Cyber Articles 2025- 2026 2025 2024 2023 2021 2020 2019 2018 2017
DATE | NAME |
Info | CATEG. |
WEB |
| 25.12.25 | Docker Hardened Images now open source and available for free | More than a 1,000 Docker Hardened Images (DHI) are now freely available and open source for software builders, under the Apache 2.0 license. | Cyber | |
| 20.12.25 | Texas sues TV makers for taking screenshots of what people watch | The Texas Attorney General sued five major television manufacturers, accusing them of illegally collecting their users' data by secretly recording what they watch using Automated Content Recognition (ACR) technology. | Cyber | |
| 20.12.25 | Google is shutting down its dark web report feature in January | Google is discontinuing its "dark web report" security tool, stating that it wants to focus on other tools it believes are more helpful. | Cyber | |
| 14.12.25 | MITRE shares 2025's top 25 most dangerous software weaknesses | MITRE has shared this year's top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025. | Cyber | |
| 14.12.25 | Why a secure software development life cycle is critical for manufacturers | Recent supply-chain breaches show how attackers exploit development tools, compromised credentials, and malicious NPM packages to infiltrate manufacturing and production environments. Acronis explains why secure software development life cycle (SSDLC) practices are now critical for evaluating partners and protecting systems. | Cyber | |
| 13.12.25 | Maintaining enterprise IT hygiene using Wazuh SIEM/XDR | Poor IT hygiene, such as unused accounts, outdated software, and risky extensions, creates hidden exposure in your infrastructure. Wazuh, the open-source XDR and SIEM, shows how continuous inventory monitoring across endpoints helps teams spot drift and tighten security. | Cyber | |
| 7.12.25 | How strong password policies secure OT systems against cyber threats | OT environments rely on aging systems, shared accounts, and remote access, making weak or reused passwords a major attack vector. Specops Software explains how stronger password policies and continuous checks for compromised credentials help secure critical OT infrastructure. | Cyber | |
| 30.11.25 | OnSolve CodeRED cyberattack disrupts emergency alert systems nationwide | Risk management company Crisis24 has confirmed its OnSolve CodeRED platform suffered a cyberattack that disrupted emergency notification systems used by state and local governments, police departments, and fire agencies across the United States. | Cyber | |
| 24.11.25 | ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More | This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. | Cyber | The Hacker News |
| 23.11.25 | TV streaming piracy service with 26M yearly visits shut down | Photocall, a TV piracy streaming platform with over 26 million users annually, has ceased operations following a joint investigation by the Alliance for Creativity and Entertainment (ACE) and DAZN. | Cyber | |
| 23.11.25 | The hidden risks in your DevOps stack data—and how to address them | DevOps repos on GitHub, GitLab, Bitbucket, and Azure DevOps face risks from weak access controls, misconfigurations, outages, and accidental deletions. GitProtect provides automated, immutable backups and fast recovery to secure your DevOps data. | Cyber | |
| 22.11.25 | Cloudflare blames this week's massive outage on database issues | On Tuesday, Cloudflare experienced its worst outage in 6 years, blocking access to many websites and online platforms for almost 6 hours after a change to database access controls triggered a cascading failure across its Global Network. | Cyber | |
| 22.11.25 | Cloudflare hit by outage affecting Global Network services | Cloudflare is investigating an outage affecting its global network services, with users encountering "internal server error" messages when attempting to access affected websites and online platforms. | Cyber | BleepingComputer |
| 21.11.25 | SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny | The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled | Cyber | The Hacker News |
| 20.11.25 | ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves | This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work, and big power moves online. Hackers | Cyber | The Hacker News |
| 15.11.25 | New UK laws to strengthen critical infrastructure cyber defenses | The United Kingdom has introduced new legislation to boost cybersecurity defenses for hospitals, energy systems, water supplies, and transport networks against cyberattacks, linked to annual damages of nearly £15 billion ($19.6 billion). | Cyber | |
| 13.11.25 | ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories | Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and | Cyber | The Hacker News |
| 9.11.25 | U.S. Congressional Budget Office hit by suspected foreign cyberattack | The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. | Cyber | |
