Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
19-07Bleepingcomputer

Russian alcohol retailer WineLab closes stores after ransomware attack

19-07Bleepingcomputer

New Phobos and 8base ransomware decryptor recover files for free

19-07Bleepingcomputer

Hackers scanning for TeleMessage Signal clone flaw exposing passwords

19-07Infosecurity

CISA Issues Advisories on Critical ICS Vulnerabilities Across Multiple Sectors

19-07Infosecurity

Russia Linked to New Malware Targeting Email Accounts for Espionage

19-07Infosecurity

New “LameHug” Malware Deploys AI-Generated Commands

19-07CyberExperts

How to Run a Phishing Simulation in Higher Education

19-07CyberExperts

How AI-Driven Task Management is Revolutionizing Cybersecurity Operations in 2025

19-07CyberExperts

Unlock Higher Engagement and Revenue with Soft2Bet’s Proven Gamification Tactics

19-07CyberExperts

Texas Takes Charge: Unifying State Cybersecurity with New Command

19-07Security Magazine

5M Public, Unsecured Wi-Fi Networks Found Exposed

19-07Security Magazine

Salt Typhoon Hacks National Guard Systems

19-07The Hacker News

China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

19-07The Hacker News

China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

19-07The Hacker News

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

19-07The Hacker News

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns

19-07The Hacker News

Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

19-07The Hacker News

Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

19-07The Hacker News

Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

19-07The Hacker News

Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services

19-07The Hacker News

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

19-07The Hacker News

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

19-07The Hacker News

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

19-07The Hacker News

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

19-07The Hacker News

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

19-07The Hacker News

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

18-07Help Net Security

Why we must go beyond tooling and CVEs to illuminate security blind spots

18-07Help Net Security

Making security and development co-owners of DevSecOps

18-07Infosecurity

AI-Generated Lcryx Ransomware Discovered in Cryptomining Botnet

18-07Infosecurity

Retail Becomes New Target as Healthcare Ransomware Attacks Slow

18-07Help Net Security

AI adoption is booming but secure scaling not so much

18-07Help Net Security

Buy Now, Pay Later… with your data

18-07Help Net Security

New infosec products of the week: July 18, 2025

18-07Help Net Security

Stellar Cyber enhances identity security with ITDR capabilities

18-07Techcrunch

Hackers are trying to steal passwords and sensitive data from users of Signal clone

18-07Techcrunch

North Korean hackers blamed for record spike in crypto thefts in 2025

18-07Bleepingcomputer

VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin

18-07Bleepingcomputer

LameHug malware uses AI LLM to craft Windows data-theft commands in real-time

18-07Bleepingcomputer

Hacker steals $27 million in BigONE exchange crypto breach

18-07Bleepingcomputer

Chinese hackers breached National Guard to steal network configurations

18-07Infosecurity

Malware-as-a-Service Campaign Exploits GitHub to Deliver Payloads

18-07Infosecurity

Malware-as-a-Service Campaign Exploits GitHub to Deliver Payloads

18-07Infosecurity

AI Cloaking Tools Enable Harder-to-Detect Cyber-Attacks

18-07Infosecurity

AI Cloaking Tools Enable Harder-to-Detect Cyber-Attacks

18-07Infosecurity

One in 12 US/UK Employees Uses Chinese GenAI Tools

18-07Infosecurity

One in 12 US/UK Employees Uses Chinese GenAI Tools

18-07Infosecurity

Microsoft Exposes Scattered Spider’s Latest Tactics

18-07Infosecurity

Microsoft Exposes Scattered Spider’s Latest Tactics

18-07Security Magazine

The Key to Efficient Hospitality Operations

18-07Security Magazine

Security and Development Teams Should Work Together to Protect Data in the AI Era

18-07Security Magazine

Deadline Nears for 2025 Elliot A. Boxerbaum Award Nominations

18-07Security Magazine

64% of Leaders are Highly Concerned About Data Sovereignty Amid Tariff Uncertainty

18-07Security Magazine

Hacktivism Increasingly Targeting Critical Infrastructure

18-07CyberExperts

Fortifying the Digital Frontier: Okta and Palo Alto Join Forces

18-07The Hacker News

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

18-07The Hacker News

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

18-07The Hacker News

Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine

18-07The Hacker News

CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025

17-07Help Net Security

Review: Passwork 7.0, self-hosted password manager for business

17-07Help Net Security

Akeyless SecretlessAI protects machine-to-machine communication

17-07Help Net Security

What a mature OT security program looks like in practice

17-07Help Net Security

Machine unlearning gets a practical privacy upgrade

17-07Infosecurity

US Data Breaches Head for Another Record Year After 11% Surge

17-07Infosecurity

Most European Financial Firms Still Lagging on DORA Compliance

17-07The Hacker News

Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors

17-07The Hacker News

Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors

17-07The Hacker News

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

17-07The Hacker News

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

17-07Help Net Security

Why silent authentication is the smarter way to secure BYOD

17-07Help Net Security

Why silent authentication is the smarter way to secure BYOD

17-07Help Net Security

What Fortune 100s are getting wrong about cybersecurity hiring

17-07Help Net Security

What Fortune 100s are getting wrong about cybersecurity hiring

17-07Help Net Security

Tired of gaps in your security? These open-source tools can help

17-07Help Net Security

Tired of gaps in your security? These open-source tools can help

17-07Help Net Security

SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit

17-07Help Net Security

SonicWall SMA devices persistently infected with stealthy OVERSTEP backdoor and rootkit

17-07Help Net Security

Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558)

17-07Help Net Security

Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558)

17-07Help Net Security

Immersive unveils role-specific cybersecurity capabilities

17-07Help Net Security

Immersive unveils role-specific cybersecurity capabilities

17-07Help Net Security

Global crackdown hits pro-Russian cybercrime, 100+ systems taken down worldwide

17-07Help Net Security

Global crackdown hits pro-Russian cybercrime, 100+ systems taken down worldwide

17-07Techcrunch

UK retail giant Co-op confirms hackers stole all 6.5 million customer records

17-07Techcrunch

UK retail giant Co-op confirms hackers stole all 6.5 million customer records

17-07Bleepingcomputer

Co-op confirms data of 6.5 million members stolen in cyberattack

17-07Bleepingcomputer

Co-op confirms data of 6.5 million members stolen in cyberattack

17-07Bleepingcomputer

U.S. Army soldier pleads guilty to extorting 10 tech, telecom firms

17-07Bleepingcomputer

U.S. Army soldier pleads guilty to extorting 10 tech, telecom firms

17-07Bleepingcomputer

Louis Vuitton says regional data breaches tied to same cyberattack

17-07Bleepingcomputer

Louis Vuitton says regional data breaches tied to same cyberattack

17-07Bleepingcomputer

Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack

17-07Bleepingcomputer

Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack

17-07Bleepingcomputer

SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware

17-07Bleepingcomputer

SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware

17-07Bleepingcomputer

New Fortinet FortiWeb hacks likely linked to public RCE exploits

17-07Bleepingcomputer

New Fortinet FortiWeb hacks likely linked to public RCE exploits

17-07Bleepingcomputer

Europol disrupts pro-Russian NoName057(16) DDoS hacktivist group

17-07Bleepingcomputer

Europol disrupts pro-Russian NoName057(16) DDoS hacktivist group

17-07Nu.nl

Pro-Russische hackersgroep die ook Nederland aanviel offline gehaald

17-07Nu.nl

Pro-Russische hackersgroep die ook Nederland aanviel offline gehaald

Onze partners

Ook partner worden?