government
                                                    healthcare
                                                    social media
                                                    service provider
                                                    fine
                                                    education
                                                    finance
                                                    law enforcement
                                                    dark web
                                                    retail
                                                    web
                                                    phama
                                                    telecoms
                                                    charity
                                                    insurance
                                                    travel
                                                    manufacturing
                                                    app
                                                    operating system
                                                    legal
                                                    tech
                                                    gaming
                                                    publishing
                                                    transport
                                                    utilities
                        
                
                                                story
                                                    hacked
                                                    malware
                                                    unauthorised access
                                                    ransomware
                                                    vulnerability
                                                    accidental disclosure
                                                    phishing
                                                    unsecured database
                                                    poor security
                                                    insider threat
                                                    unsecured server
                                                    hacked email
                                                    lost device
                                                    identity theft
                                                    website hacked
                                                    ddos
                                                    stolen documents
                                                    Trojans
                                                    financial
                                                    inside job
                                                    spear phishing
                                                    RDP
                                                    skimming
                                                    spyware
                                        
                                            cyber attack
                                                    breach notification
                                                    privacy
                                                    security flaw
                                                    legislation
                                                    poor operations
                                                    user credentials
                                                    physical security
                                                    customer data
                                                    third party
                                                    Cryptocurrency
                                                    enforcement
                                                    email hacked
                                                    insecure storage
                                                    court action
                                                    encryption
                                                    fraud
                                                    VPN
                                                    passwords
                                                    zero day
                                                    3rd parties
                                                    state hacking
                                                    employee data
                                                    remote working
                                                    stolen data
                        
            
        Almost half a million users duped by Facebook phishing campaign | TechRadar
    
    
        Update Your Windows 10 Device Now to Patch a Critical Vulnerability – Review Geek
    
    
        IDF to-do lists are public and exposed online in a potential security breach - Tech News - Haaretz.com
    
    
        Apple, Microsoft, PayPal among 35 organizations compromised by evil twin dependencies attack • The Register
    
    
        Dark web analysis shows high demand for hackers - Help Net Security
    
    
        Predase Servicios Integrales S.L. fined 5,000 Euros for breaching Art. 13 GDPR - Insufficient fulfilment of information obligations
    
    
        What makes us human: countering the accidental insider cyber threat | Blog | GRC World Forums
    
    
        Google: Proper patching would have prevented 25% of all zero-days found in 2020 | ZDNet
    
    
        Private Person fined 5,000 Euros for breaching Art. 5 (1) c) GDPR - Non-compliance with general data processing principles
    
    
        Patio Ancestral S.L. fined 3,000 Euros for breaching Art. 6 GDPR - Insufficient legal basis for data processing
    
    
        New York regulator issues cyber insurance risk framework with implications for insurers and insureds
    
    
        Public Setting of Trello App Exposes Users PII Data
    
    
        Private Person fined 2000 Euros for breaching Art. 5 (1) c) GDPR - Non-compliance with general data processing principles
    
    
        Android devices ensnared in DDoS botnet | ZDNet
    
    
        Is there a widening gulf between you and your remote workers? Yes – and it’s security shaped • The Register
    
    
        Scots warned hacker is selling off Facebook users' phone numbers in data breach - Daily Record
    
    
        Critical Cisco Flaws Open VPN Routers Up to RCE Attacks | Threatpost
    
    
        Iberdrola Clientes fined 100,000 Euros for breaching Art. 5 (1) d) GDPR, Art. 17 GDPR - Insufficient fulfilment of data subjects rights
    
    
        Cyberbook AS fined 19,300 Euros for breaching Art. 5 GDPR, Art. 6 GDPR - Insufficient legal basis for data processing
    
    
        Five Critical Android Bugs Patched, Part of Feb. Security Bulletin | Threatpost
    
    
        SolarWinds patches three newly discovered software vulnerabilities | ZDNet
    
    
        93% of workers overshare online, causing security risks - Help Net Security
    
    
        Customer Data Breach: Foxtons at centre of newspaper ...
    
    
        Warning to Milton Keynes residents - how to avoid falling victim to a data breach - MKFM 106.3FM  - Radio Made in Milton Keynes
    
    
        Malicious Chrome and Edge add-ons had a novel way to hide on 3 million devices | Ars Technica
    
    
        Multiple new flaws uncovered in SolarWinds software just weeks after high-profile supply chain attack | The Daily Swig
    
    
        Mimecast To Lay Off 80 Workers Weeks After Disclosing Hack
    
    
        Google says it’s too easy for hackers to find new security flaws | MIT Technology Review
    
    
        Tiny Kobalos malware seen backdooring SSH tools, menacing supercomputers, an ISP, and more – ESET • The Register
    
    
        Recent root-giving Sudo bug also impacts macOS | ZDNet
    
    
        How to build a malware analysis sandbox with Elastic Security | Elastic Blog
    
    
        More patches for SolarWinds Orion after researchers find flaw allowing low-priv users to execute code, among others • The Register
    
    
        More than three billion emails and passwords were just leaked online | TechRadar
    
    
        Cyberpunk 2077 devs warn of security vulnerability with mods | Rock Paper Shotgun
    
    
        Secure to the core: IoT Ubuntu Core Linux 20 released | ZDNet
    
    
        A Second SolarWinds Hack Deepens Third-Party Software Fears | WIRED
    
    
        Scientists Achieve 'Transformational' Breakthrough in Scaling Quantum Computers
    
    
        Kobalos – A complex Linux threat to high performance computing infrastructure | WeLiveSecurity
    
    
        Singapore assessing WhatsApp privacy policy change, not 'adversely affected' in SolarWinds breach | ZDNet
    
    
        Agent Tesla ramps up its game in bypassing security walls, attacks endpoint protection | ZDNet