Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
25-02Techcrunch

Former L3Harris Trenchant boss jailed for selling hacking tools to Russian broker

25-02Techcrunch

CarGurus data breach affects 12.5 million accounts

25-02Techcrunch

Treasury sanctions Russian zero-day broker accused of buying exploits stolen from US defense contr

25-02Bleepingcomputer

US sanctions Russian broker for buying stolen zero-day exploits

25-02Bleepingcomputer

Wynn Resorts confirms employee data breach after extortion threat

25-02Bleepingcomputer

1Campaign platform helps malicious Google ads evade detection

25-02Bleepingcomputer

CarGurus data breach exposes information of 12.4 million accounts

25-02Bleepingcomputer

ShinyHunters extortion gang claims Odido breach affecting millions

25-02Bleepingcomputer

North Korean Lazarus group linked to Medusa ransomware attacks

25-02Bleepingcomputer

Android mental health apps with 14.7M installs filled with security flaws

25-02Bleepingcomputer

Spain arrests suspected hacktivists for DDoSing govt sites

25-02Help Net Security

Ex-L3Harris executive sentenced to 87 months for selling stolen cyber-exploit trade secrets

25-02Help Net Security

CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108)

25-02Help Net Security

Apple blocks 18+ app downloads in select markets

25-02Help Net Security

Cyber valuations climb as capital concentrates, AI security expands

25-02Infosecurity

ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns

25-02Infosecurity

ICO’s £14m Reddit Fine Highlights Age Check Privacy Concerns

25-02Nu.nl

Gaat Odido hackers betalen om data niet te delen? 'Je kan het niet goed doen'

25-02The Hacker News

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

25-02The Hacker News

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

25-02Help Net Security

Microsoft adds domain libraries and Copilot integration to the quantum development kit

25-02Help Net Security

Airline brands become launchpads for phishing, crypto fraud

25-02Help Net Security

Edge systems take the brunt of internet-wide exploitation attempts

25-02Help Net Security

Forescout VistaroAI replaces prompt engineering with role-based AI automation

25-02Help Net Security

Teenagers charged over public bike service breach that exposed 4.62 million records

25-02Help Net Security

Druva expands DruAI with autonomous agents for forensics and compliance

25-02Help Net Security

Veeam Agent Commander unifies AI risk detection, protection, and recovery

25-02BBC

Reddit fined £14m for 'concerning' child age check failings

25-02Infosecurity

Cost of Insider Incidents Surges 20% to Nearly $20m

25-02Infosecurity

Multifaceted Phishing Scheme Deceives Bitpanda Customers

25-02Infosecurity

North Korean Lazarus Group Expands Ransomware Activity With Medusa

25-02Infosecurity

AI Accelerates Attacker Breakout Time to Just Four Minutes

25-02Infosecurity

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

25-02Infosecurity

Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns

25-02Security Magazine

From the Outside In: A Smarter Approach to Vendor Access

25-02The Hacker News

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

25-02The Hacker News

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

25-02The Hacker News

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

25-02The Hacker News

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

25-02The Hacker News

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

25-02The Hacker News

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

25-02The Hacker News

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

25-02The Hacker News

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

25-02The Hacker News

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

25-02The Hacker News

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

24-02Help Net Security

Windows 365 for Agents brings managed cloud PCs to autonomous workflows

24-02Help Net Security

International operation dismantles fraud network, €400,000 seized

24-02Help Net Security

Microsoft extends security patching for three Windows products at a price

24-02Infosecurity

AI-powered Cyber-Attacks Up Significantly in the Last Year, Warns CrowdStrike

24-02Security Magazine

AI-Generated Image-Based Harm Is Becoming a Security Issue — Organizations Must Prepare

24-02The Hacker News

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

24-02The Hacker News

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

24-02Help Net Security

Security and complexity slow the next phase of enterprise AI agent adoption

24-02Help Net Security

Binding Operational Directive 26-02 sets deadlines for edge device replacement

24-02Help Net Security

Cybersecurity jobs available right now: February 24, 2026

24-02Help Net Security

Fake troubleshooting tip on ClawHub leads to infostealer infection

24-02Infosecurity

Shai-Hulud-Like Worm Targets Developers via npm and AI Tools

24-02Infosecurity

Shai-Hulud-Like Worm Targets Developers via npm and AI Tools

24-02Infosecurity

Fraud Investigation Reveals Sophisticated Python Malware

24-02Infosecurity

Fraud Investigation Reveals Sophisticated Python Malware

24-02Infosecurity

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

24-02Infosecurity

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls

24-02Infosecurity

Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

24-02Infosecurity

Leading Semiconductor Supplier Advantest Hit by Ransomware Attack

24-02The Hacker News

APT28 Targeted European Entities Using Webhook-Based Macro Malware

24-02The Hacker News

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

24-02The Hacker News

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

24-02The Hacker News

How Exposed Endpoints Increase Risk Across LLM Infrastructure

23-02Help Net Security

Police seize 100,000 stolen Facebook credentials in cybercrime raid

23-02Help Net Security

Perplexity AI lands on Samsung’s next Galaxy lineup

23-02Help Net Security

Claude Code scans, verifies, and patches code vulnerabilities

23-02Help Net Security

The hidden security cost of treating labs like data centers

23-02Infosecurity

Jackpotting Surge Costs Banks Over $20m, Warns FBI

23-02Infosecurity

University of Mississippi Medical Center Still Offline After Ransomware Attack

23-02The Hacker News

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

23-02The Hacker News

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

23-02Help Net Security

Enterprises are racing to secure agentic AI deployments

23-02Help Net Security

Coroot: Open-source observability and APM tool

23-02Help Net Security

Identity verification systems are struggling with synthetic fraud

23-02Security Magazine

41% of Organizations Have Hired a Fake Candidate

23-02Security Magazine

Human-related security risks rose 90% in 2025

22-02Help Net Security

Week in review: Firmware-level Android backdoor found on tablets, Dell zero-day exploited since 20

22-02The Hacker News

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

21-02The Hacker News

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

21-02The Hacker News

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

21-02The Hacker News

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Securi

21-02Help Net Security

LLMs change their answers based on who’s asking

21-02Infosecurity

Dramatic Escalation in Frequency and Power of DDoS Attacks

21-02Infosecurity

Android Malware Hijacks Google Gemini to Stay Hidden

21-02Security Magazine

The 25 Most Vulnerable Passwords of 2026

21-02Security Magazine

The 25 Most Vulnerable Passwords of 2026

21-02Security Magazine

Implementing Meaningful De-Escalation Training in Your Security Program

21-02Security Magazine

Implementing Meaningful De-Escalation Training in Your Security Program

21-02The Hacker News

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

21-02The Hacker News

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

21-02The Hacker News

ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware

20-02Techcrunch

FBI says ATM ‘jackpotting’ attacks are on the rise, and netting hackers millions in stolen cas

20-02Techcrunch

Cellebrite cut off Serbia citing abuse of its phone unlocking tools. Why not others?

20-02Bleepingcomputer

FBI: Over $20 million stolen in surge of ATM malware attacks in 2025

20-02Bleepingcomputer

Ukrainian gets 5 years for helping North Koreans infiltrate US firms

Onze partners

Ook partner worden?