Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
15-06CyberExperts

Cybersecurity Fortunes: Industry Poised for Explosive Growth by 2030

15-06Techcrunch

How to delete your 23andMe data

15-06Bleepingcomputer

WestJet investigates cyberattack disrupting internal systems

15-06Bleepingcomputer

Anubis ransomware adds wiper to destroy files beyond recovery

15-06CyberExperts

Bridging Business and Cybersecurity: The CISO’s Strategic Dilemma

15-06CyberExperts

UK Cybersecurity Agency Demands Bold New National Defense Strategy

15-06CyberExperts

AI-Driven Cyberattacks Rival Climate Change as Top Global Business Threat

15-06CyberExperts

Proofpoint Shakes Cybersecurity Landscape with Bold Double Acquisition Move

15-06CyberExperts

Launch Your Cybersecurity Career: A Beginner’s Path to Success

14-06Help Net Security

Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools

14-06Help Net Security

Kali Linux 2025.2 delivers Bloodhound CE, CARsenal, 13 new tools

14-06CyberExperts

Pentagon’s IT Upgrade Falters: Costly Delays and Cyber Vulnerabilities Emerge

14-06Help Net Security

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

14-06Help Net Security

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200)

14-06Bleepingcomputer

Discord flaw lets hackers reuse expired invites in malware campaign

14-06Bleepingcomputer

Discord flaw lets hackers reuse expired invites in malware campaign

14-06Bleepingcomputer

Victoria’s Secret restores critical systems after cyberattack

14-06Bleepingcomputer

Victoria’s Secret restores critical systems after cyberattack

14-06Infosecurity

Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names

14-06Infosecurity

Former CISA and NCSC Heads Warn Against Glamorizing Threat Actor Names

14-06Infosecurity

European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms

14-06Infosecurity

European Journalists Targeted by Paragon Spyware, Citizen Lab Confirms

14-06CyberExperts

SMBs Gear Up for Cybersecurity Boom as Market Soars to $70B by 2034

14-06CyberExperts

Federal Contractors to Face Stricter Cybersecurity Rules in New Order

14-06CyberExperts

Presidential Directive Tackles Growing Cybersecurity Threats in Digital Age

14-06CyberExperts

UAB Students Triumph in Regional Cybersecurity Hackathon with Innovative Edge

14-06CyberExperts

SUNY Poly Expands with Cutting-Edge Cybersecurity and Tech Research Hubs

14-06Security Magazine

Former CIA Analyst Unlawfully Transmits National Defense Data, Sentenced to Prison

14-06Security Magazine

Former CIA Analyst Unlawfully Transmits National Defense Data, Sentenced to Prison

14-06Security Magazine

40,000 IoT Security Cameras Are Exposed Online

14-06Security Magazine

40,000 IoT Security Cameras Are Exposed Online

14-06The Hacker News

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

14-06The Hacker News

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

14-06The Hacker News

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

14-06The Hacker News

CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

13-06Bleepingcomputer

Cloudflare: Outage not caused by security incident, data is safe

13-06Help Net Security

Unpacking the security complexity of no-code development platforms

13-06Help Net Security

What CISOs need to know about agentic AI

13-06Infosecurity

Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing Firm

13-06Infosecurity

Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft

13-06CyberExperts

Warpspace and GMO Cybersecurity Unite to Revolutionize Space Safety

13-06The Hacker News

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

13-06The Hacker News

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

13-06Help Net Security

Security flaws in government apps go unpatched for years

13-06Help Net Security

19 ways to build zero trust: NIST offers practical implementation guide

13-06Help Net Security

New infosec products of the week: June 13, 2025

13-06Help Net Security

Researchers warn of ongoing Entra ID account takeover campaign

13-06Help Net Security

LockBit panel data leak shows Chinese orgs among the most targeted

13-06Help Net Security

Tamnoon helps organizations reduce cloud security exposures

13-06Help Net Security

Identifying high-risk APIs across thousands of code repositories

13-06Techcrunch

Apple fixes new iPhone zero-day bug used in Paragon spyware hacks

13-06Techcrunch

Conveyor uses AI to automate the painful process of vendor security reviews and RFPs with AI

