Cyber  Articles -  2024  2023  2021  2020  2019  2018  2017

DATE

NAME

Info

CATEG.

WEB

13.11.25 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and Cyber The Hacker News
9.11.25 U.S. Congressional Budget Office hit by suspected foreign cyberattack The U.S. Congressional Budget Office (CBO) confirms it suffered a cybersecurity incident after a suspected foreign hacker breached its network, potentially exposing sensitive data. Cyber

BleepingComputer

9.11.25 Continuous Purple Teaming: Turning Red-Blue Rivalry into Real Defense Red and blue teams often operate independently, but attackers don't. Picus Security shows how continuous purple teaming and BAS turn red-blue rivalry into real defense, validating controls and closing gaps in real time. Cyber

BleepingComputer

7.11.25 Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad Cyber The Hacker News
6.11.25 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Cyber The Hacker News
6.11.25 ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and Cyber The Hacker News
25.10.25 DNS0.EU private DNS service shuts down over sustainability issues The DNS0.EU non-profit public DNS service focused on European users announced its immediate shut down due to time and resource constraints. Cyber

BleepingComputer

25.10.25 Find hidden malicious OAuth apps in Microsoft 365 using Cazadora Malicious OAuth apps can hide inside Microsoft 365 tenants. Huntress Labs' Cazadora script helps uncover rogue apps before they lead to a breach. Dive deeper in their Tradecraft Tuesday sessions. Cyber

BleepingComputer

25.10.25 AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more AWS outage has taken down millions of websites, including Amazon.com, Prime Video, Perplexity AI, Canva and more. Cyber

BleepingComputer

25.10.25 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don't need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your Cyber

The Hacker News

19.10.25 Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense Traditional MDR focuses on reacting to attacks already in motion — but modern threats demand prevention. Picus Security explains how Unified Exposure Management Platforms continuously identifies, validates, and fixes exploitable risks before adversaries strike. Cyber

BleepingComputer

3.10.25 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising Bitdefender's 2025 Cybersecurity Assessment Report paints a sobering picture of today's cyber defense landscape: mounting pressure to remain silent after breaches, a gap between Cyber The Hacker News
18.9.25 The first three things you’ll want during a cyberattack When cyberattacks hit, every second counts. Survival depends on three essentials: clarity to see what's happening, control to contain it, and a lifeline to recover fast. Learn from Acronis TRU how MSPs and IT teams can prepare now for the difference between recovery and catastrophe. Cyber

BleepingComputer

12.9.25 Don’t let outdated IGA hold back your security, compliance, and growth Identity Governance & Administration (IGA) is critical to keeping data secure, ensuring only the right people have access to the right resources. But legacy IGA is slow, costly, and code-heavy. Cyber

BleepingComputer

31.8.25 Shadow IT Is Expanding Your Attack Surface. Here’s Proof Shadow IT isn't theoretical—it's everywhere. Intruder uncovered exposed backups, open Git repos, and admin panels in just days, all hiding sensitive data. Make your hidden assets visible before attackers do. Cyber

BleepingComputer

31.8.25 Why zero trust is never 'done' and is an ever-evolving process Zero trust isn't a project you finish—it's a cycle that keeps evolving. From supply chain exploits to policy drift, resilience requires continuous testing and adaptation. Learn how Specops Software supports this journey with tools that make it easier. Cyber

BleepingComputer

29.8.25 Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors as part of an espionage campaign to Cyber The Hacker News
24.7.25 Kerberoasting Detections: A New Approach to a Decade-Old Challenge Security experts have been talking about Kerberoasting for over a decade, yet this attack continues to evade typical defense methods. Why? It's because existing Cyber The Hacker News
22.6.25 Special Webinar: Key Insights from Verizon’s 2025 DBIR GenAI, credential theft, third-party risks—Verizon's 2025 DBIR reveals what's putting your org at risk. Join DBIR author Alex Pinto & LayerX CEO Or Eshed as they break down this year's key insights and defense strategies. Don't miss the webinar—register now. Cyber BleepingComputer
30.5.24 ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said Cyber The Hacker News
23.5.24 Hackers earn $1,078,750 for 28 zero-days at Pwn2Own Berlin The Pwn2Own Berlin 2025 hacking competition has concluded, with security researchers earning $1,078,750 after exploiting 29 zero-day vulnerabilities and encountering some bug collisions. Cyber

