Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
01-03Techcrunch

Researchers uncover unknown Android flaws used to hack into a student’s phone

01-03Techcrunch

Researchers uncover unknown Android flaws used to hack into a student’s phone

01-03Bleepingcomputer

U.S. recovers $31 million stolen in 2021 Uranium Finance hack

01-03Bleepingcomputer

U.S. recovers $31 million stolen in 2021 Uranium Finance hack

01-03Bleepingcomputer

Qilin ransomware claims attack at Lee Enterprises, leaks stolen data

01-03Bleepingcomputer

Qilin ransomware claims attack at Lee Enterprises, leaks stolen data

01-03Bleepingcomputer

Serbian police used Cellebrite zero-day hack to unlock Android phones

01-03Bleepingcomputer

Serbian police used Cellebrite zero-day hack to unlock Android phones

01-03Help Net Security

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

01-03Help Net Security

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

01-03Help Net Security

OSPS Baseline: Practical security best practices for open source software projects

01-03Help Net Security

OSPS Baseline: Practical security best practices for open source software projects

01-03Infosecurity

Third-Party Attacks Drive Major Financial Losses in 2024

01-03Infosecurity

Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn

01-03Security Magazine

The new standard in facility protection: Enhancing perimeter security

01-03CyberExperts

Cybersecurity Breach Looms as CFPB Cancels Key Protection Contracts

01-03CyberExperts

EU’s Cybersecurity Label Push: Industry Allies Big Tech’s Security Seal

01-03CyberExperts

United Front: Enhanced State Collaboration Crucial for Infrastructure Security

01-03CyberExperts

Harnessing AI Safely: Transforming the Future of Cybersecurity

01-03The Hacker News

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

01-03The Hacker News

RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

01-03The Hacker News

Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains

01-03The Hacker News

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

28-02Bleepingcomputer

Belgium probes if Chinese hackers breached its intelligence service

28-02Tweakers

VS: Britse achterdeureis voor iOS schendt mogelijk Cloud-verdrag

28-02Infosecurity

Old Vulnerabilities Among the Most Widely Exploited

28-02Infosecurity

Prolific Data Extortion Actor Arrested in Thailand

28-02Security Magazine

Cybersecurity recommendations for the Trump administration

28-02The Hacker News

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

28-02The Hacker News

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

28-02Techcrunch

SEC says meme coins are not securities

28-02Bleepingcomputer

Privacy tech firms warn France’s encryption and VPN laws threaten privacy

28-02Bleepingcomputer

Microsoft names cybercriminals behind AI deepfake network

28-02Bleepingcomputer

Over 49,000 misconfigured building access systems exposed online

28-02Bleepingcomputer

Belgium probes if Chinese hackers breached its intelligence service

28-02Bleepingcomputer

Suspected Desorden hacker arrested for breaching 90 organizations

28-02Help Net Security

Understanding the AI Act and its compliance challenges

28-02Help Net Security

The art of balancing data security with business goals

28-02Help Net Security

Infosec products of the month: February 2025

28-02Help Net Security

2024 phishing trends tell us what to expect in 2025

28-02Infosecurity

DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen

28-02Infosecurity

Winos 4.0 Malware Targets Taiwan With Email Impersonation

28-02Infosecurity

Software Vulnerabilities Take Almost Nine Months to Patch

28-02Infosecurity

Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

28-02CyberExperts

AI Breakthroughs: Revolutionizing Cybersecurity and Mental Health Together

28-02CyberExperts

DISA Breach Unveiled: Swedish Backdoors and Political Scrutiny Emerge

28-02Security Magazine

Ransomware incidents reached record levels in 2024

28-02Security Magazine

MITRE Caldera security advisory warns of maximum severity flaw

28-02Security Magazine

39% of vulnerabilities could cause both a loss of view and control

28-02The Hacker News

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

28-02The Hacker News

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

28-02The Hacker News

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New

28-02The Hacker News

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

27-02Help Net Security

CalypsoAI Security Leaderboard offers safety ranking of major GenAI models

27-02Help Net Security

F5 Application Delivery and Security Platform simplifies management for IT and security teams

