Cyber  Articles 2023-  2026  2025  2024  2023  2021  2020  2019  2018  2017

DATE

NAME

CATEGORY

WEB

13.12.23

Unveiling the Cyber Threats to Healthcare: Beyond the Myths Cyber The Hacker News

23.11.23

Criminal IP Becomes VirusTotal IP and URL Scan Contributor Cyber

BleepingComputer

16.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity Strategy Cyber

The Hacker News

14.11.23

DP World cyberattack blocks thousands of containers in ports Cyber

BleepingComputer

14.11.23

Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat Analysis Cyber

BleepingComputer

14.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity Strategy Cyber

The Hacker News

31.10.23 Google Chrome now auto-upgrades to secure connections for all users Cyber BleepingComputer
31.10.23 Toronto Public Library services down following weekend cyberattack Cyber BleepingComputer
31.10.23 HackerOne paid ethical hackers over $300 million in bug bounties Cyber BleepingComputer
30.10.23 ServiceNow Data Exposure: A Wake-Up Call for Companies Cyber The Hacker News
28.10.23 Hackers earn over $1 million for 58 zero-days at Pwn2Own Toronto Cyber BleepingComputer
27.10.23 Microsoft: Octo Tempest is one of the most dangerous financial hacking groups Cyber BleepingComputer
21.10.23 Kwik Trip finally confirms cyberattack was behind ongoing outage Cyber BleepingComputer

19.10.23

Fighting off cyberattacks? Make sure user credentials aren’t compromised Cyber BleepingComputer
1.10.23 Sony investigates cyberattack as hackers fight over who's responsible Cyber

BleepingComputer

22.9.23

How to Interpret the 2023 MITRE ATT&CK Evaluation Results Cyber The Hacker News

5.9.23

Researchers Warn of Cyber Weapons Used by Lazarus Group's Andariel Cluster Cyber The Hacker News
1.9.23 Numbers Don't Lie: Exposing the Harsh Truths of Cyberattacks in New Report Cyber The Hacker News
31.8.23 IT threat evolution in Q2 2023. Mobile statistics Cyber Securelist
31.8.23 IT threat evolution in Q2 2023 Cyber Securelist
31.8.23 IT threat evolution in Q2 2023. Non-mobile statistics Cyber Securelist
25.8.23 Bitwarden releases free and open-source E2EE Secrets Manager Cyber BleepingComputer
25.8.23 Google Workspace will require two admins to sign off on critical changes Cyber BleepingComputer
20.8.23 Cybersecurity: CASB vs SASE Cyber Securityaffairs
20.8.23 A massive campaign delivered a proxy server application to 400,000 Windows systems Cyber Securityaffairs
20.8.23 Alarming lack of cybersecurity practices on world’s most popular websites Cyber Securityaffairs
20.8.23 Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack Cyber Securityaffairs
19.8.23 File sharing site Anonfiles shuts down due to overwhelming abuse Cyber BleepingComputer

6.7.23

Google Analytics data transfer to U.S. brings $1 million fine to Swedish firms

Cyber

BleepingComputer

27.6.23 Citizen of Croatia charged with running the Monopoly Market drug marketplace

Cyber

Securityaffairs
27.6.23 Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Cyber

Securityaffairs
23.6.23 Google Backs Creation of Cybersecurity Clinics With $20 Million Donation

Cyber

Securityweek

23.6.23 Generative-AI apps & ChatGPT: Potential risks and mitigation strategies

Cyber

The Hacker News
22.6.23 Bipartisan Bill Proposes Cybersecurity Funds for Rural Water Systems

Cyber

Securityweek

22.6.23 Analyzing the TriangleDB implant used in Operation Triangulation

Cyber

Securityaffairs
4.5.23 Meta Uncovers Massive Social Media Cyber Espionage Operations Across South Asia

Cyber

The Hacker News
24.3.23 GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations

Cyber

The Hacker News

24.2.23

How to Use AI in Cybersecurity and Avoid Being Trapped

Cyber

The Hacker News

11.2.23 3 Overlooked Cybersecurity Breaches

Cyber

The Hacker News
7.2.23 Tackling the New Cyber Insurance Requirements: Can Your Organization Comply?

Cyber

The Hacker News