government healthcare social media service provider fine education finance dark web retail law enforcement web telecoms travel manufacturing phama operating system insurance legal charity app tech gaming publishing transport utilities
story hacked malware unauthorised access ransomware vulnerability accidental disclosure phishing unsecured database poor security insider threat unsecured server hacked email lost device identity theft website hacked ddos stolen documents Trojans financial inside job spear phishing RDP skimming spyware
cyber attack privacy breach notification security flaw legislation poor operations user credentials physical security customer data third party Cryptocurrency enforcement email hacked insecure storage court action encryption fraud VPN passwords zero day state hacking 3rd parties employee data remote working stolen data

Why do phishing attacks work? Blame the humans, not the technology | ZDNet
SASE or zero trust? Why security teams should be using both - Help Net Security
Arup staff caught up in ransomware attack | News | Building Design
Microsoft Office 365 phishing evades detection with HTML Lego pieces
CDPR should fix Cyberpunk 2077's bugs then move on | PC Gamer
Trello business software settings leave users' personal data exposed in Japan - The Mainichi
Magistrátní síť ochromil kybernetický útok. Veškeré agendy magistrátu zůstávají mimo provoz - OLOMOUC.CZ
New wormable Android malware poses as Netflix to hijack WhatsApp sessions | ZDNet
$38 million worth of gift cards stolen and sold on dark web | WeLiveSecurity
How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants | Ars Technica
Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update • The Register
Should firms be more worried about firmware cyber-attacks? - BBC News
Phishing Emails Most Commonly Originate from Eastern Europe - Infosecurity Magazine
Facebook refuses to apologise after personal data of 11m UK users hacked
SAP Bugs Under Active Cyberattack | Threatpost
Third-party security breach compromises data of Singapore job-matching service | ZDNet
Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Your 'smart home' is watching and possibly sharing your data with the police | Technology | The Guardian
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
Hack takes: A CISO and a hacker detail how they’d respond to the Exchange breach – TechCrunch
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
Judge Decides Apple Knowingly Sold Defective MacBook Pros
Dutch privacy watchdog fines Booking.com €475K – POLITICO
Startseite - Evangelisches Krankenhaus Lippstadt
Unusual DearCry ransomware uses ‘rare’ approach to encryption
Google's Nest Hub Wants to Monitor Your Sleep
Ransomware Attack - Harris Highlights - Harris Federation
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
Endgame for end-to-end encryption | Open Rights Group
Google is taking far more data from your Android devices than you may think | TechRadar
North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
Malware adapted for the Apple M1 | Kaspersky official blog
80% of Global Enterprises Report Firmware Cyberattacks | Threatpost
Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
Building a Fortress: 3 Key Strategies for IT Security | Threatpost