27-02Bleepingcomputer

FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist

27-02Infosecurity

OpenSSF Publishes Security Framework for Open Source Software

27-02Infosecurity

FBI Confirms North Korea’s Lazarus Group as Bybit Crypto Hackers

27-02Tweakers

FBI: Noord-Korea is verantwoordelijk voor hack cryptobeurs Bybit

27-02Security Magazine

Security leaders discuss botnet attack against Microsoft 365 accounts

27-02The Hacker News

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

27-02The Hacker News

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

27-02Help Net Security

Is Agentic AI too smart for your own good?

27-02Help Net Security

Cybersecurity jobs available right now in Europe: February 27, 2025

27-02Help Net Security

Debunking 5 myths about network automation

27-02Help Net Security

What cybersecurity pros read for fun

27-02Help Net Security

Is your email or password among the 240+ million compromised by infostealers?

27-02Help Net Security

Fortanix protects enterprises from AI and quantum computing threats

27-02Help Net Security

Hundreds of GitHub repos served up malware for years

27-02Techcrunch

Hacked crypto exchange Bybit offers $140M bounty to trace stolen funds

27-02Bleepingcomputer

Southern Water says Black Basta ransomware attack cost £4.5M in expenses

27-02Bleepingcomputer

VSCode extensions with 9 million installs pulled over security risks

27-02Bleepingcomputer

Lazarus hacked Bybit via breached Safe{Wallet} developer machine

27-02Bleepingcomputer

Pump.fun X account hacked to promote scam governance token

27-02Bleepingcomputer

EncryptHub breaches 618 orgs to deploy infostealers, ransomware

27-02Bleepingcomputer

Five best practices for securing Active Directory service accounts

27-02Bleepingcomputer

Australian IVF giant Genea breached by Termite ransomware gang

27-02BBC

Crypto sleuths join hunt for $1.5bn stolen in biggest ever heist

27-02Infosecurity

99% of Organizations Report API-Related Security Issues

27-02Infosecurity

DISA Global Solutions Confirms Data Breach Affecting 3.3M People

27-02Infosecurity

Signal May Exit Sweden If Government Imposes Encryption Backdoor

27-02Nu.nl

Bedrijf stuurt premiejagers af op hackers die grootste cryptoroof ooit uitvoerden

27-02CyberExperts

Cyber Shield Revolution: Navigating Modern Threats with Holistic Defense

27-02Security Magazine

5 IAM considerations and lessons learned in the insurance industry

27-02Security Magazine

CISO strategies: Modern challenges and how to overcome them

27-02Security Magazine

99% of organizations faced API security issues within past 12 months

27-02Security Magazine

Richard Bird hired as Chief Security Officer at Singulr AI

27-02The Hacker News

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

27-02The Hacker News

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

27-02The Hacker News

SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

27-02The Hacker News

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

27-02The Hacker News

Three Password Cracking Techniques and How to Defend Against Them

27-02The Hacker News

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

27-02The Hacker News

Malicious PyPI Package 'automslc' Enables 104K+ Unauthorized Deezer Music Downloads

26-02Help Net Security

Pentera Cyber Pulse identifies new threats and vulnerabilities

26-02Help Net Security

Red Hat OpenShift 4.18 enhances security across IT environments

26-02Help Net Security

Seal OS fixes vulnerabilities in Linux operating systems

26-02Techcrunch

Hackers publish sensitive patient data allegedly stolen from Australian IVF provider Genea

26-02Techcrunch

Thousands of exposed GitHub repos, now private, can still be accessed through Copilot

26-02BBC

What Apple pulling Advanced Data Protection means for you

Onze partners

Ook partner worden?