Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Cybersecurity

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.
Customer Privacy  | Cybersecurity | Data Breach

Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.

A data breach at Columbia University has affected 860,000 individuals.
Cybersecurity | Data Breach | Personal Information Protection 

A data breach at Columbia University has affected 860,000 individuals.

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup
Cloud Security | Cybersecurity | Vulnerability Management 

Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup

WhatsApp has removed 6.8 million accounts associated with harmful activities.
Cybersecurity

WhatsApp has removed 6.8 million accounts associated with harmful activities.

SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.
AI-Powered Investigations  | Cybersecurity | Identity Threat Protection

SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.

Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.
Cybersecurity | Remote Code Execution | Vulnerabilities

Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.

Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.
Cybersecurity

Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.

New UK System: Must-Have Protection for Satellites Against Attacks
Cybersecurity

New UK System: Must-Have Protection for Satellites Against Attacks

Renting Homes in Australia: A Shocking Security Risk
Cybersecurity

Renting Homes in Australia: A Shocking Security Risk

Severance: Must-Have Lessons on Cybersecurity Risks
Cybersecurity

Severance: Must-Have Lessons on Cybersecurity Risks

Digital Government: Exclusive Benefits for Citizens in South Africa
Cybersecurity

Digital Government: Exclusive Benefits for Citizens in South Africa

RCE Vulnerability in AI-Powered Coding Tools Threatens Software Supply Chain Security 
Cybersecurity | Remote Code Execution | Software Vulnerabilities

RCE Vulnerability in AI-Powered Coding Tools Threatens Software Supply Chain Security 

Cisco User Data Compromised in Vishing Attack: What You Need to Know 
Cybersecurity | Data Breach | Voice Phishing 

Cisco User Data Compromised in Vishing Attack: What You Need to Know 

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
AI Development Tools  | Cybersecurity | Software Vulnerabilities

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.

Microsoft’s Project Ire independently reverse engineers software to detect malware.
AI Technology | Cybersecurity | Malware Detection 

Microsoft’s Project Ire independently reverse engineers software to detect malware.

Stay Safe from Scams: 5 Must-Have Tips for Protection
Cybersecurity

Stay Safe from Scams: 5 Must-Have Tips for Protection

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users
Cybersecurity

M&S Cyberattacks: Stunning Technique Exposes Vulnerable Users

Fraud Prevention: 6 Effortless Steps to Stay Safe
Cybersecurity

Fraud Prevention: 6 Effortless Steps to Stay Safe

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications
Cybersecurity

Governments Struggle to Reclaim Backdoor Access to Encrypted Communications

Governments’ Losing Battle: Exclusive Backdoor Access Failures
Cybersecurity

Governments’ Losing Battle: Exclusive Backdoor Access Failures

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals
Cybersecurity

How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning
Cybersecurity

Enhancing Global AI Security: Why the G7 Must Champion Federated Learning

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap
Cybersecurity

Illicit Markets: Stunning Data Breaches Sell Your Info Cheap

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It
Cybersecurity

Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust
Cybersecurity

How M&S’s Cyber Attack Response May Shape Its Future and Customer Trust

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World
Cybersecurity

Navigating the New Frontiers of Cybercrime: Essential Tips for Staying Safe in a Blending World

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now
Cybersecurity

Protecting Yourself After Data Breaches: Why We Need Stronger Cybersecurity Laws Now

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.
AI Vulnerabilities | Cybersecurity | Software Patching 

The vulnerabilities in Nvidia Triton represent a significant threat to AI models.

Illumina, a leading company in gene sequencing, has agreed to pay $9.8 million to settle issues related to product vulnerabilities.
Cybersecurity

Illumina, a leading company in gene sequencing, has agreed to pay $9.8 million to settle issues related to product vulnerabilities.

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.
Cybersecurity

The PlayPraetor Android Trojan has infected over 11,000 devices by using counterfeit Google Play pages and advertisements on Meta.

Page navigation

1 2 3 4 Next PageNext

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search