Skip to content

Cyber Review

The daily byte

Skip to content Close Menu
  • Home
  • News
  • Blog
  • CVE

Breach

Menswear Brand Zegna Reveals Ransomware Attack

Cyber Review April 12, 2022
Accounting materials from the Italy-based luxury fashion house were leaked online by RansomExx because the company…

Authorities Fully Behead Hydra Dark Marketplace

Cyber Review April 5, 2022
The popular underground market traded in drugs, stolen data, forged documents and more — raking in…

Lapsus$ ‘Back from Vacation’

Cyber Review March 30, 2022
Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads…

Okta Says It Goofed in Handling the Lapsus$ Attack

Cyber Review March 28, 2022
“We made a mistake,” Okta said, owning up to its responsibility for security incidents that hit…

HubSpot Data Breach Ripples Through Crytocurrency Industry

Cyber Review March 24, 2022
~30 crypto companies were affected, including BlockFi, Swan Bitcoin and NYDIG, providing an uncomfortable reminder about…

Lapsus$ Data Kidnappers Claim Snatches From Microsoft, Okta

Cyber Review March 22, 2022
Lapsus$ shared screenshots of internal Okta systems and 40Gb of purportedly stolen Microsoft data on Bing,…

Conti Ransomware V. 3, Including Decryptor, Leaked

Cyber Review March 21, 2022
The latest is a fresher version of the ransomware pro-Ukraine researcher ContiLeaks already released, but it’s…

Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops

Cyber Review March 18, 2022
Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing…

Sharp SIM-Swapping Spike Causes $68M in Losses

Cyber Review February 10, 2022
The attacks, which lead to 2FA defeat and account takeover, have accelerated by several hundred percent…

3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I

Cyber Review February 9, 2022
Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today…

Posts navigation

1 2 Next →

Advertisement

  • Random
  • Recent
  • Popular

How to block tracking pixels in Apple Mail

Cyber Review April 6, 2022
Third-party entities go out of their way to collect data from you. In your web…

Massive LinkedIn Phishing, Bot Attacks Feed on the…

February 16, 2022

Access control vulnerability in Easy!Appointments platform exposed sensitive…

April 11, 2022

Rise in npm protestware: another open source dev…

April 11, 2022

Browser-in-the-Browser Attack Makes Phishing Nearly Invisible

March 21, 2022

Law enforcement takes over Emotet, one of the…

January 27, 2021

Many Medical Device Makers Skimp on Security Practices

Cyber Review April 22, 2022
The stakes for cybersecurity are literally life and death in the medical device industry. As…

Sophos Buys Alert-Monitoring Automation Vendor

April 22, 2022

'Hack DHS' bug hunters find 122 security flaws…

April 22, 2022

Neustar Security Services’ UltraDNS Integrates Terraform for Streamlined,…

April 22, 2022

FBI Warns Ransomware Attacks on Agriculture Co-ops Could…

April 22, 2022

Best backup software (2022)

April 22, 2022

Cyber Security 101

Cyber Review March 4, 2019
What is Security : Security is freedom or resilience from potential harm. This usually refers…

What is risk?

March 11, 2019

Defining & Categorising Risk

March 14, 2019

Privacy

July 21, 2019

Phishing

July 5, 2020

Identity and Access Management

September 8, 2020

Categories

Acronis (0) Adaptive Shield (0) Apple (0) Black Hat (0) Blog (7) Breach (11) Cloud (2) Cloud Security (14) Critical Infrastructure (11) Cross Site Scripting (0) CryptoCurrency (7) Cryptography (1) CVE (100) Gaming (0) Google (1) Government (17) Hacks (22) Hardware (2) Healthcare (0) InfoSec Insider (2) IoT (4) Legal (6) Linux (1) Malware (58) Microsoft (16) Mobile (2) Mobile Security (8) Most Recent ThreatLists (0) News (718) Podcasts (7) Privacy (4) remote work (0) RSAC (0) Security (81) Security Analyst Summit (0) Security Vulnerabilities (0) Software (4) Sponsored (2) Technology (7) Uncategorized (60) Videos (0) Vulnerabilities (41) Web Security (81) website (0) wordpress (0)

Recent Comments

    Copyright © Imperium Cyber Security Pty Ltd