Cyber  Articles -  2024  2023  2021  2020  2019  2018  2017

DATE

NAME

CATEGORY

WEB

13.12.23

Unveiling the Cyber Threats to Healthcare: Beyond the MythsCyberThe Hacker News

23.11.23

Criminal IP Becomes VirusTotal IP and URL Scan ContributorCyber

BleepingComputer

16.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity StrategyCyber

The Hacker News

14.11.23

DP World cyberattack blocks thousands of containers in portsCyber

BleepingComputer

14.11.23

Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat AnalysisCyber

BleepingComputer

14.11.23

The Importance of Continuous Security Monitoring for a Robust Cybersecurity StrategyCyber

The Hacker News

31.10.23Google Chrome now auto-upgrades to secure connections for all usersCyberBleepingComputer
31.10.23Toronto Public Library services down following weekend cyberattackCyberBleepingComputer
31.10.23HackerOne paid ethical hackers over $300 million in bug bountiesCyberBleepingComputer
30.10.23ServiceNow Data Exposure: A Wake-Up Call for CompaniesCyberThe Hacker News
28.10.23Hackers earn over $1 million for 58 zero-days at Pwn2Own TorontoCyberBleepingComputer
27.10.23Microsoft: Octo Tempest is one of the most dangerous financial hacking groupsCyberBleepingComputer
21.10.23Kwik Trip finally confirms cyberattack was behind ongoing outageCyberBleepingComputer

19.10.23

Fighting off cyberattacks? Make sure user credentials aren’t compromisedCyberBleepingComputer
1.10.23Sony investigates cyberattack as hackers fight over who's responsibleCyber

BleepingComputer

22.9.23

How to Interpret the 2023 MITRE ATT&CK Evaluation ResultsCyberThe Hacker News

5.9.23

Researchers Warn of Cyber Weapons Used by Lazarus Group's Andariel ClusterCyberThe Hacker News
1.9.23Numbers Don't Lie: Exposing the Harsh Truths of Cyberattacks in New ReportCyberThe Hacker News
31.8.23IT threat evolution in Q2 2023. Mobile statisticsCyberSecurelist
31.8.23IT threat evolution in Q2 2023CyberSecurelist
31.8.23IT threat evolution in Q2 2023. Non-mobile statisticsCyberSecurelist
25.8.23Bitwarden releases free and open-source E2EE Secrets ManagerCyberBleepingComputer
25.8.23Google Workspace will require two admins to sign off on critical changesCyberBleepingComputer
20.8.23Cybersecurity: CASB vs SASECyberSecurityaffairs
20.8.23A massive campaign delivered a proxy server application to 400,000 Windows systemsCyberSecurityaffairs
20.8.23Alarming lack of cybersecurity practices on world’s most popular websitesCyberSecurityaffairs
20.8.23Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattackCyberSecurityaffairs
19.8.23File sharing site Anonfiles shuts down due to overwhelming abuseCyberBleepingComputer

6.7.23

Google Analytics data transfer to U.S. brings $1 million fine to Swedish firms

Cyber

BleepingComputer

27.6.23Citizen of Croatia charged with running the Monopoly Market drug marketplace

Cyber

Securityaffairs
27.6.23Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Cyber

Securityaffairs
23.6.23Google Backs Creation of Cybersecurity Clinics With $20 Million Donation

Cyber

Securityweek

23.6.23Generative-AI apps & ChatGPT: Potential risks and mitigation strategies

Cyber

The Hacker News
22.6.23Bipartisan Bill Proposes Cybersecurity Funds for Rural Water Systems

Cyber

Securityweek

22.6.23Analyzing the TriangleDB implant used in Operation Triangulation

Cyber

Securityaffairs
4.5.23Meta Uncovers Massive Social Media Cyber Espionage Operations Across South Asia

Cyber

The Hacker News
24.3.23GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations

Cyber

The Hacker News

24.2.23

How to Use AI in Cybersecurity and Avoid Being Trapped

Cyber

The Hacker News

11.2.233 Overlooked Cybersecurity Breaches

Cyber

The Hacker News
7.2.23Tackling the New Cyber Insurance Requirements: Can Your Organization Comply?

Cyber

The Hacker News