government
                                                    healthcare
                                                    social media
                                                    service provider
                                                    fine
                                                    education
                                                    finance
                                                    law enforcement
                                                    dark web
                                                    retail
                                                    web
                                                    phama
                                                    telecoms
                                                    charity
                                                    insurance
                                                    travel
                                                    manufacturing
                                                    app
                                                    operating system
                                                    legal
                                                    tech
                                                    gaming
                                                    publishing
                                                    transport
                                                    utilities
                        
                
                                                story
                                                    hacked
                                                    malware
                                                    unauthorised access
                                                    ransomware
                                                    vulnerability
                                                    accidental disclosure
                                                    phishing
                                                    unsecured database
                                                    poor security
                                                    insider threat
                                                    unsecured server
                                                    hacked email
                                                    lost device
                                                    identity theft
                                                    website hacked
                                                    ddos
                                                    stolen documents
                                                    Trojans
                                                    financial
                                                    inside job
                                                    spear phishing
                                                    RDP
                                                    spyware
                                                    breached
                                        
                                            cyber attack
                                                    breach notification
                                                    privacy
                                                    security flaw
                                                    legislation
                                                    poor operations
                                                    user credentials
                                                    physical security
                                                    customer data
                                                    third party
                                                    Cryptocurrency
                                                    enforcement
                                                    email hacked
                                                    insecure storage
                                                    court action
                                                    encryption
                                                    fraud
                                                    VPN
                                                    passwords
                                                    zero day
                                                    state hacking
                                                    3rd parties
                                                    employee data
                                                    remote working
                                                    stolen data
                        
            
        SASE or zero trust? Why security teams should be using both - Help Net Security
    
    
        Arup staff caught up in ransomware attack | News | Building Design
    
    
        Microsoft Office 365 phishing evades detection with HTML Lego pieces
    
    
        CDPR should fix Cyberpunk 2077's bugs then move on | PC Gamer
    
    
        Trello business software settings leave users' personal data exposed in Japan - The Mainichi
    
    
        Magistrátní síť ochromil kybernetický útok. Veškeré agendy magistrátu zůstávají mimo provoz - OLOMOUC.CZ
    
    
        New wormable Android malware poses as Netflix to hijack WhatsApp sessions | ZDNet
    
    
        $38 million worth of gift cards stolen and sold on dark web | WeLiveSecurity
    
    
        How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants | Ars Technica
    
    
        Another supply-chain attack? Android maker Gigaset injects malware into victims' phones via poisoned update • The Register
    
    
        Should firms be more worried about firmware cyber-attacks? - BBC News
    
    
        Phishing Emails Most Commonly Originate from Eastern Europe - Infosecurity Magazine
    
    
        Facebook refuses to apologise after personal data of 11m UK users hacked
    
    
        SAP Bugs Under Active Cyberattack | Threatpost
    
    
        Third-party security breach compromises data of Singapore job-matching service | ZDNet
    
    
        Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
    
    
        Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
    
    
        Your 'smart home' is watching and possibly sharing your data with the police | Technology | The Guardian
    
    
        Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
    
    
        Hack takes: A CISO and a hacker detail how they’d respond to the Exchange breach – TechCrunch
    
    
        How to Find Out If Your Data Was Exposed in a Breach
    
    
        Personal data for 533 million Facebook users leaks on the web | Engadget
    
    
        Postmortem of PHP Core compromise continues | Laravel News
    
    
        From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
    
    
        Judge Decides Apple Knowingly Sold Defective MacBook Pros
    
    
        Dutch privacy watchdog fines Booking.com €475K – POLITICO
    
    
        Startseite - Evangelisches Krankenhaus Lippstadt
    
    
        Unusual DearCry ransomware uses ‘rare’ approach to encryption
    
    
        Google's Nest Hub Wants to Monitor Your Sleep
    
    
        Ransomware Attack - Harris Highlights - Harris Federation
    
    
        Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
    
    
        DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
    
    
        Endgame for end-to-end encryption | Open Rights Group
    
    
        Google is taking far more data from your Android devices than you may think | TechRadar
    
    
        	North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
    
    
        Malware adapted for the Apple M1 | Kaspersky official blog
    
    
        80% of Global Enterprises Report Firmware Cyberattacks | Threatpost
    
    
        Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
    
    
        Building a Fortress: 3 Key Strategies for IT Security | Threatpost
    
    
        Apple knew it was selling defective MacBook displays, judge concludes - The Verge