New Cybersecuirty Articles

Cybersecurity News

Look no further! We have a selection of handcrafted, handpicked cybersecurity news articles and related resources. We provide independent research and analysis in a wide range of sectors. What about infosec? Well, we cover that too, obviously.

Cybersecurity Tutorials

Additionally, we have started to serve a CyberSecurity Academy archive which will be home to unique write-ups and some of the Internet’s top tutorials. Don’t forget, Cybersecurity starts with you. 

Active Cyber Threats in the wild

At real Infosecurity we endeavour to cover active threats in the wild and help you secure what is important to you, empowering you to advance your cyber knowledge.

Submit an article

Maybe you have a cybersecurity news article you’d like to submit to us? You can do that through the contact page. 

New cybersecurity articles

Want to keep up-to-date with our new cybersecurity articles? Our Weekly Cybersecurity Newsletter has a wide range of topics in the new cybersecurity sphere covered. Our new cybersecurity articles include emerging developing threats, data breaches and malware news & analysis and lots more.

Feel like we are missing a specific topic? feel feel to contact us with your cybersecurity related input. We’d love to hear from you.

What really is Cybersecurity ?

The act of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks which range from business organisations to personal devices.

Network security and application security focuses on securing computer networks, along with software and device free from threats and vulnerabilities, respectively.

the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

TLDR

Cybersecurity Academy Data Breach News Data Security Featured How to InfoSec News Kali Linux Guides & Tools | Cybersecurity Academy KrebsOnSec Tools Trending Vulnerabilities World Affairs

5 British businesses were penalised for making 500,000 unwanted calls

Bookmark

End 2 End Encryption (E2EE) Is Finally here, kind of, for Apple Device Backups

Bookmark

Google releases a fresh version of Chrome to fix yet another zero-day flaw

Bookmark

TrustCor dropped as Root CA for Mozilla and Microsoft

Bookmark

How Researchers Easily Hacked Several Different Vehicles Using a Sirius XM Bug

Bookmark

Most Organizations Still Vulnerable To Year-Old Log4j Vulnerability

Bookmark

LastPass Suffers 2nd Security Breach Of The Year; Exposing Some Customer’s Information

Bookmark

Inadvertently, a researcher crashes the KmsdBot Cryptocurrency mining Botnet

Bookmark

Another set of Medibank customer data is exposed by hackers on the dark web.

Bookmark

Google Project Zero asserts that Google should do a better job patching Android devices

Bookmark

Online disclosure of 5+ million Twitter users’ stolen information

Bookmark

Irish Data Protection Commission (DPC) fined Meta for failing to prevent data scraping from Facebook users

Bookmark

Chinese bots flood Twitter in a bid to try and obscure Covid protests

Bookmark

Hacker tries to sell 500m WhatsApp user data on dark web

Bookmark

Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages

Bookmark

UK bans Chinese CCTV cameras at ‘sensitive’ government locations

Bookmark

Chrome Update: Exploited Zero-Day Vulnerability fixed by Google, the 8th this year

Bookmark

RESEARCH: analytics information related to iPhones include a Directory Services Identifier (DSID) that may be used to identify users

Bookmark

Over 50 Million Passwords Stolen by 30+ Russian Cybercrime Groups Using Stealer Malware

Bookmark

73% of retail applications have security flaws, yet only a quarter of them have been fixed

Bookmark

New QBot Malware is dropped by attack that leverages Windows Zero-Day flaw as a cover.

Bookmark