Cyber Articles - 2024 2023 2021 2020 2019 2018 2017
DATE | NAME | Info | CATEG. | WEB |
| 13.11.25 | ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories | Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and | Cyber | The Hacker News |
| 9.11.25 | U.S. Congressional Budget Office hit by suspected foreign cyberattack | The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. | Cyber | |
| 9.11.25 | Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense | Red and blue teams often operate independently, but attackers don't. Picus Security shows how continuous purple teaming and BAS turn red-blue rivalry into real defense, validating controls and closing gaps in real time. | Cyber | |
| 7.11.25 | Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts | Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad | Cyber | The Hacker News |
| 6.11.25 | From Tabletop to Turnkey: Building Cyber Resilience in Financial Services | Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. | Cyber | The Hacker News |
| 6.11.25 | ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More | Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and | Cyber | The Hacker News |
| 25.10.25 | DNS0.EU private DNS service shuts down over sustainability issues | The DNS0.EU non-profit public DNS service focused on European users announced its immediate shut down due to time and resource constraints. | Cyber | |
| 25.10.25 | Find hidden malicious OAuth apps in Microsoft 365 using Cazadora | Malicious OAuth apps can hide inside Microsoft 365 tenants. Huntress Labs' Cazadora script helps uncover rogue apps before they lead to a breach. Dive deeper in their Tradecraft Tuesday sessions. | Cyber | |
| 25.10.25 | AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more | AWS outage has taken down millions of websites, including Amazon.com, Prime Video, Perplexity AI, Canva and more. | Cyber | |
| 25.10.25 | ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More | Criminals don't need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your | Cyber | |
| 19.10.25 | Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense | Traditional MDR focuses on reacting to attacks already in motion — but modern threats demand prevention. Picus Security explains how Unified Exposure Management Platforms continuously identifies, validates, and fixes exploitable risks before adversaries strike. | Cyber | |
| 3.10.25 | 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising | Bitdefender's 2025 Cybersecurity Assessment Report paints a sobering picture of today's cyber defense landscape: mounting pressure to remain silent after breaches, a gap between | Cyber | The Hacker News |
| 18.9.25 | The first three things you’ll want during a cyberattack | When cyberattacks hit, every second counts. Survival depends on three essentials: clarity to see what's happening, control to contain it, and a lifeline to recover fast. Learn from Acronis TRU how MSPs and IT teams can prepare now for the difference between recovery and catastrophe. | Cyber | |
| 12.9.25 | Don’t let outdated IGA hold back your security, compliance, and growth | Identity Governance & Administration (IGA) is critical to keeping data secure, ensuring only the right people have access to the right resources. But legacy IGA is slow, costly, and code-heavy. | Cyber | |
| 31.8.25 | Shadow IT Is Expanding Your Attack Surface. Here’s Proof | Shadow IT isn't theoretical—it's everywhere. Intruder uncovered exposed backups, open Git repos, and admin panels in just days, all hiding sensitive data. Make your hidden assets visible before attackers do. | Cyber | |
| 31.8.25 | Why zero trust is never 'done' and is an ever-evolving process | Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier. | Cyber | |
| 29.8.25 | Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign | An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to | Cyber | The Hacker News |
| 24.7.25 | Kerberoasting Detections: A New Approach to a Decade-Old Challenge | Security experts have been talking about Kerberoasting for over a decade, yet this attack continues to evade typical defense methods. Why? It's because existing | Cyber | The Hacker News |
| 22.6.25 | Special Webinar: Key Insights from Verizon’s 2025 DBIR | GenAI, credential theft, third-party risks—Verizon's 2025 DBIR reveals what's putting your org at risk. Join DBIR author Alex Pinto & LayerX CEO Or Eshed as they break down this year's key insights and defense strategies. Don't miss the webinar—register now. | Cyber | BleepingComputer |
| 30.5.24 | ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach | ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said | Cyber | The Hacker News |
