government
healthcare
social media
service provider
fine
education
law enforcement
finance
dark web
retail
web
phama
telecoms
charity
insurance
travel
manufacturing
app
operating system
legal
tech
gaming
publishing
transport
utilities
story
hacked
malware
unauthorised access
ransomware
vulnerability
accidental disclosure
phishing
unsecured database
poor security
insider threat
unsecured server
hacked email
lost device
identity theft
website hacked
stolen documents
ddos
Trojans
financial
inside job
RDP
spear phishing
spyware
breached
cyber attack
breach notification
privacy
security flaw
legislation
poor operations
user credentials
physical security
customer data
third party
Cryptocurrency
enforcement
email hacked
insecure storage
court action
encryption
VPN
fraud
zero day
passwords
3rd parties
state hacking
employee data
remote working
stolen data
Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor | CSO Online
Critical Bug in VMWare Carbon Black Allows Takeover | Threatpost
Your 'smart home' is watching and possibly sharing your data with the police | Technology | The Guardian
Facebook data leak: Personal data and phone numbers from 533m users stolen and put online
Hack takes: A CISO and a hacker detail how they’d respond to the Exchange breach – TechCrunch
How to Find Out If Your Data Was Exposed in a Breach
Personal data for 533 million Facebook users leaks on the web | Engadget
Postmortem of PHP Core compromise continues | Laravel News
From PowerShell to Payload: An Analysis of Weaponized Malware | Threatpost
Judge Decides Apple Knowingly Sold Defective MacBook Pros
Dutch privacy watchdog fines Booking.com €475K – POLITICO
Startseite - Evangelisches Krankenhaus Lippstadt
Unusual DearCry ransomware uses ‘rare’ approach to encryption
Google's Nest Hub Wants to Monitor Your Sleep
Ransomware Attack - Harris Highlights - Harris Federation
Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack | Threatpost
DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks | ZDNet
Endgame for end-to-end encryption | Open Rights Group
Google is taking far more data from your Android devices than you may think | TechRadar
North Korean Hackers Expand Targeting of Security Community - Infosecurity Magazine
Malware adapted for the Apple M1 | Kaspersky official blog
80% of Global Enterprises Report Firmware Cyberattacks | Threatpost
Ragnarok Ransomware Hits Boggi Milano Menswear | Threatpost
Building a Fortress: 3 Key Strategies for IT Security | Threatpost
Apple knew it was selling defective MacBook displays, judge concludes - The Verge
Allied Press hit by data breach | Otago Daily Times Online News
Google: North Korean hackers are targeting researchers through fake offensive security firm | ZDNet
Hacked companies had backup plans. But they didn't print them out before the attack. | ZDNet
Ubiquiti is accused of covering up a ‘catastrophic’ data breach — and it’s not denying it - The Verge
New vulnerabilities discovered allow access to user data and complete takeover - SAM Seamless Network
Iranian cyberspies target professionals at medical research organizations in the US, Israel | The Record by Recorded Future
UPDATE (2) del 31.03.2021 Blackbaud Data Breach: University / College / K-12 (Terza Parte) - SuspectFile
Hackers threaten shipping firm ECU Worldwide with data leak - FreightWaves
INFO FRANCE BLEU - The Pierre Fabre company shut down following a cyberattack
Man charged for hacking Kansas water utility with intent to harm public | The Record by Recorded Future
Hackers Hit Italian Menswear Brand Boggi Milano With Ransomware
Gaming mods, cheat engines are spreading Trojan malware and planting backdoors | ZDNet
Ubiquiti breach puts countless cloud-based devices at risk of takeover | Ars Technica
VMware patches critical vRealize Operations platform vulnerabilities | ZDNet
Malware hidden in Call of Duty cheat software proves that cheaters never prosper - The Verge