Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
27-06Forbes

UK Data Subject Access Requests Hang In The Balance

27-06Bleepingcomputer

Fake copyright infringement emails install LockBit ransomware

27-06Bleepingcomputer

Clever phishing method bypasses MFA using Microsoft WebView2 apps

27-06Bleepingcomputer

NetSec Goggle shows search results only from cybersecurity sites

27-06Help Net Security

OT security: Helping under-resourced critical infrastructure organizations

27-06Help Net Security

How phishing attacks are becoming more sophisticated

27-06Help Net Security

Clearview fine: The unacceptable face of modern surveillance

27-06Help Net Security

Cybercriminals use Azure Front Door in phishing attacks

27-06Help Net Security

48% of security practitioners seeing 3x increase in alerts per day

27-06Nu.nl

Lifehack: Zo herken je oplichters aan de telefoon

27-06Security Magazine

The Next Frontier of Security in the Age of Cloud

27-06CyberExperts

5 Ransomware Myths Endangering Your Business

26-06Help Net Security

Week in review: Log4Shell exploitation, DevSecOps myths, 56 vulnerabilities impacting OT devices

26-06Forbes

EXCLUSIVE: Meta Failed To Protect Instagram’s Child Models From Pedophiles

26-06Bleepingcomputer

PyPi python packages caught sending stolen AWS keys to unsecured sites

26-06Bleepingcomputer

Automotive fabric supplier TB Kawashima announces cyberattack

26-06Help Net Security

Claroty appoints Heather Young as RVP Public Sector Sales

26-06Help Net Security

Sophanny Schwartz joins Ascent Solutions as Managing Director of Human Resources

26-06Help Net Security

Cyware completes SOC 2 Type 2 Compliance for data security

26-06The Hacker News

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

25-06Bleepingcomputer

The Week in Ransomware - June 24th 2022 - Splinter Cells

25-06Bleepingcomputer

Mitel zero-day used by hackers in suspected ransomware attack

25-06Bleepingcomputer

CafePress fined $500,000 for breach affecting 23 million users

25-06Bleepingcomputer

Fast Shop Brazilian retailer discloses 'extortion' cyberattack

25-06Bleepingcomputer

Conti ransomware finally shuts down data leak, negotiation sites

25-06Forbes

Apple iPhone Security? There’s No Place Like Chrome, Google Says

25-06Techcrunch

Hacker exploits Harmony blockchain bridge, loots $100M in crypto

25-06Help Net Security

Bectran releases driver’s license verification solution to help businesses mitigate fraud in rea

25-06Help Net Security

Datadog Audit Trail enables businesses to achieve their compliance and governance objectives

25-06Help Net Security

IOTech Edge XRT 2.0 simplifies the development of time-critical OT applications

25-06Nu.nl

Hackers stelen 100 miljoen dollar aan cryptomunten van Harmony

25-06Infosecurity

#InfosecurityEurope2022: Preparing for Future Challenges and Opportunities

25-06Infosecurity

#InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gang

25-06Infosecurity

#InfosecurityEurope2022: Security awareness must be in the moment

25-06Security Magazine

Senate passes federal gun safety legislation

25-06Security Magazine

Eastern Kentucky University awarded $300k safety grant

25-06Security Magazine

Pharmaceutical company secures network with AppSec compliance tools

25-06Security Magazine

How secure is your digital supply chain?

25-06The Hacker News

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

25-06The Hacker News

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

25-06Threatpost

Google Warns Spyware Being Deployed Against Android, iOS Users

24-06Techcrunch

Amsterdam cyber startup Hadrian closes €10.5M Seed for platform which simulates hacker attacks

24-06Forbes

Microsoft Downplays ‘High-Risk’ Edge Security Warning For 150 Million Users

24-06Help Net Security

Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns

24-06Help Net Security

What stolen info can be bought off the dark web, and for how much?