| 23.5.24 | Hackers earn $1,078,750 for 28 zero-days at Pwn2Own Berlin | The Pwn2Own Berlin 2025 hacking competition has concluded, with security researchers earning $1,078,750 after exploiting 29 zero-day vulnerabilities and encountering some bug collisions. | Cyber | |
| 18.5.24 | Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own | During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. | Cyber | |
| 18.5.24 | Windows 11 and Red Hat Linux hacked on first day of Pwn2Own | On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox. | Cyber | BleepingComputer |
| 17.5.24 | Steel giant Nucor Corporation facing disruptions after cyberattack | A cybersecurity incident on Nucor Corporation's systems forced the company to take offline parts of its networks and implement containment measures. | Cyber | |
| 16.5.24 | Increase Red Team Operations 10X with Adversarial Exposure Validation | Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network. | Cyber | BleepingComputer |
| 21.4.25 | 7 Steps to Take After a Credential-Based cyberattack | Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. | Cyber | BleepingComputer |
| 17.4.25 | Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024 | Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority of them identified and blocked by its systems | Cyber | The Hacker News |
| 9.3.25 | Employee charged with stealing unreleased movies, sharing them online | A Memphis man was arrested and charged with stealing DVDs and Blu-ray discs of unreleased movies and sharing ripped digital copies online before their release. | Cyber | BleepingComputer |
|
5.1.25 | Google Chrome is making it easier to share specific parts of long PDFs | Google is adding the Text Fragment feature to its PDF reader to make it easier to share specific parts of long PDFs. | Cyber | BleepingComputer |
24.9.24 | New Google Chrome feature will translate complex pages in real time | Google is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages. | Cyber | BleepingComputer |
21.9.24 | Unexplained ‘Noise Storms’ flood the Internet, puzzle experts | Internet intelligence firm GreyNoise reports that it has been tracking large waves of "Noise Storms" containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose. | Cyber | |
5.8.24 | The Loper Bright Decision: How it Impacts Cybersecurity Law | The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to | Cyber | The Hacker News |
31.7.24 | New SideWinder Cyber Attacks Target Maritime Facilities in Multiple Countries | The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and | Cyber | The Hacker News |
22.7.24 | Microsoft confirms CrowdStrike update also hit Windows 365 PCs | Microsoft says the faulty CrowdStrike Falcon update, which caused widespread outages by crashing Windows systems worldwide, also resulted in Windows 365 Cloud PCs getting stuck in reboot loops, rendering them unusable. | Cyber | |
| 6.5.24 | Cybersecurity consultant arrested after allegedly extorting IT firm | A former cybersecurity consultant was arrested for allegedly attempting to extort a publicly traded IT company by threatening to disclose confidential and proprietary data unless they paid him $1,500,000. | Cyber | |
| 4.5.24 | Google Chrome's new post-quantum cryptography may break TLS connections | Some Google Chrome users report having issues connecting to websites, servers, and firewalls after Chrome 124 was released last week with the new quantum-resistant X25519Kyber768 encapsulation mechanism enabled by default. | Cyber | |
| 6.3.24 | Hackers abuse QEMU to covertly tunnel network traffic in cyberattacks | Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large company. | Cyber | |
| 5.3.24 | Group-IB reveals Hi-Tech Crime Trends 23/24: surge in ransomware against backdrop of growing AI, macOS threats | Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, is proud to announce the launch of its new report Hi-Tech Crime Trends 2023/2024, the latest edition of the company’s annual round-up of the most pressing global cyber threats to organizations and individuals. | Cyber | Group-IB |
21.1.24 | Court charges dev with hacking after cybersecurity issue disclosure | A German court has charged a programmer investigating an IT problem with hacking and fined them €3,000 ($3,265) for what it deemed was unauthorized access to external computer systems and spying on data. | Cyber | |
21.1.24 | BreachForums hacking forum admin sentenced to 20 years supervised release | Conor Brian Fitzpatrick was sentenced to 20 years of supervised release today in the Eastern District of Virginia for operating the notorious BreachForums hacking forum, known for the sale and leaking of personal data for hundreds of millions of people worldwide. | Cyber | |