Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
14-02The Hacker News

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

14-02The Hacker News

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

14-02The Hacker News

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

14-02The Hacker News

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

14-02The Hacker News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

14-02The Hacker News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

14-02The Hacker News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

14-02The Hacker News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

13-02The Hacker News

npm’s Update to Harden Their Supply Chain, and Points to Consider

13-02The Hacker News

npm’s Update to Harden Their Supply Chain, and Points to Consider

13-02The Hacker News

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

13-02The Hacker News

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

13-02The Hacker News

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

13-02The Hacker News

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

13-02The Hacker News

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

12-02The Hacker News

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

12-02The Hacker News

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

12-02The Hacker News

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

12-02The Hacker News

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

12-02The Hacker News

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

12-02The Hacker News

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

12-02The Hacker News

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

12-02The Hacker News

Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days

12-02The Hacker News

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

11-02The Hacker News

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

11-02The Hacker News

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

11-02The Hacker News

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

11-02The Hacker News

From Ransomware to Residency: Inside the Rise of the Digital Parasite

11-02The Hacker News

ZAST.AI Raises $6M Pre-A to Scale 'Zero False Positive' AI-Powered Code Security

11-02The Hacker News

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

10-02The Hacker News

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

10-02The Hacker News

Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data

10-02The Hacker News

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

10-02The Hacker News

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

10-02The Hacker News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

10-02The Hacker News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

10-02The Hacker News

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

10-02The Hacker News

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

10-02The Hacker News

⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

10-02The Hacker News

⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

10-02The Hacker News

How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

10-02The Hacker News

How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

09-02The Hacker News

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

09-02The Hacker News

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

09-02The Hacker News

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

09-02The Hacker News

TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure

09-02The Hacker News

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

09-02The Hacker News

BeyondTrust Fixes Critical Pre-Auth RCE Vulnerability in Remote Support and PRA

08-02The Hacker News

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

08-02The Hacker News

OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

08-02The Hacker News

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

08-02The Hacker News

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

07-02The Hacker News

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

07-02The Hacker News

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

07-02The Hacker News

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

06-02Security Magazine

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

06-02The Hacker News

How Samsung Knox Helps Stop Your Network Security Breach

06-02The Hacker News

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

06-02The Hacker News

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

06-02Help Net Security

The hidden cost of putting off security decisions

06-02Help Net Security

New infosec products of the week: February 6, 2026

06-02Help Net Security

CISA confirms exploitation of VMware ESXi flaw by ransomware attackers

06-02Help Net Security

OpenAI Frontier organizes AI agents under one system

06-02Help Net Security

Why a decade-old EnCase driver still works as an EDR killer

06-02Help Net Security

International sting dismantles illegal streaming empire serving millions

06-02Help Net Security

International sting dismantles illegal streaming empire serving millions

06-02Techcrunch

One of Europe’s largest universities knocked offline for days after cyberattack

06-02Techcrunch

One of Europe’s largest universities knocked offline for days after cyberattack

06-02Techcrunch

Data breach at govtech giant Conduent balloons, affecting millions more Americans

06-02Techcrunch

Data breach at govtech giant Conduent balloons, affecting millions more Americans

06-02Bleepingcomputer

Italian university La Sapienza goes offline after cyberattack

06-02Bleepingcomputer

Italian university La Sapienza goes offline after cyberattack

06-02Bleepingcomputer

Romanian oil pipeline operator Conpet discloses cyberattack

06-02Bleepingcomputer

Romanian oil pipeline operator Conpet discloses cyberattack

06-02Bleepingcomputer

CISA: VMware ESXi flaw now exploited in ransomware attacks

06-02Bleepingcomputer

CISA: VMware ESXi flaw now exploited in ransomware attacks

06-02Bleepingcomputer

CISA warns of five-year-old GitLab flaw exploited in attacks

06-02Bleepingcomputer

CISA warns of five-year-old GitLab flaw exploited in attacks

06-02Bleepingcomputer

The Double-Edged Sword of Non-Human Identities

06-02Bleepingcomputer

The Double-Edged Sword of Non-Human Identities

06-02Bleepingcomputer

EDR killer tool uses signed kernel driver from forensic software

06-02Bleepingcomputer

EDR killer tool uses signed kernel driver from forensic software

06-02Infosecurity

Malicious Commands in GitHub Codespaces Enable RCE

06-02Infosecurity

Malicious Commands in GitHub Codespaces Enable RCE

06-02Infosecurity

Smartphones Now Involved in Nearly Every Police Investigation

06-02Infosecurity

Smartphones Now Involved in Nearly Every Police Investigation

06-02Infosecurity

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

06-02Infosecurity

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

06-02Security Magazine

How to Protect Organizations During the Winter Olympics, According to CISOs

06-02The Hacker News

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

06-02The Hacker News

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

06-02The Hacker News

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

06-02The Hacker News

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

06-02The Hacker News

The Buyer’s Guide to AI Usage Control

06-02The Hacker News

The Buyer’s Guide to AI Usage Control

06-02The Hacker News

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

06-02The Hacker News

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

05-02Help Net Security

GitHub enables multi-agent AI coding inside repository workflows

05-02Help Net Security

Police shut down global DDoS operation, arrest 20-year-old

05-02Help Net Security

Microsoft brings project-focused AI agents into OneDrive

Onze partners

Ook partner worden?