Intel Marches On With ‘Project Amber’ To Deliver Independent Trust Assurance

29-09Forbes

Google Confirms 20 New Chrome Security Problems, 5 High-Rated: Update Now

29-09Techcrunch

Daily Crunch: Fast Company hacker sends 2 ‘obscene and racist’ notifications to Apple News use

29-09Techcrunch

US senators aim to amend cybersecurity bill to include crypto

29-09Techcrunch

Amazon sheds some light on your would-be intruders with Blink Floodlight

29-09Bleepingcomputer

Hackers now sharing cracked Brute Ratel post-exploitation kit online

29-09Bleepingcomputer

Hacker shares how they allegedly breached Fast Company’s site

29-09Bleepingcomputer

Auth0 warns that some source code repos may have been stolen

29-09Bleepingcomputer

Stealthy hackers target military and weapons contractors in recent attack

29-09Bleepingcomputer

Ethernet VLAN Stacking flaws let hackers launch DoS, MiTM attacks

29-09Bleepingcomputer

Wazuh - The free and open source XDR platform

29-09Bleepingcomputer

Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks

29-09Help Net Security

Cloud security trends: What makes cloud infrastructure vulnerable to threats?

29-09Help Net Security

65% of companies are considering adopting VPN alternatives

29-09Help Net Security

SpyCast: Cross-platform mDNS enumeration tool

29-09Help Net Security

Data security trends: 7 statistics you need to know

29-09Help Net Security

BigID unveils data deletion capabilities to reduce cloud data risk

29-09Help Net Security

Digital Element Nodify enhancements provide security teams with VPN usage insights

29-09Help Net Security

Insight Managed XDR helps enterprises strengthen their security posture

29-09Help Net Security

Aunalytics Security Patching Platform protects users against system compromise

29-09Help Net Security

Malwarebytes enhances OneView platform to improve protection for SMB customers

29-09Help Net Security

Netography upgrades Fusion platform to address encryption and multi-platform gaps

29-09Infosecurity

WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022

29-09Infosecurity

Hackers Use Telegram and Signal to Assist Protestors in Iran

Onze partners

Ook partner worden?