| 9.11.25 | Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense | Red and blue teams often operate independently, but attackers don't. Picus Security shows how continuous purple teaming and BAS turn red-blue rivalry into real defense, validating controls and closing gaps in real time. | Cyber | |
| 7.11.25 | Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts | Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad | Cyber | The Hacker News |
| 6.11.25 | From Tabletop to Turnkey: Building Cyber Resilience in Financial Services | Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. | Cyber | The Hacker News |
| 6.11.25 | ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More | Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and | Cyber | The Hacker News |
| 25.10.25 | DNS0.EU private DNS service shuts down over sustainability issues | The DNS0.EU non-profit public DNS service focused on European users announced its immediate shut down due to time and resource constraints. | Cyber | |
| 25.10.25 | Find hidden malicious OAuth apps in Microsoft 365 using Cazadora | Malicious OAuth apps can hide inside Microsoft 365 tenants. Huntress Labs' Cazadora script helps uncover rogue apps before they lead to a breach. Dive deeper in their Tradecraft Tuesday sessions. | Cyber | |
| 25.10.25 | AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more | AWS outage has taken down millions of websites, including Amazon.com, Prime Video, Perplexity AI, Canva and more. | Cyber | |
| 25.10.25 | ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More | Criminals don't need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your | Cyber | |
| 19.10.25 | Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense | Traditional MDR focuses on reacting to attacks already in motion — but modern threats demand prevention. Picus Security explains how Unified Exposure Management Platforms continuously identifies, validates, and fixes exploitable risks before adversaries strike. | Cyber | |
| 3.10.25 | 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising | Bitdefender's 2025 Cybersecurity Assessment Report paints a sobering picture of today's cyber defense landscape: mounting pressure to remain silent after breaches, a gap between | Cyber | The Hacker News |
| 18.9.25 | The first three things you’ll want during a cyberattack | When cyberattacks hit, every second counts. Survival depends on three essentials: clarity to see what's happening, control to contain it, and a lifeline to recover fast. Learn from Acronis TRU how MSPs and IT teams can prepare now for the difference between recovery and catastrophe. | Cyber | |
| 12.9.25 | Don’t let outdated IGA hold back your security, compliance, and growth | Identity Governance & Administration (IGA) is critical to keeping data secure, ensuring only the right people have access to the right resources. But legacy IGA is slow, costly, and code-heavy. | Cyber | |
| 31.8.25 | Shadow IT Is Expanding Your Attack Surface. Here’s Proof | Shadow IT isn't theoretical—it's everywhere. Intruder uncovered exposed backups, open Git repos, and admin panels in just days, all hiding sensitive data. Make your hidden assets visible before attackers do. | Cyber | |
| 31.8.25 | Why zero trust is never 'done' and is an ever-evolving process | Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier. | Cyber | |
| 29.8.25 | Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign | An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to | Cyber | The Hacker News |
| 24.7.25 | Kerberoasting Detections: A New Approach to a Decade-Old Challenge | Security experts have been talking about Kerberoasting for over a decade, yet this attack continues to evade typical defense methods. Why? It's because existing | Cyber | The Hacker News |
| 22.6.25 | Special Webinar: Key Insights from Verizon’s 2025 DBIR | GenAI, credential theft, third-party risks—Verizon's 2025 DBIR reveals what's putting your org at risk. Join DBIR author Alex Pinto & LayerX CEO Or Eshed as they break down this year's key insights and defense strategies. Don't miss the webinar—register now. | Cyber | BleepingComputer |
| 21.4.25 | 7 Steps to Take After a Credential-Based cyberattack | Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. | Cyber | BleepingComputer |
| 17.4.25 | Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024 | Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority of them identified and blocked by its systems | Cyber | The Hacker News |
| 9.3.25 | Employee charged with stealing unreleased movies, sharing them online | A Memphis man was arrested and charged with stealing DVDs and Blu-ray discs of unreleased movies and sharing ripped digital copies online before their release. | Cyber | BleepingComputer |
|
5.1.25 | Google Chrome is making it easier to share specific parts of long PDFs | Google is adding the Text Fragment feature to its PDF reader to make it easier to share specific parts of long PDFs. | Cyber | BleepingComputer |