Cyber Security Nieuws Monitor

Op zoek naar het laatste cyber security nieuws? Hieronder vind je een overzicht van cyber security nieuws. Mis je nog een bron? We lezen graag jouw aanvullingen.

DatumBronNieuws
29-07Help Net Security

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and complian

29-07Help Net Security

Varonis unveils Next-Gen Database Activity Monitoring for agentless database security and complian

29-07Help Net Security

Why behavioral intelligence is becoming the bank fraud team’s best friend

29-07Help Net Security

Why behavioral intelligence is becoming the bank fraud team’s best friend

29-07Help Net Security

Ransomware will thrive until we change our strategy

29-07Help Net Security

Ransomware will thrive until we change our strategy

29-07Infosecurity

Charity Fined After Destroying “Irreplaceable” Records

29-07Infosecurity

Charity Fined After Destroying “Irreplaceable” Records

29-07Infosecurity

Pro-Ukraine Hacktivists Ground Dozens of Aeroflot Flights

29-07Infosecurity

Pro-Ukraine Hacktivists Ground Dozens of Aeroflot Flights

29-07Bleepingcomputer

Free Autoswagger Tool Finds the API Flaws Attackers Hope You Miss

29-07Help Net Security

The final frontier of cybersecurity is now in space

29-07Help Net Security

The final frontier of cybersecurity is now in space

29-07Help Net Security

Inside the application security crisis no one wants to talk about

29-07Help Net Security

Inside the application security crisis no one wants to talk about

29-07Help Net Security

Cybersecurity jobs available right now: July 29, 2025

29-07Help Net Security

Cybersecurity jobs available right now: July 29, 2025

29-07Techcrunch

New York state cyber chief calls out Trump for cybersecurity cuts

29-07Techcrunch

20 national security experts urge Trump administration to restrict Nvidia H20 sales to China

29-07Techcrunch

Flights grounded as Russia’s largest airline Aeroflot hacked and systems ‘destroyed’

29-07Techcrunch

Flights grounded as Russia’s largest airline Aeroflot hacked and systems ‘destroyed’

29-07Bleepingcomputer

Tea app leak worsens with second database exposing user chats

29-07Bleepingcomputer

Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data

29-07Bleepingcomputer

France's warship builder Naval Group investigates 1TB data breach

29-07Infosecurity

Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

29-07Infosecurity

Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable

29-07Infosecurity

New Scattered Spider Tactics Target VMware vSphere Environments

29-07Infosecurity

New Scattered Spider Tactics Target VMware vSphere Environments

29-07Infosecurity

Third-Party Breach Impacts Majority of Allianz Life US Customers

29-07Infosecurity

Third-Party Breach Impacts Majority of Allianz Life US Customers

29-07Infosecurity

Naval Group Denies Hack Claims, Alleges 'Reputational Attack'

29-07Infosecurity

Naval Group Denies Hack Claims, Alleges 'Reputational Attack'

29-07Nu.nl

Amerikaanse vrouwenapp voor veilig daten gehackt, dertienduizend selfies gelekt

29-07Nu.nl

Amerikaanse vrouwenapp voor veilig daten gehackt, dertienduizend selfies gelekt

29-07BBC

VPNs top download charts as age verification law kicks in

29-07BBC

VPNs top download charts as age verification law kicks in

29-07BBC

Microsoft servers hacked by Chinese groups, says tech giant

29-07BBC

Microsoft servers hacked by Chinese groups, says tech giant

29-07BBC

Co-op boss confirms all 6.5m members had data stolen

29-07BBC

Co-op boss confirms all 6.5m members had data stolen

29-07BBC

Four arrested in connection with M&S and Co-op cyber-attacks

29-07BBC

Four arrested in connection with M&S and Co-op cyber-attacks

29-07BBC

Tech Now

29-07BBC

Tech Now

29-07CyberExperts

Hackers Revving Engines at Global Vehicle Cybersecurity Showdown 2025

29-07CyberExperts

Hackers Revving Engines at Global Vehicle Cybersecurity Showdown 2025

29-07Security Magazine

America’s Drone Reckoning: National Security, Tariffs, and the Urgent Shift to Secure U.S.-Based