24-06Help Net Security

Cloudflare One Partner Program enables companies of all sizes to adopt zero trust strategies

24-06Help Net Security

New infosec products of the week: June 24, 2022

24-06Infosecurity

Conti Group Compromised 40 Firms in Just One Month

24-06Infosecurity

Unsecured APIs Could Be Costing Firms $75bn Per Year

24-06Infosecurity

Euro Police Target Gangs Grooming Ukrainian Refugees Online

24-06The Hacker News

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

24-06The Hacker News

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

24-06The Hacker News

New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts

24-06Bleepingcomputer

CISA: Log4Shell exploits still being used to hack VMware servers

24-06Bleepingcomputer

Malicious Windows 'LNK' attacks made easy with new Quantum builder

24-06Bleepingcomputer

Automotive hose maker Nichirin hit by ransomware attack

24-06Bleepingcomputer

Chinese hackers use ransomware as decoy for cyber espionage

24-06Forbes

Okta Gives Back With Launch Of Nonprofit Cybersecurity Portfolio

24-06Help Net Security

iPaaS: The latest enterprise cybersecurity risk?

24-06Help Net Security

How companies are prioritizing infosec and compliance priorities

24-06Help Net Security

Risky behavior reduced when executives put focus on identity security

24-06Help Net Security

Despite known security issues, VPN usage continues to thrive

24-06Help Net Security

Palo Alto Networks adds new cloud security features to help organizations secure web applications

24-06Help Net Security

Ermetic enables organizations to provide secure JIT access to cloud environments for developers

24-06Help Net Security

Mitek Verified Identity Platform protects customers against identity theft

24-06Help Net Security

Hypori Halo 2022.1 provides secure access to mobile applications and data from any device

24-06Help Net Security

SolarWinds Next-Generation Build System improves enterprise software security

24-06Help Net Security

Bugcrowd partners with SocialProof Security to protect clients against social engineering attacks

24-06Techcrunch

Security-as-code startup Jit comes out of stealth with $38.5M in seed funding

24-06Techcrunch

Google Chrome’s latest update on iOS brings improved security, the Discover feed and more

24-06Techcrunch

Khaby Lame dethrones Charli D’Amelio as the most-followed TikTok creator

24-06Infosecurity

#InfosecurityEurope2022: How Should SMEs Defend Against Cyber-Risks?

24-06Infosecurity

#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working

24-06Infosecurity

#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

24-06Infosecurity

#InfosecurityEurope2022: The NCSC Sets Out the UK’s Cyber Threat Landscape

24-06Infosecurity

#InfosecurityEurope2022: Actions Not Words: Hacking the Human Through Social Engineering

24-06Infosecurity

#InfosecurityEurope2022: Firms Look To Align Security and Business Risk

24-06Infosecurity

#InfosecurityEurope2022: Focus on End-User Behaviors to Enhance Security

24-06Security Magazine

Secure coding education must foreground ongoing training

24-06Security Magazine

Lockbit 2.0 accounts for 40% of May ransomware attacks

24-06Security Magazine

Technical teams are struggling with access issues that impact productivity and security

24-06Security Magazine

US passes bills to foreground national cybersecurity

24-06Security Magazine

Are organizations prepared for the shifting data privacy landscape?

24-06Security Magazine

Drone detection secures annual Cooper River Bridge Run

24-06Security Magazine

Cyber insurers are starting to require lateral movement defense. Here’s why

24-06The Hacker News

Log4Shell Still Being Exploited to Hack VMWare Servers to Exfiltrate Sensitive Data

24-06The Hacker News

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

24-06The Hacker News

Manual vs. SSPM: Research on What Streamlines SaaS Security Detection & Remediation

24-06Threatpost

Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug

23-06Forbes

Google Chrome 103: Critical Security Warning For 3 Billion Windows, Mac & Linux Users

23-06Bleepingcomputer

Conti ransomware hacking spree breaches over 40 orgs in a month

23-06Help Net Security

CompoSecure expands Arculus capabilities to help users manage multiple digital assets

23-06Help Net Security

KSOC releases remediation-as-code response feature for Kubernetes users

23-06Help Net Security

CyberStrong 3.20 empowers customers to automate the assessment process

23-06Help Net Security

Hillstone Networks ZTNA solution provides organizations with control over their network access

23-06Help Net Security

Arcserve N Series appliances allow organizations to protect their digital assets

23-06Help Net Security

Traefik Hub enables users to secure and scale their cloud native services

23-06Help Net Security

Cavelo unveils platform enhancements to minimize data exposure for midsized businesses

23-06Help Net Security

GitGuardian announces new features to help developers reduce risks of exposure

23-06Help Net Security

Darktrace adds early warning system to its Antigena Email solution

Onze partners

Ook partner worden?