Skip to content
  • Fri. Jul 4th, 2025
Cyber Security News
  • News
  • Checklists
  • Whitepapers
  • Links
  • About
  • Contact
  • Privacy Policy
  • Terms
Top Tags
  • cybersecurity
  • ransomware
  • Remote Code Execution
  • malware
  • Network security
  • vulnerability
  • data breach

Latest Post

When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach How to Safely Search the Dark Web for Leaked Emails or Usernames The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions Windows Remote Desktop Services Vulnerability Allows Remote Code Execution INTERPOL’s Operation SECURE Dismantles 20,000 Malicious Assets in Major Crackdown on Infostealers
Illustration of a laptop with a shield and key icon representing Microsoft's new passkey login system, emphasizing passwordless and biometric authentication.
News

Microsoft: the Future is Passkey Authentication for Consumer Accounts

May 2, 2025 G.C.Moresi

Microsoft now allows password-less login for consumer accounts using passkeys, enabling secure access via biometrics, FIDO2 keys, or PINs. This…

Checklists News

Cyber Risk Evaluator (CRE): The Next Standard in Cyber Resilience and Professional Certification

Apr 22, 2025 G.C.Moresi

In an era where digital threats grow more advanced by the day, traditional cybersecurity strategies are no longer enough. The…

CVE Program funding reinstated with a new CVE Foundation ensuring cybersecurity stability, displayed over a digital world map and network grid.
News

CVE Program Funding Reinstated: Implications for Global Cybersecurity and the Road Ahead

Apr 17, 2025 G.C.Moresi

The CVE Program’s funding has been reinstated, ensuring continued global vulnerability tracking. A new CVE Foundation now aims to secure…

Illustration of a cybersecurity alert with a red warning triangle, padlock icon, and server interface indicating a critical vulnerability, set against a dark blue background with code snippets.
News

Critical Vulnerability in FortiSwitch GUI – CVE-2024-48887

Apr 9, 2025 G.C.Moresi

Critical FortiSwitch vulnerability (CVE-2024-48887) allows unauthenticated password changes – patch now or apply mitigation steps immediately

Digital illustration showing a breaking news alert about the Oracle Cloud breach, featuring a warning icon, a padlocked laptop screen, a hooded hacker, and ransom details.
News

Massive Oracle Cloud Breach Hits Over 140,000 Tenants

Mar 29, 2025 G.C.Moresi

A massive breach hit Oracle Cloud, exposing 6M records and affecting 140K+ tenants. Exploiting a known vulnerability, the attacker demands…

Fake Login Page of Microsoft
News

How Hackers Use HTML Files to Deliver Phishing Attacks

Mar 10, 2025 G.C.Moresi

Hackers are increasingly using HTML attachments in phishing emails to bypass security filters and steal user credentials. This article explores…

News

Bybit Hack: $1.5B Crypto Heist Linked to North Korean Lazarus Group

Feb 27, 2025 G.C.Moresi

The $1.5B Bybit hack has been traced to North Korean Lazarus Group via a supply chain attack on Safe{Wallet}. The…

News

Microsoft Exchange 2016 & 2019 Support Ends Soon: Key Risks & Migration Strategies

Feb 27, 2025 G.C.Moresi

Microsoft will end support for Exchange 2016 & 2019 on October 14, 2025—no more security patches, updates, or support. Businesses…

Illustration depicting the EU Digital Operational Resilience Act (DORA) with European Union flag, cybersecurity shield, financial institutions, and digital networks representing resilience in the financial se
Checklists News

DORA Directive: Strengthening Digital Operational Resilience in the Financial Sec

Feb 16, 2025 G.C.Moresi

The Digital Operational Resilience Act (DORA) is a cornerstone of the EU’s Digital Finance Strategy, aiming to bolster financial entities’…

Checklists News

NIS2 Directive: A CISO’s Perspective on Compliance, Risk, and Critical Sectors

Feb 2, 2025 G.C.Moresi

The NIS2 Directive (Directive (EU) 2022/2555) is a game-changer for cybersecurity in the European Union, expanding regulatory oversight, increasing enforcement,…

Posts navigation

1 2 3 … 20
Recent Posts
  • When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach
  • How to Safely Search the Dark Web for Leaked Emails or Usernames
  • The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions
  • Windows Remote Desktop Services Vulnerability Allows Remote Code Execution
  • INTERPOL’s Operation SECURE Dismantles 20,000 Malicious Assets in Major Crackdown on Infostealers
Recent Comments
    Archives
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    Categories
    • Checklists
    • Links
    • News
    • Whitepapers
    Meta
    • Log in
    • Entries RSS
    • Comments RSS
    • WordPress.org

    You missed

    News

    When Ransomware Strikes Close to Government: Lessons from the Radix Foundation Breach

    Jun 30, 2025 G.C.Moresi
    Checklists News Whitepapers

    How to Safely Search the Dark Web for Leaked Emails or Usernames

    Jun 26, 2025 G.C.Moresi
    News Whitepapers

    The Invisible Threat: How Free VPN Browser Plugins Enable APT Intrusions

    Jun 16, 2025 G.C.Moresi
    News

    Windows Remote Desktop Services Vulnerability Allows Remote Code Execution

    Jun 13, 2025 G.C.Moresi
    Cyber Security News

    Proudly powered by WordPress | Theme: Newsup by Themeansar.

    • About
    • Privacy Policy
    • Links
    • Terms
    • Contact
    • Sitemap
    • News
    • Checklists
    • Whitepapers
    • Cyber Risk Evaluator