Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
03-04Help Net Security

Corgea BLAST uncovers hidden vulnerabilities in code

03-04Help Net Security

Corgea BLAST uncovers hidden vulnerabilities in code

03-04Help Net Security

CyberQP launches Zero Trust Helpdesk Security Platform

03-04Help Net Security

CyberQP launches Zero Trust Helpdesk Security Platform

03-04Help Net Security

Beware fake AutoCAD, SketchUp sites dropping malware

03-04Help Net Security

Beware fake AutoCAD, SketchUp sites dropping malware

03-04Help Net Security

7 ways to get C-suite buy-in on that new cybersecurity tool

03-04Help Net Security

7 ways to get C-suite buy-in on that new cybersecurity tool

03-04Infosecurity

Over Half of Attacks on Electricity and Water Firms Are Destructive

03-04Infosecurity

Nearly 600 Phishing Domains Emerge Following Bybit Heist

03-04CyberExperts

Axiad Soars: Joins Ranks of Elite Cybersecurity Innovators

03-04CyberExperts

OpenAI Fuels Fight Against Deepfakes with Adaptive Security Investment

03-04CyberExperts

BlackBerry’s Cybersecurity Struggles: Lower Revenue Forecast Amid Waning Demand

03-04CyberExperts

BlackBerry Faces Revenue Slump Amid Cybersecurity Demand Decline

03-04CyberExperts

Safeguarding Your Smart Home: Expert Cybersecurity Tips From NIST

03-04The Hacker News

Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

03-04The Hacker News

Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices

03-04Bleepingcomputer

Verizon Call Filter API flaw exposed customers' incoming call history

03-04Bleepingcomputer

GitHub expands security tools after 39 million secrets leaked in 2024

03-04Bleepingcomputer

Royal Mail investigates data leak claims, no impact on operations

03-04Bleepingcomputer

The Reality Behind Security Control Failures—And How to Prevent Them

03-04Help Net Security

Building a cybersecurity strategy that survives disruption

03-04Help Net Security

Cybercriminals exfiltrate data in just three days

03-04Help Net Security

Open-source malware doubles, data exfiltration attacks dominate

03-04Help Net Security

Review: Zero to Engineer

03-04Help Net Security

Travelers Cyber Risk Services reduces the risk of a cyberattack

03-04Help Net Security

How to map and manage your cyber attack surface with EASM

03-04Help Net Security

Utimaco releases Quantum Protect solution

03-04Help Net Security

Google is making sending end-to-end encrypted emails easy

03-04Techcrunch

A new security fund opens up to help protect the fediverse

03-04Tweakers

Nintendo onthult Hyrule Warriors: Age of Imprisonment voor Switch 2

03-04Infosecurity

Stripe API Skimming Campaign Unveils New Techniques for Theft

03-04Infosecurity

Royal Mail Investigates Data Breach Affecting Supplier

03-04Infosecurity

Gray Bots Surge as Generative AI Scraper Activity Increases

03-04Infosecurity

Bybit Heist Fuels Record Crypto-Theft Surge, Says CertiK

03-04Infosecurity

North Korea's Fake IT Worker Scheme Sets Sights on Europe

03-04Security Magazine

The threat of phishing attacks and law enforcement’s role (Part 1)

03-04Security Magazine

The threat of phishing attacks and law enforcement’s role (Part 1)

03-04Security Magazine

Cybersecurity is the second highest business concern for SMBs

03-04Security Magazine

Cybersecurity is the second highest business concern for SMBs

03-04CyberExperts

HHS Staffing Cuts Threaten Medical Device Cybersecurity Safeguards

03-04CyberExperts

Undergrad Innovates Cybersecurity with Engaging Gamified Learning Platform

03-04CyberExperts

Minnesota Faces Cybersecurity Crisis Amid Federal Funding Reductions

03-04CyberExperts

Minnesota Faces Cybersecurity Crisis Amid Federal Funding Reductions

03-04CyberExperts

Cybersecurity Revolution: Platformization Boosts Agility and Elevates User Experience

03-04CyberExperts

Cybersecurity Revolution: Platformization Boosts Agility and Elevates User Experience

