Skip to content
  • Tue. Jul 1st, 2025
Cyber Security News
  • News
  • Checklists
  • Whitepapers
  • Links
  • About
  • Contact
  • Privacy Policy
  • Terms
Top Tags
  • cybersecurity
  • ransomware
  • Remote Code Execution
  • malware
  • Network security
  • vulnerability
  • data breach

Latest Post

When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach How to Safely Search the Dark Web for Leaked Emails or Usernames The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions Windows Remote Desktop Services Vulnerability Allows Remote Code Execution INTERPOL’s Operation SECURE Dismantles 20,000 Malicious Assets in Major Crackdown on Infostealers
News

BRATA: the Android banking trojan

Jan 26, 2022 G.C.Moresi

A new variant of the banking trojan BRATA has been identified and, thanks to increasingly advanced features, it is able…

News

Trojan njRAT steals banking login credentials

Jan 25, 2022 G.C.Moresi

A new variant of the njRAT trojan is targeting many users with a malspam campaign aimed at stealing banking login…

News

Trellix is the new company based on McAfee Enterprise and FireEye

Jan 21, 2022 G.C.Moresi

Private equity firm Symphony Technology Group (STG) has announced the new name of the company merged from McAfee Enterprise and…

News

Red Cross under cyberattack

Jan 20, 2022 G.C.Moresi

Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…

News

Attacks to Cloud Infrastructures

Jan 20, 2022 G.C.Moresi

Cisco Talos has confirmed in the past few days that malicious users are using remote access trojans (RATs) of the…

News Whitepapers

The Best 7 Books about Cyber Security

Jan 19, 2022 G.C.Moresi

In this section, we present a curated selection of the top 7 ebooks on cybersecurity, all of which are up-to-date…

Checklists Whitepapers

CISO Mindset

Jan 18, 2022 G.C.Moresi

Cybersecurity is nowadays also one of the major challenges in the modern world. Probably one of the most difficult topics.…

Whitepapers

Zero Trust Network: what is it?

Jan 18, 2022 G.C.Moresi

The basic principle of Zero Trust is to regulate and authenticate privileged access to data and systems. Zero Trust encourages…

News

Microsoft Updates: over 6 zero days Vulnerabilities

Jan 18, 2022 G.C.Moresi

This week Microsoft released the first Patch of the year with updates addressing nearly 100 security vulnerabilities, including six zero-day…

News

SysJoker: the malware that spies on Windows, macOS and Linux

Jan 18, 2022 G.C.Moresi

Windows, Linux and macOS users are in the crosshairs of SysJoker: the cross-platform malware has been active since the second…

Posts navigation

1 … 18 19 20
Recent Posts
  • When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach
  • How to Safely Search the Dark Web for Leaked Emails or Usernames
  • The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions
  • Windows Remote Desktop Services Vulnerability Allows Remote Code Execution
  • INTERPOL’s Operation SECURE Dismantles 20,000 Malicious Assets in Major Crackdown on Infostealers
Recent Comments
    Archives
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    Categories
    • Checklists
    • Links
    • News
    • Whitepapers
    Meta
    • Log in
    • Entries RSS
    • Comments RSS
    • WordPress.org

    You missed

    News

    When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach

    Jun 30, 2025 G.C.Moresi
    Checklists News Whitepapers

    How to Safely Search the Dark Web for Leaked Emails or Usernames

    Jun 26, 2025 G.C.Moresi
    News Whitepapers

    The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions

    Jun 16, 2025 G.C.Moresi
    News

    Windows Remote Desktop Services Vulnerability Allows Remote Code Execution

    Jun 13, 2025 G.C.Moresi
    Cyber Security News

    Proudly powered by WordPress | Theme: Newsup by Themeansar.

    • About
    • Privacy Policy
    • Links
    • Terms
    • Contact
    • Sitemap
    • News
    • Checklists
    • Whitepapers
    • Cyber Risk Evaluator