government
                                                    healthcare
                                                    social media
                                                    service provider
                                                    fine
                                                    education
                                                    finance
                                                    law enforcement
                                                    dark web
                                                    retail
                                                    web
                                                    phama
                                                    telecoms
                                                    charity
                                                    insurance
                                                    travel
                                                    manufacturing
                                                    app
                                                    operating system
                                                    legal
                                                    tech
                                                    gaming
                                                    publishing
                                                    transport
                                                    utilities
                        
                
                                                story
                                                    hacked
                                                    malware
                                                    unauthorised access
                                                    ransomware
                                                    vulnerability
                                                    accidental disclosure
                                                    phishing
                                                    unsecured database
                                                    poor security
                                                    insider threat
                                                    unsecured server
                                                    hacked email
                                                    lost device
                                                    identity theft
                                                    website hacked
                                                    stolen documents
                                                    ddos
                                                    Trojans
                                                    financial
                                                    inside job
                                                    spear phishing
                                                    RDP
                                                    skimming
                                                    spyware
                                        
                                            cyber attack
                                                    breach notification
                                                    privacy
                                                    security flaw
                                                    legislation
                                                    poor operations
                                                    user credentials
                                                    physical security
                                                    customer data
                                                    third party
                                                    Cryptocurrency
                                                    enforcement
                                                    email hacked
                                                    insecure storage
                                                    court action
                                                    encryption
                                                    VPN
                                                    fraud
                                                    passwords
                                                    zero day
                                                    3rd parties
                                                    state hacking
                                                    employee data
                                                    remote working
                                                    stolen data
                        
            
        Allied Press hit by data breach | Otago Daily Times Online News
    
    
        Google: North Korean hackers are targeting researchers through fake offensive security firm | ZDNet
    
    
        Hacked companies had backup plans. But they didn't print them out before the attack. | ZDNet
    
    
        Ubiquiti is accused of covering up a ‘catastrophic’ data breach — and it’s not denying it - The Verge
    
    
        New vulnerabilities discovered allow access to user data and complete takeover - SAM Seamless Network
    
    
        Iranian cyberspies target professionals at medical research organizations in the US, Israel | The Record by Recorded Future
    
    
        UPDATE (2) del 31.03.2021 Blackbaud Data Breach: University / College / K-12 (Terza Parte) - SuspectFile
    
    
        Hackers threaten shipping firm ECU Worldwide with data leak - FreightWaves
    
    
        INFO FRANCE BLEU - The Pierre Fabre company shut down following a cyberattack
    
    
        Man charged for hacking Kansas water utility with intent to harm public | The Record by Recorded Future
    
    
        Hackers Hit Italian Menswear Brand Boggi Milano With Ransomware
    
    
        Gaming mods, cheat engines are spreading Trojan malware and planting backdoors | ZDNet
    
    
        Ubiquiti breach puts countless cloud-based devices at risk of takeover | Ars Technica
    
    
        VMware patches critical vRealize Operations platform vulnerabilities | ZDNet
    
    
        Malware hidden in Call of Duty cheat software proves that cheaters never prosper   - The Verge
    
    
        Nearly 40% of new ransomware families use both data encryption and data theft in attacks - Help Net Security
    
    
        Vulnerabilities in Single Sign-On services could be abused to bypass authentication controls | The Daily Swig
    
    
        What is Python Used for? | Major Industries | Juni Learning (Good practice)
    
    
        Print group hit by cyber attack | Printweek
    
    
        Harris Federation schools come under ‘vicious’ cyber attack | Inside Croydon
    
    
        Google Chrome FLoC: how it replaces cookies and what it means for privacy - The Verge
    
    
        Ransomware: Why we're now facing a perfect storm | ZDNet
    
    
        Booming dark web gig economy is a rising threat | CSO Online
    
    
        Hackers hit Harris in latest ‘highly sophisticated’ cyber attack
    
    
        Austin ISD warns of possible data breach | kvue.com
    
    
        Billions of records have been hacked already. Make cybersecurity a priority or risk disaster, warns analyst | ZDNet
    
    
        Hackers backdoor PHP source code after breaching internal git server | Ars Technica
    
    
        Hackers backdoor PHP source code after breaching internal git server | Ars Technica
    
    
        Will privacy advocates lose the personal-data use war?
    
    
        Hades Ransomware Linked to Hafnium and Exchange Attacks - Infosecurity Magazine
    
    
        SolarWinds hackers reportedly breached high-level DHS email accounts - CNET
    
    
        Heath board has contacted 50 people affected by software privacy breach | Stuff.co.nz
    
    
        New Android Malware Poses as Security Update To Take Control of Devices
    
    
        Serious Security: OpenSSL fixes two high-severity crypto bugs – Naked Security
    
    
        Financial services firms unaware of cybersecurity risks attached to remote working - CityAM : CityAM	
    
    
        Patch your iPhone and iPad: Apple security update stamps out active exploit | TechRadar
    
    
        Hackers attack Telethon: biotech YposKesi targeted with ransomware
    
    
        Retailer Fat Face Pays $2 Million Ransom to Conti Gang
    
    
        Press Release - Apple Valley, MN: Allina Health Apple Valley
    
    
        Call centre staff to be monitored via webcam for home-working infractions  | Working from home | The Guardian