03-04CyberExperts

CrowdStrike’s Ascent: Redefining the Cybersecurity Landscape with Innovation

03-04CyberExperts

CrowdStrike’s Ascent: Redefining the Cybersecurity Landscape with Innovation

03-04CyberExperts

Keeper Security Steps Up: Partners with CISA for Cyber Defense Revolution

03-04CyberExperts

Keeper Security Steps Up: Partners with CISA for Cyber Defense Revolution

03-04CyberExperts

GlobalProtect Portals Under Siege: Surge in Mass Login Scans

03-04CyberExperts

GlobalProtect Portals Under Siege: Surge in Mass Login Scans

03-04CyberExperts

Revamping Cyber Defense: Lawmakers Eye Grant Program Enhancements

03-04CyberExperts

Revamping Cyber Defense: Lawmakers Eye Grant Program Enhancements

03-04CyberExperts

Mozilla Challenges Gmail, Rising VPN Scans, Microsoft Exposes Vulnerabilities

03-04CyberExperts

Mozilla Challenges Gmail, Rising VPN Scans, Microsoft Exposes Vulnerabilities

03-04CyberExperts

Asia’s Looming Threat: Malaysian Airports Face Cyber Siege

03-04CyberExperts

Asia’s Looming Threat: Malaysian Airports Face Cyber Siege

03-04The Hacker News

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

03-04The Hacker News

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

03-04The Hacker News

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

03-04The Hacker News

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

03-04The Hacker News

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

03-04The Hacker News

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

03-04The Hacker News

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers

03-04The Hacker News

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

03-04The Hacker News

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

03-04The Hacker News

How SSL Misconfigurations Impact Your Attack Surface

03-04The Hacker News

How SSL Misconfigurations Impact Your Attack Surface

02-04Help Net Security

North Korean IT workers set their sights on European organizations

02-04Infosecurity

Steam Surges to Top of Most Spoofed Brands List in Q1

02-04Infosecurity

ICO Apologizes After Data Protection Response Snafu

02-04CyberExperts

Fortifying Global Health: The Imperative of Robust Cybersecurity Measures

02-04CyberExperts

Transforming Healthcare: Protecting Legacy Medical Devices from Cyber Threats

02-04CyberExperts

Digital Warfare on Tracks: Ukrainian Railways Hit by Cyberstorm

02-04CyberExperts

Cyberstorm Alert: CrushFTP Security Breach Puts Sensitive Transfers at Risk

02-04CyberExperts

Wall Street Eyes Cybersecurity Titans: Palo Alto Networks and CyberArk Shine

02-04The Hacker News

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

02-04The Hacker News

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

02-04Help Net Security

Balancing data protection and clinical usability in healthcare

02-04Help Net Security

BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework

02-04Help Net Security

Only 1% of malicious emails that reach inboxes deliver malware

02-04Help Net Security

Your smart home may not be as secure as you think

02-04Help Net Security

Building a reasonable cyber defense program

02-04Help Net Security

ExaGrid announces three models and additional security features in software version update

02-04Help Net Security

Stellar Cyber Open Cybersecurity Alliance enhances threat detection and response

02-04Help Net Security

Attackers are probing Palo Alto Networks GlobalProtect portals

02-04Help Net Security

LoftLabs vNode simplifies Kubernetes operations

02-04Techcrunch

Someone is trying to recruit security researchers in bizarre hacking campaign 

02-04Bleepingcomputer

Google rolls out easy end-to-end encryption for Gmail business users

02-04Bleepingcomputer

Apple backports zero-day patches to older iPhones and Macs

02-04Infosecurity

WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks

02-04Infosecurity

Ukraine Blames Russia for Railway Hack, Labels It 'Act of Terrorism'

02-04Infosecurity

New Phishing Attack Combines Vishing and DLL Sideloading Techniques

02-04Infosecurity

Google to Switch on E2EE for All Gmail Users

02-04Infosecurity

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

02-04Security Magazine

Who’s driving ransomware’s accelerated growth in 2025

02-04CyberExperts

Global Cyber Siege: 24,000 IPs Assault PAN-OS Security System

02-04CyberExperts

Navigating Cyber Threats in a World Without Digital Borders

02-04CyberExperts

Geopolitical Strife Ignites Global Cybersecurity Alert for Businesses

Onze partners

Ook partner worden?