Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
27-10Help Net Security

Can your earbuds recognize you? Researchers are working on it

27-10Help Net Security

Dependency-Track: Open-source component analysis platform

27-10Infosecurity

UK Fraud Cases Surge 17% Annually

27-10Infosecurity

Critical WordPress Plugin Bugs Exploited En Masse

27-10The Hacker News

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack

27-10The Hacker News

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

27-10Help Net Security

DDoS, data theft, and malware are storming the gaming industry

27-10Help Net Security

AI writes code like a junior dev, and security is feeling it

27-10Help Net Security

Product showcase: Neo Network Utility makes network checks simple

27-10CyberExperts

Cybersecurity Giant Unveils Revolutionary AI Shift, Reshaping Digital Defense

27-10Security Magazine

The Moment of Truth: Conducting Your BCP Test and Capturing Lessons

26-10Help Net Security

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoor

26-10Techcrunch

High school’s AI security system confuses Doritos bag for a possible firearm

26-10Techcrunch

The glaring security risks with AI browser agents

26-10CyberExperts

OPSWAT Launches Hungary Cyber Lab to Fortify Global Infrastructure Security

25-10Bleepingcomputer

Hackers launch mass attacks exploiting outdated WordPress plugins

25-10Bleepingcomputer

Fake LastPass death claims used to breach password vaults

25-10Bleepingcomputer

How to reduce costs with self-service password resets

25-10Help Net Security

Microsoft blocks risky file previews in Windows File Explorer

25-10Infosecurity

New LockBit Ransomware Victims Identified by Security Researchers

25-10Infosecurity

New LockBit Ransomware Victims Identified by Security Researchers

25-10Infosecurity

Blitz Spear Phishing Campaign Targets NGOs Supporting Ukraine

25-10Infosecurity

Blitz Spear Phishing Campaign Targets NGOs Supporting Ukraine

25-10Infosecurity

Threat Actors Ramp Up Public App Exploits as ToolShell Gains Traction

25-10Infosecurity

Threat Actors Ramp Up Public App Exploits as ToolShell Gains Traction

25-10CyberExperts

Trailblazing Irish Women Revolutionizing Cybersecurity: Meet the Influencers

25-10CyberExperts

Trailblazing Irish Women Revolutionizing Cybersecurity: Meet the Influencers

25-10The Hacker News

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

25-10The Hacker News

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

25-10The Hacker News

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

25-10The Hacker News

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

25-10The Hacker News

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

25-10The Hacker News

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

25-10The Hacker News

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

25-10The Hacker News

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

25-10The Hacker News

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

25-10The Hacker News

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

24-10Bleepingcomputer

Windows Server emergency patches fix WSUS bug with PoC exploit

24-10Bleepingcomputer

Windows Server emergency patches fix WSUS bug with PoC exploit

24-10Bleepingcomputer

Hackers earn $1,024,750 for 73 zero-days at Pwn2Own Ireland

24-10Bleepingcomputer

Hackers earn $1,024,750 for 73 zero-days at Pwn2Own Ireland

24-10Help Net Security

Smart helmet tech points to the future of fighting audio deepfakes

24-10Help Net Security

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

24-10Security Magazine

How Artificial Intelligence Is Amplifying Data Breach Risks — and Enhancing Mitigation

24-10The Hacker News

Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack

24-10Help Net Security

Building trust in AI: How to keep humans in control of cybersecurity

24-10Help Net Security

When AI writes code, humans clean up the mess

24-10Help Net Security

New infosec products of the week: October 24, 2025

24-10Help Net Security

Researchers expose large-scale YouTube malware distribution network

24-10Help Net Security

Wireshark 4.6.0 brings major updates for packet analysis and decryption

24-10Help Net Security

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

24-10Techcrunch

US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer

24-10Bleepingcomputer

Toys “R” Us Canada warns customers' info leaked in data breach

24-10Bleepingcomputer

CISA warns of Lanscope Endpoint Manager flaw exploited in attacks

24-10Bleepingcomputer

North Korean Lazarus hackers targeted European defense companies

24-10Nu.nl

Franchisenemer van Albert Heijn gehackt, privégegevens gelekt op darkweb

24-10BBC

Jaguar Land Rover cyber attack caused UK car production to slump by a quarter

24-10Infosecurity

Pakistani-Linked Hacker Group Targets Indian Government

24-10Infosecurity

Lazarus Group’s Operation DreamJob Targets European Defense Firms

24-10Infosecurity

Major Vulnerabilities Found in TP-Link VPN Routers

24-10Security Magazine

Product Spotlight on Drones & Robotics

24-10Security Magazine

Bala Consulting Engineers Win the 2025 Elliot A. Boxerbaum Award

24-10CyberExperts

Building Cyber Defenders: Russ Munisteri’s Call to Arms on Training

24-10The Hacker News

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

24-10The Hacker News

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

24-10The Hacker News

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

24-10The Hacker News

Why Organizations Are Abandoning Static Secrets for Managed Identities

23-10Help Net Security

Faster LLM tool routing comes with new security considerations

23-10Help Net Security

Faster LLM tool routing comes with new security considerations

23-10Help Net Security

Your wearable knows your heartbeat, but who else does?

23-10Help Net Security

Your wearable knows your heartbeat, but who else does?

23-10Infosecurity

Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer, Researchers Say

23-10Infosecurity

Lumma Stealer Vacuum Filled by Upgraded Vidar 2.0 Infostealer, Researchers Say

23-10Security Magazine

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

23-10The Hacker News

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

23-10The Hacker News

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

23-10The Hacker News

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

23-10Techcrunch

Apple confirms it pulled controversial dating apps Tea and TeaOnHer from the App Store

23-10Techcrunch

Apple confirms it pulled controversial dating apps Tea and TeaOnHer from the App Store

23-10Bleepingcomputer

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor

23-10Bleepingcomputer

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor

23-10Bleepingcomputer

Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000

23-10Bleepingcomputer

Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000

23-10Bleepingcomputer

Meta launches new anti-scam tools for WhatsApp and Messenger

23-10Bleepingcomputer

Meta launches new anti-scam tools for WhatsApp and Messenger

23-10Bleepingcomputer

FinWise data breach shows why encryption is your last defense

23-10Bleepingcomputer

FinWise data breach shows why encryption is your last defense

23-10Help Net Security

How Lazarus Group used fake job ads to spy on Europe’s drone and defense sector

23-10Help Net Security

The next cyber crisis may start in someone else’s supply chain

23-10Help Net Security

Gartner predicts the technologies set to transform 2026

23-10Help Net Security

Attackers target retailers’ gift card systems using cloud-only techniques

23-10Help Net Security

Attackers turn trusted OAuth apps into cloud backdoors

23-10Help Net Security

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails

23-10Help Net Security

Rubrik Agent Cloud speeds enterprise AI with built-in security and guardrails

23-10Help Net Security

Elastic introduces Agent Builder to simplify AI agent development

23-10Help Net Security

Elastic introduces Agent Builder to simplify AI agent development

23-10Infosecurity

PhantomCaptcha Campaign Targets Ukraine Relief Organizations

23-10Infosecurity

PhantomCaptcha Campaign Targets Ukraine Relief Organizations

23-10Infosecurity

MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign

23-10Infosecurity

MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign

Onze partners

Ook partner worden?