29-07Security Magazine

America’s Drone Reckoning: National Security, Tariffs, and the Urgent Shift to Secure U.S.-Based

29-07The Hacker News

CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation

29-07The Hacker News

CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation

29-07The Hacker News

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

29-07The Hacker News

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

29-07The Hacker News

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

29-07The Hacker News

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

29-07The Hacker News

Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach

29-07The Hacker News

Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach

28-07Help Net Security

Your supply chain security strategy might be missing the biggest risk

28-07Help Net Security

The legal minefield of hacking back

28-07Infosecurity

US Woman Gets Eight Years for Part in $17m North Korean Scheme

28-07Infosecurity

Dating App Breach Exposes Images of 13,000 Women

28-07The Hacker News

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

28-07The Hacker News

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

28-07Bleepingcomputer

Scattered Spider is running a VMware ESXi hacking spree

28-07Bleepingcomputer

Scattered Spider is running a VMware ESXi hacking spree

28-07Help Net Security

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

28-07Help Net Security

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

28-07Help Net Security

Review: LLM Engineer’s Handbook

28-07Help Net Security

Review: LLM Engineer’s Handbook

28-07Help Net Security

How to fight document fraud with the latest tech tools

28-07Help Net Security

How to fight document fraud with the latest tech tools

28-07Security Magazine

Breaking Barriers in Cybersecurity: A Conversation with WiCyS’s Executive Director

28-07Security Magazine

Breaking Barriers in Cybersecurity: A Conversation with WiCyS’s Executive Director

28-07CyberExperts

African Cybersecurity Vulnerabilities: Tackling the Human Element in Digital Defense

28-07The Hacker News

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

28-07The Hacker News

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

27-07Help Net Security

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job

27-07Help Net Security

Week in review: Microsoft SharePoint servers under attack, landing your first cybersecurity job

27-07Techcrunch

Dating safety app Tea breached, exposing 72,000 user images

27-07Techcrunch

Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack

27-07Bleepingcomputer

Allianz Life confirms data breach impacts majority of 1.4 million customers

27-07Bleepingcomputer

Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks

27-07CyberExperts

Top Cybersecurity Stocks to Fortify Your Investment Fortress in 2025

26-07Bleepingcomputer

Amazon AI coding agent hacked to inject data wiping commands

26-07Bleepingcomputer

The role of the cybersecurity PM in incident-driven development

26-07Infosecurity

BlackSuit Ransomware Group’s Dark Web Sites Seized in Operation Checkmate

26-07Infosecurity

Prolonged Chinese Cyber Espionage Campaign Targets VMware Appliances

26-07CyberExperts

Navigating AI’s Double-Edged Sword: Cybersecurity Challenges and Leadership Imperatives

26-07The Hacker News

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

26-07The Hacker News

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

26-07The Hacker News

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

26-07The Hacker News

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

26-07The Hacker News

Overcoming Risks from Chinese GenAI Tool Usage

25-07Help Net Security

Digital sovereignty becomes a matter of resilience for Europe

25-07Infosecurity

New Chaos Ransomware Emerges, Launches Wave of Attacks

25-07Help Net Security

What 50 companies got wrong about cloud identity security

25-07Help Net Security

Six months into DORA, most financial firms are still not ready

25-07Help Net Security

Storm-2603 spotted deploying ransomware on exploited SharePoint servers

25-07Help Net Security

CISO New York 2025 brings together top cybersecurity leaders

25-07Help Net Security

Intel 471 Guided Threat Hunts enables teams to measure hunt success metrics

25-07Techcrunch

Cybercrime forum Leak Zone publicly exposed its users’ IP addresses

Onze partners

Ook partner worden?