Italy faces DDOS attacks from Russia
On Saturday, a series of sophisticated cyberattacks hit nine Italian government websites, causing disruptions across several key digital platforms. Among the affected sites were...
SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
Palo Alto, Calif., USA, 30th December 2024, CyberNewsWire
Top Law Enforcement Operations in Cybersecurity in 2024: A Year of Major Strikes Against...
In 2024, law enforcement agencies worldwide ramped up their efforts to combat cybercrime, leading to a series of high-profile operations aimed at disrupting the...
Google trending Cybersecurity headlines for the last weekend
Space Bears Ransomware Targets Atos SE in Major CyberattackAtos SE, the France-based global leader in cloud computing and cybersecurity services, has confirmed a major...
New Report: Attack Surface Challenges Behind 80% of Cybersecurity Breaches
Over 80% of cyber breaches result from external threat actors conducting phishing, session hijacking, account takeover, and ransomware attacks, putting organizations under mounting pressure...
Volkswagen data breach of Electric cars and D Link router botnet attack
Volkswagen Data Leak Exposes Information of Over 800,000 Electric Vehicle Owners
Volkswagen (VW), one of the most well-known automobile manufacturers in the world, has become...
Hacking Tug-of-War: China Accuses the USA for launching cyber attacks on its Technology Infrastructure
In recent weeks, the landscape of online espionage has shifted dramatically. For years, Western governments and companies have openly accused China of orchestrating cyber...
Clop Ransomware Gang Targets Cleo File Transfer Service and threatens to expose Sensitive Data
The infamous Clop Ransomware gang has once again made headlines by successfully breaching the servers of Cleo, a well-known provider of file transfer software....
Cloud Security Trends Survey: Best Practices for Securing Multi-Cloud Environments
Companies are increasingly pursuing a cloud-first strategy by developing and deploying applications with the cloud in mind. With the majority of organizations adopting a...
How Modern SecOps Teams Use CTEM to Assess and Reduce Cyber Threats
Gartner created the Continuous Threat Exposure Management (CTEM) framework as a strategic approach to help organizations of all sizes and maturity levels address modern...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...