Skip to content

Cyber Review

The daily byte

Skip to content Close Menu
  • Home
  • News
  • Blog
  • CVE

Cloud Security

Zero-Trust For All: A Practical Guide

Cyber Review April 22, 2022
How to use zero-trust architecture effectively in today’s modern cloud-dependent infrastructures. While “zero-trust architecture” has become…

Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Cyber Review April 19, 2022
Exploring what’s next for public-cloud security, including top risks and how to implement better risk management.…

Protect Your Executives’ Cybersecurity Amidst Global Cyberwar

Cyber Review April 19, 2022
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives…

Cyberattackers Put the Pedal to the Medal: Podcast

Cyber Review April 18, 2022
Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where…

Microsoft Zero-Days, Wormable Bugs Spark Concern

Cyber Review April 12, 2022
For April Patch Tuesday, the computing giant addressed a zero-day under active attack and several critical…

Belarusian ‘Ghostwriter’ Actor Picks Up BitB for Ukraine-Related Attacks

Cyber Review March 31, 2022
Ghostwriter is one of 3 campaigns using war-themed attacks, with cyber-fire coming in from government-backed actors…

Lapsus$ ‘Back from Vacation’

Cyber Review March 30, 2022
Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads…

Microsoft Azure Developers Awash in PII-Stealing npm Packages

Cyber Review March 24, 2022
A large-scale, automated typosquatting attack saw 200+ malicious packages flood the npm code repository, targeting popular…

Top 3 Attack Trends in API Security – Podcast

Cyber Review March 24, 2022
Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according…

Misconfigured Firebase Databases Exposing Data in Mobile Apps

Cyber Review March 17, 2022
Five percent of the databases are vulnerable to threat actors: It’s a gold mine of exploit…

Posts navigation

1 2 Next →

Advertisement

  • Random
  • Recent
  • Popular

NGINX Shares Mitigations for Zero-Day Bug Affecting LDAP Implementation

Cyber Review April 12, 2022
The maintainers of the NGINX web server project have issued mitigations to address security weaknesses…

Privacy

July 21, 2019

CVE-2021-43287 (gocd)

April 14, 2022

Devo Acquires Threat Hunting Company Kognos

April 21, 2022

Wake-up call: Is the infosec skills gap causing…

April 7, 2022

US disrupts Russian Cyclops Blink botnet before being…

April 6, 2022

Many Medical Device Makers Skimp on Security Practices

Cyber Review April 22, 2022
The stakes for cybersecurity are literally life and death in the medical device industry. As…

Sophos Buys Alert-Monitoring Automation Vendor

April 22, 2022

'Hack DHS' bug hunters find 122 security flaws…

April 22, 2022

Neustar Security Services’ UltraDNS Integrates Terraform for Streamlined,…

April 22, 2022

FBI Warns Ransomware Attacks on Agriculture Co-ops Could…

April 22, 2022

Best backup software (2022)

April 22, 2022

Cyber Security 101

Cyber Review March 4, 2019
What is Security : Security is freedom or resilience from potential harm. This usually refers…

What is risk?

March 11, 2019

Defining & Categorising Risk

March 14, 2019

Privacy

July 21, 2019

Phishing

July 5, 2020

Identity and Access Management

September 8, 2020

Categories

Acronis (0) Adaptive Shield (0) Apple (0) Black Hat (0) Blog (7) Breach (11) Cloud (2) Cloud Security (14) Critical Infrastructure (11) Cross Site Scripting (0) CryptoCurrency (7) Cryptography (1) CVE (100) Gaming (0) Google (1) Government (17) Hacks (22) Hardware (2) Healthcare (0) InfoSec Insider (2) IoT (4) Legal (6) Linux (1) Malware (58) Microsoft (16) Mobile (2) Mobile Security (8) Most Recent ThreatLists (0) News (718) Podcasts (7) Privacy (4) remote work (0) RSAC (0) Security (81) Security Analyst Summit (0) Security Vulnerabilities (0) Software (4) Sponsored (2) Technology (7) Uncategorized (60) Videos (0) Vulnerabilities (41) Web Security (81) website (0) wordpress (0)

Recent Comments

    Copyright © Imperium Cyber Security Pty Ltd