government
healthcare
social media
service provider
fine
education
finance
dark web
retail
law enforcement
web
telecoms
travel
manufacturing
phama
operating system
insurance
legal
charity
app
tech
gaming
publishing
transport
utilities
story
hacked
malware
unauthorised access
ransomware
vulnerability
accidental disclosure
phishing
unsecured database
poor security
insider threat
unsecured server
hacked email
lost device
identity theft
website hacked
ddos
stolen documents
Trojans
financial
inside job
spear phishing
RDP
skimming
spyware
cyber attack
privacy
breach notification
security flaw
legislation
poor operations
user credentials
physical security
customer data
third party
Cryptocurrency
enforcement
email hacked
insecure storage
court action
encryption
fraud
VPN
passwords
zero day
state hacking
3rd parties
employee data
remote working
stolen data
Why do phishing attacks work? Blame the humans, not the technology | ZDNet
SASE or zero trust? Why security teams should be using both - Help Net Security
Arup staff caught up in ransomware attack | News | Building Design
Microsoft Office 365 phishing evades detection with HTML Lego pieces
CDPR should fix Cyberpunk 2077's bugs then move on | PC Gamer
Trello business software settings leave users' personal data exposed in Japan - The Mainichi
Magistrátní síť ochromil kybernetický útok. Veškeré agendy magistrátu zůstávají mimo provoz - OLOMOUC.CZ
New wormable Android malware poses as Netflix to hijack WhatsApp sessions | ZDNet
$38 million worth of gift cards stolen and sold on dark web | WeLiveSecurity
How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants | Ars Technica
Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update • The Register
Should firms be more worried about firmware cyber-attacks? - BBC News
Phishing Emails Most Commonly Originate from Eastern Europe - Infosecurity Magazine
Facebook refuses to apologise after personal data of 11m UK users hacked
SAP Bugs Under Active Cyberattack | Threatpost
Third-party security breach compromises data of Singapore job-matching service | ZDNet
Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Your 'smart home' is watching and possibly sharing your data with the police | Technology | The Guardian
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
Hack takes: A CISO and a hacker detail how they’d respond to the Exchange breach – TechCrunch
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
Judge Decides Apple Knowingly Sold Defective MacBook Pros
Dutch privacy watchdog fines Booking.com €475K – POLITICO
Startseite - Evangelisches Krankenhaus Lippstadt
Unusual DearCry ransomware uses ‘rare’ approach to encryption
Google's Nest Hub Wants to Monitor Your Sleep
Ransomware Attack - Harris Highlights - Harris Federation
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
Endgame for end-to-end encryption | Open Rights Group
Google is taking far more data from your Android devices than you may think | TechRadar
North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
Malware adapted for the Apple M1 | Kaspersky official blog
80% of Global Enterprises Report Firmware Cyberattacks | Threatpost
Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
Building a Fortress: 3 Key Strategies for IT Security | Threatpost