13-06Bleepingcomputer

Trend Micro fixes critical vulnerabilities in multiple products

13-06Bleepingcomputer

Microsoft Edge now offers secure password deployment for businesses

13-06Bleepingcomputer

GitLab patches high severity account takeover, missing auth issues

13-06BBC

Data bill opposed by Sir Elton John and Dua Lipa finally passes

13-06BBC

Data bill opposed by Sir Elton John and Dua Lipa finally passes

13-06Infosecurity

Palo Alto Networks Patches Series of Vulnerabilities

13-06Infosecurity

Palo Alto Networks Patches Series of Vulnerabilities

13-06Infosecurity

NIST Publishes New Zero Trust Implementation Guidance

13-06Infosecurity

NIST Publishes New Zero Trust Implementation Guidance

13-06Security Magazine

Hire Your Replacement

13-06Security Magazine

Hire Your Replacement

13-06Security Magazine

Advanced AI Experiences “Complete Accuracy Collapse” When Given Complex Problems

13-06Security Magazine

Advanced AI Experiences “Complete Accuracy Collapse” When Given Complex Problems

13-06Security Magazine

Rinki Sethi Hired as Chief Security Officer at Upwind

13-06Security Magazine

Rinki Sethi Hired as Chief Security Officer at Upwind

13-06Security Magazine

Security Leaders Discuss the Whole Foods Distributor Cyberattack

13-06Security Magazine

Security Leaders Discuss the Whole Foods Distributor Cyberattack

13-06CyberExperts

AI Lifeboat: Navigating the Cybersecurity Tool Overload Crisis

13-06CyberExperts

AI Lifeboat: Navigating the Cybersecurity Tool Overload Crisis

13-06CyberExperts

Cyber Siege on Retail: Shoppers Face Empty Shelves and Chaos

13-06CyberExperts

Cyber Siege on Retail: Shoppers Face Empty Shelves and Chaos

13-06CyberExperts

Hackers Hijack Highways: New Trucking Tech Under Cyber Threats

13-06CyberExperts

Hackers Hijack Highways: New Trucking Tech Under Cyber Threats

13-06CyberExperts

TXOne Networks Reinvents Cyber Defense with SageOne Breakthrough

13-06CyberExperts

TXOne Networks Reinvents Cyber Defense with SageOne Breakthrough

13-06CyberExperts

Cybersecurity Under Siege: Unmasking the Invisible Threats Within

13-06CyberExperts

Cybersecurity Under Siege: Unmasking the Invisible Threats Within

13-06The Hacker News

WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network

13-06The Hacker News

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

13-06The Hacker News

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

13-06The Hacker News

Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction

13-06The Hacker News

Non-Human Identities: How to Address the Expanding Security Risk

12-06Help Net Security

Nudge Security’s browser extension monitors real-time SaaS and GenAI activity

12-06Help Net Security

Cybercriminals are turning stolen data into a thriving black market

12-06Help Net Security

Want fewer security fires to fight? Start with threat modeling

12-06Help Net Security

Build a mobile hacking rig with a Pixel and Kali NetHunter

12-06Bleepingcomputer

Fog ransomware attack uses unusual mix of legitimate and open-source tools

12-06Infosecurity

Europol Says Criminal Demand for Data is “Skyrocketing”

12-06Infosecurity

Europol Says Criminal Demand for Data is “Skyrocketing”

12-06Infosecurity

Phishing Alert as Erie Insurance Reveals Cyber “Event”

12-06Infosecurity

Phishing Alert as Erie Insurance Reveals Cyber “Event”

12-06Security Magazine

When AI Ambitions Are Dictated by Cloud Matters

12-06Security Magazine

When AI Ambitions Are Dictated by Cloud Matters

12-06CyberExperts

Xona and Forescout Unite to Revolutionize Critical Infrastructure Cybersecurity

12-06CyberExperts

Xona and Forescout Unite to Revolutionize Critical Infrastructure Cybersecurity

12-06The Hacker News

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

12-06The Hacker News

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

12-06Help Net Security

Connectwise is rotating code signing certificates. What happened?

Onze partners

Ook partner worden?