Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
14-04Tweakers

Schoolboekenleverancier Iddink is getroffen door ransomwareaanval

14-04Bleepingcomputer

Hacker claims Giant Tiger data breach, leaks 2.8M records online

14-04Bleepingcomputer

Palo Alto Networks zero-day exploited since March to backdoor firewalls

14-04The Hacker News

Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts

14-04The Hacker News

U.S. Treasury Hamas Spokesperson for Cyber Influence Operations

13-04Bleepingcomputer

UK flooded with forged stamps despite using barcodes — to prevent just that

13-04The Hacker News

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

13-04Bleepingcomputer

Telegram fixes Windows app zero-day used to launch Python scripts

13-04Bleepingcomputer

Ex-Amazon engineer gets 3 years for hacking crypto exchanges

13-04Bleepingcomputer

Roku warns 576,000 accounts hacked in new credential stuffing attacks

13-04Techcrunch

API startup Noname Security nears $500M deal to sell itself to Akamai

13-04Techcrunch

Security engineer jailed for 3 years for $12M crypto hacks

13-04Techcrunch

Roku says 576,000 user accounts hacked after second security incident

13-04Techcrunch

How Ukraine’s cyber police fights back against Russia’s hackers

13-04Techcrunch

US think tank Heritage Foundation hit by cyberattack

13-04Infosecurity

CISA Urges Immediate Credential Reset After Sisense Breach

13-04Infosecurity

Palo Alto Networks Warns About Critical Zero-Day in PAN-OS

13-04Security Magazine

Report finds that only 5% of businesses have a cyber expert

13-04Security Magazine

Report finds that only 5% of businesses have a cyber expert

13-04The Hacker News

Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files

13-04The Hacker News

Code Keepers: Mastering Non-Human Identity Management

13-04The Hacker News

Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign

13-04The Hacker News

Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack

12-04Help Net Security

Check Point boosts security in Harmony Email & Collaboration

12-04Help Net Security

Check Point boosts security in Harmony Email & Collaboration

12-04Help Net Security

Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

12-04Help Net Security

Cado Security teams up with Wiz to accelerate forensic investigations and minimize cloud threats

12-04Help Net Security

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)

12-04Help Net Security

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)

12-04Help Net Security

Palo Alto Networks enhances Cortex XSIAM to help SecOps teams identify cloud threats

12-04Help Net Security

Palo Alto Networks enhances Cortex XSIAM to help SecOps teams identify cloud threats

12-04Tweakers

Chipmaker Nexperia is getroffen door ransomwareaanval

12-04The Hacker News

Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker

12-04Techcrunch

US says Russian hackers stole federal government emails during Microsoft cyberattack

