Skip to content

Cyber Review

The daily byte

Skip to content Close Menu
  • Home
  • News
  • Blog
  • CVE

Security

'Hack DHS' bug hunters find 122 security flaws in DHS systems

Cyber Review April 22, 2022
The Department of Homeland Security (DHS) today revealed that bug bounty hunters enrolled in its 'Hack…

Russian hackers are seeking alternative money-laundering options

Cyber Review April 22, 2022
The Russian cybercrime community, one of the most active and prolific in the world, is turning…

US govt grants academics $12M to develop cyberattack defense tools

Cyber Review April 22, 2022
The US Department of Energy (DOE) has announced that it will provide $12 million in funding…

T-Mobile confirms Lapsus$ hackers breached internal systems

Cyber Review April 22, 2022
T-Mobile has confirmed that the Lapsus$ extortion gang breached its network "several weeks ago" using stolen credentials…

Chinese hackers behind most zero-day exploits during 2021

Cyber Review April 22, 2022
Threat analysts report that zero-day vulnerability exploitation is on the rise, with Chinese hackers using most…

Atlassian fixes critical Jira authentication bypass vulnerability

Cyber Review April 22, 2022
Atlassian has published a security advisory to alert that its Jira and Jira Service Management products…

Windows 10 KB5012636 cumulative update fixes freezing issues

Cyber Review April 22, 2022
Microsoft has released the optional KB5012636 cumulative update preview for Windows 10 1809 and Windows Server…

Docker servers hacked in ongoing cryptomining malware campaign

Cyber Review April 21, 2022
Docker APIs on Linux servers are being targeted by a large-scale Monero crypto-mining campaign from the…

Hackers earn $400K for zero-day ICS exploits demoed at Pwn2Own

Cyber Review April 21, 2022
Pwn2Own Miami 2022 has ended with competitors earning $400,000 for 26 zero-day exploits (and several bug…

QNAP asks users to mitigate critical Apache HTTP Server bugs

Cyber Review April 21, 2022
QNAP has asked customers to apply mitigation measures to block attempts to exploit Apache HTTP Server…

Posts navigation

1 2 … 9 Next →

Advertisement

  • Random
  • Recent
  • Popular

BakerHostetler Launches 2022 Data Security Incident Response Report — Resilience And Perseverance

Cyber Review April 8, 2022
WASHINGTON — April 7, 2022Key takeawaysRansomware remained the most prevalent and impactful type of data…

Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution

December 5, 2020

Critical MQTT-Related Bugs Open Industrial Networks to RCE…

February 11, 2022

New Lenovo UEFI Firmware Vulnerabilities Affect Millions of…

April 20, 2022

Incomplete 'Go SMS Pro' Patch Left Millions of…

December 1, 2020

CISA, Australia, Canada, New Zealand, & UK Issue…

April 20, 2022

Many Medical Device Makers Skimp on Security Practices

Cyber Review April 22, 2022
The stakes for cybersecurity are literally life and death in the medical device industry. As…

Sophos Buys Alert-Monitoring Automation Vendor

April 22, 2022

'Hack DHS' bug hunters find 122 security flaws…

April 22, 2022

Neustar Security Services’ UltraDNS Integrates Terraform for Streamlined,…

April 22, 2022

FBI Warns Ransomware Attacks on Agriculture Co-ops Could…

April 22, 2022

Best backup software (2022)

April 22, 2022

Cyber Security 101

Cyber Review March 4, 2019
What is Security : Security is freedom or resilience from potential harm. This usually refers…

What is risk?

March 11, 2019

Defining & Categorising Risk

March 14, 2019

Privacy

July 21, 2019

Phishing

July 5, 2020

Identity and Access Management

September 8, 2020

Categories

Acronis (0) Adaptive Shield (0) Apple (0) Black Hat (0) Blog (7) Breach (11) Cloud (2) Cloud Security (14) Critical Infrastructure (11) Cross Site Scripting (0) CryptoCurrency (7) Cryptography (1) CVE (100) Gaming (0) Google (1) Government (17) Hacks (22) Hardware (2) Healthcare (0) InfoSec Insider (2) IoT (4) Legal (6) Linux (1) Malware (58) Microsoft (16) Mobile (2) Mobile Security (8) Most Recent ThreatLists (0) News (718) Podcasts (7) Privacy (4) remote work (0) RSAC (0) Security (81) Security Analyst Summit (0) Security Vulnerabilities (0) Software (4) Sponsored (2) Technology (7) Uncategorized (60) Videos (0) Vulnerabilities (41) Web Security (81) website (0) wordpress (0)

Recent Comments

    Copyright © Imperium Cyber Security Pty Ltd