Trying To Find Something?

Menu

Skip to content
  • home
  • about
  • glossary
  • contact

Category Archives: News

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories

New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories

CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.

Full Article →

Posted by: th3cyb3rguy // News // aws, github // January 16, 2026
Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks

Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks

CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.

Full Article →

Posted by: th3cyb3rguy // News // fortinet, fortisiem, rce // January 15, 2026
One-Click Copilot Vulnerability Let Attackers silently exfiltrate sensitive user data

One-Click Copilot Vulnerability Let Attackers silently exfiltrate sensitive user data

CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.

Full Article →

Posted by: th3cyb3rguy // News // copilot, microsoft, ms // January 15, 2026
Palo Alto Networks Firewall Vulnerability Allows Attacker to Trigger DoS Attacks

Palo Alto Networks Firewall Vulnerability Allows Attacker to Trigger DoS Attacks

CLICK ON IMAGE ABOVE FOR SOURCE ARTICLE.

Full Article →

Posted by: th3cyb3rguy // News // dos, palo alto // January 15, 2026

Subscribe

CYBER SECURITY NEWS

Feed refreshes hourly.
  • Secure Your Spot at RSAC 2026 Conference
    Source: Dark Reading Date: 2026-03-23 By th3cyb3rguy
  • [Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
    Source: Dark Reading Date: 2026-03-19 By th3cyb3rguy
  • Cognizant TriZetto breach exposes health data of 3.4 million patients
    Source: Bleeping Computer Date: 2026-03-06 By Bill Toulas
  • New ClickFix Attack leverages Windows Terminal for Payload Execution
    Source: Cyber Security News Date: 2026-03-06 By Tushar Subhra Dutta
  • RMM Tools Essential for IT Operations but Increasingly Weaponized by Attackers
    Source: Cyber Security News Date: 2026-03-06 By Tushar Subhra Dutta
  • FBI Investigates Hack on its Wiretap and Critical Surveillance Systems
    Source: Cyber Security News Date: 2026-03-06 By Guru Baran
  • 900+ Certificates Used by Fortune 500, Governments Exposed by Key Leaks
    Source: HackRead Date: 2026-03-06 By Deeba Ahmed
  • CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
    Source: Bleeping Computer Date: 2026-03-06 By Sergiu Gatlan
  • Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
    Source: The Hacker News Date: 2026-03-06 By Source Author
  • Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
    Source: The Hacker News Date: 2026-03-06 By Source Author
  • Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws
    Source: HackRead Date: 2026-03-06 By Waqas
  • The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
    Source: The Hacker News Date: 2026-03-06 By Source Author
  • PromptSpy: The Android Malware That Hired an AI Assistant
    Source: Cyber Hoot Date: 2026-03-02 By Katie Boquetti
  • Ransomware Entry Points are Changing. Here Is What to Do About It?
    Source: Cyber Hoot Date: 2026-02-23 By Katie Boquetti
  • Thinking About Becoming a Licensed Engineer? Start Here.
    Source: CISO2CISO Date: 2025-09-13 By sakana1
  • Celebrate Hispanic Heritage Month With SWE
    Source: CISO2CISO Date: 2025-09-13 By sakana1
  • Student Loan Breach Exposes 2.5M Records
    Source: Threat Post Date: 2022-08-31 By Nate Nelson
  • Watering Hole Attacks Push ScanBox Keylogger
    Source: Threat Post Date: 2022-08-30 By Nate Nelson
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
    Source: Threat Post Date: 2022-08-29 By Nate Nelson

Current Sources:

• Bleeping Computer• CISO2CISO
• CyberHoot• Cyber Security News
• Dark Reading• Hack Read
• InfoGuard Security• Krebs on Security
• Naked Security• Security on TechRepublic
• Security Week• The Guardian
• The Hacker News• Threat Post
• Tripwire• We Live Security

NETWORKING

BSides Greenville
DefCon864
Infragard
ISSA
The Neptune App
SLED CIC CLO

PRIVACY POLICY

Click HERE to view our Privacy Policy.

CURRENT VISITORS

Visitors online now – 127

Calendar

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    

Trying To Find Something?

availability (1) awareness (1) aws (1) basics (1) blue (1) confidentiality (1) copilot (1) cybersec (1) cybersecurity (1) ddos (1) dos (2) exploit (1) fortinet (1) fortisiem (1) github (2) hardware (2) insider threat (1) integrity (1) malware (1) microsoft (1) mitm (1) ms (1) neptune (1) network (1) nmap (1) osint (1) palo alto (1) phishing (1) pii (1) private (1) purple (1) ransomware (1) rce (1) red (1) risk (1) social engineering (2) social media (1) sock puppet (1) software (1) theneptuneapp (1) threats (1) virtual (1) vpn (2) vulnerability (1) wi-fi (1)

Footer Menu

  • home
  • about
  • glossary
  • contact
© 2026 th3cyb3rguy
Leaf Theme powered by WordPress