12-04Bleepingcomputer

CISA makes its 'Malware Next-Gen' analysis system publicly available

12-04Bleepingcomputer

Optics giant Hoya hit with $10 million ransomware demand

12-04Bleepingcomputer

CISA orders agencies impacted by Microsoft hack to mitigate risks

12-04Bleepingcomputer

CISA says Sisense hack impacts critical infrastructure orgs

12-04Help Net Security

The next wave of mobile threats

12-04Help Net Security

Why women struggle in the cybersecurity industry

12-04Help Net Security

CISA warns about Sisense data breach

12-04Help Net Security

Ransomware group maturity should influence ransom payment decision

12-04Help Net Security

Simbian raises $10 million to automate security operations with GenAI

12-04Infosecurity

Apple Boosts Spyware Alerts For Mercenary Attacks

12-04Infosecurity

Data Breach Exposes 300k Taxi Passengers’ Information

12-04Infosecurity

New Android Espionage Campaign Spotted in India and Pakistan

12-04Infosecurity

Raspberry Robin Distributed Through Windows Script Files

12-04Security Magazine

Mentorship key in building security careers

12-04Security Magazine

When solution providers host industry conferences

12-04Security Magazine

Kristine Raad joins General Motors as Chief Security Officer

12-04Security Magazine

A vulnerability in Linux distributions may allow unauthorized access

12-04The Hacker News

U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks

12-04The Hacker News

Python's PyPI Reveals Its Secrets

12-04The Hacker News

TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer

11-04Help Net Security

PVML raises $8 million to offer protection for enterprise data

11-04Infosecurity

Threat Actors Game GitHub Search to Spread Malware

11-04Infosecurity

US Data Breach Reports Surge 90% Annually in Q1

11-04The Hacker News

Apple Updates Spyware Alert System to Warn Victims of Mercenary Attacks

11-04The Hacker News

Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability

11-04Bleepingcomputer

Chrome Enterprise gets Premium security but you have to pay for it

11-04Bleepingcomputer

Google Workspace rolls out multi-admin approval feature for risky changes

11-04Bleepingcomputer

AT&T now says data breach impacted 51 million customers

11-04Bleepingcomputer

AT&T now says data breach impacted 51 million customers

11-04Bleepingcomputer

Reusing passwords: The hidden cost of convenience

11-04Bleepingcomputer

Reusing passwords: The hidden cost of convenience

11-04Help Net Security

How Google’s 90-day TLS certificate validity proposal will affect enterprises

11-04Help Net Security

Leveraging AI for enhanced compliance and governance

11-04Help Net Security

Graylog: Open-source log management

11-04Help Net Security

37% of publicly shared files expose personal information

11-04Help Net Security

Stopping security breaches by managing AppSec posture

11-04Help Net Security

New covert SharePoint data exfiltration techniques revealed

11-04Help Net Security

Vultr Sovereign Cloud and Private Cloud delivers data control to nations and enterprises

11-04Help Net Security

Malwarebytes Digital Footprint Portal offers insights into exposed passwords and personal data

11-04Help Net Security

Index Engines CyberSense 8.6 detects malicious activity

11-04Infosecurity

US Claims to Have Recovered $1.4bn in COVID Fraud

11-04Infosecurity

US Claims to Have Recovered $1.4bn in COVID Fraud

11-04Infosecurity

Microsoft Patches 150 Flaws Including Two Zero-Days

11-04Infosecurity

Microsoft Patches 150 Flaws Including Two Zero-Days

11-04Infosecurity

Rhadamanthys Malware Deployed By TA547 Against German Targets

11-04Infosecurity

Rhadamanthys Malware Deployed By TA547 Against German Targets

11-04Infosecurity

LG TV Vulnerabilities Expose 91,000 Devices

11-04Infosecurity

LG TV Vulnerabilities Expose 91,000 Devices

11-04Infosecurity

Women Experience Exclusion Twice as Often as Men in Cybersecurity

11-04Infosecurity

Women Experience Exclusion Twice as Often as Men in Cybersecurity

11-04Infosecurity

Windows: New 'BatBadBut' Rust Vulnerability Given Highest Severity Score

11-04Infosecurity

Windows: New 'BatBadBut' Rust Vulnerability Given Highest Severity Score

11-04Nu.nl

Tv-wereld neemt maatregelen na Russische propaganda op BabyTV

11-04Tweakers

Tweakers Podcast #316 - Datalekbrieven, E3-puppy's en dubbele afpersingen

11-04Tweakers

Tweakers Podcast #316 - Datalekbrieven, E3-puppy's en dubbele afpersingen

11-04Tweakers

LG dicht kwetsbaarheden waardoor webOS-televisies over te nemen waren

11-04Tweakers

LG dicht kwetsbaarheden waardoor webOS-televisies over te nemen waren

11-04Security Magazine

Be ready to quickly find a security job

11-04Security Magazine

Real-time data and AI are the new weapons against climate disasters

11-04Security Magazine

Security leaders weigh in on the White House's order regarding AI

11-04The Hacker News

'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan

11-04The Hacker News

Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files

11-04The Hacker News

Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware

11-04The Hacker News

Hands-on Review: Cynomi AI-powered vCISO Platform

11-04The Hacker News

Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel

10-04Help Net Security

Alethea raises $20 million to combat disinformation campaigns

Onze partners

Ook partner worden?