BleepingComputer

18.5.24 Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. Cyber

BleepingComputer

18.5.24 Windows 11 and Red Hat Linux hacked on first day of Pwn2Own On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day exploits for Windows 11, Red Hat Linux, Docker Desktop, and Oracle VirtualBox. Cyber BleepingComputer
17.5.24 Steel giant Nucor Corporation facing disruptions after cyberattack A cybersecurity incident on Nucor Corporation's systems forced the company to take offline parts of its networks and implement containment measures. Cyber

BleepingComputer

16.5.24 Increase Red Team Operations 10X with Adversarial Exposure Validation Red teams uncover what others miss — but they can't be everywhere, all the time. Adversarial Exposure Validation combines BAS + Automated Pentesting to extend red team impact, uncover real attack paths, and validate defenses continuously. Learn more from Picus Security on how AEV can help protect your network. Cyber BleepingComputer
21.4.25 7 Steps to Take After a Credential-Based cyberattack Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. Cyber BleepingComputer
17.4.25 Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024 Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority of them identified and blocked by its systems Cyber The Hacker News
9.3.25 Employee charged with stealing unreleased movies, sharing them online A Memphis man was arrested and charged with stealing DVDs and Blu-ray discs of unreleased movies and sharing ripped digital copies online before their release. Cyber BleepingComputer

5.1.25

Google Chrome is making it easier to share specific parts of long PDFs Google is adding the Text Fragment feature to its PDF reader to make it easier to share specific parts of long PDFs. Cyber BleepingComputer

24.9.24

New Google Chrome feature will translate complex pages in real timeGoogle is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages.CyberBleepingComputer

21.9.24

Unexplained ‘Noise Storms’ flood the Internet, puzzle expertsInternet intelligence firm GreyNoise reports that it has been tracking large waves of "Noise Storms" containing spoofed internet traffic since January 2020. However, despite extensive analysis, it has not concluded its origin and purpose.Cyber

BleepingComputer

5.8.24

The Loper Bright Decision: How it Impacts Cybersecurity LawThe Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading toCyberThe Hacker News

31.7.24

New SideWinder Cyber Attacks Target Maritime Facilities in Multiple CountriesThe nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports andCyberThe Hacker News

22.7.24

Microsoft confirms CrowdStrike update also hit Windows 365 PCsMicrosoft says the faulty CrowdStrike Falcon update, which caused widespread outages by crashing Windows systems worldwide, also resulted in Windows 365 Cloud PCs getting stuck in reboot loops, rendering them unusable.Cyber

BleepingComputer

6.5.24Cybersecurity consultant arrested after allegedly extorting IT firmA former cybersecurity consultant was arrested for allegedly attempting to extort a publicly traded IT company by threatening to disclose confidential and proprietary data unless they paid him $1,500,000.Cyber

BleepingComputer

4.5.24Google Chrome's new post-quantum cryptography may break TLS connectionsSome ​Google Chrome users report having issues connecting to websites, servers, and firewalls after Chrome 124 was released last week with the new quantum-resistant X25519Kyber768 encapsulation mechanism enabled by default.Cyber

BleepingComputer

6.3.24Hackers abuse QEMU to covertly tunnel network traffic in cyberattacksMalicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large company.Cyber

BleepingComputer

5.3.24Group-IB reveals Hi-Tech Crime Trends 23/24: surge in ransomware against backdrop of growing AI, macOS threatsGroup-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, is proud to announce the launch of its new report Hi-Tech Crime Trends 2023/2024, the latest edition of the company’s annual round-up of the most pressing global cyber threats to organizations and individuals.CyberGroup-IB

21.1.24

Court charges dev with hacking after cybersecurity issue disclosureA German court has charged a programmer investigating an IT problem with hacking and fined them €3,000 ($3,265) for what it deemed was unauthorized access to external computer systems and spying on data.Cyber

BleepingComputer

21.1.24

BreachForums hacking forum admin sentenced to 20 years supervised releaseConor Brian Fitzpatrick was sentenced to 20 years of supervised release today in the Eastern District of Virginia for operating the notorious BreachForums hacking forum, known for the sale and leaking of personal data for hundreds of millions of people worldwide.Cyber

BleepingComputer