Cybersecurity News

Cybersecurity News company information, Employees & Contact Information

Revista Líder en España y Latino América sobre Ciberseguridad. Novedades, Noticias, Entrevistas, Debates... ¡Todo sobre la seguridad online! Organizadores de #CISODay y #CyberInsuranceDay --> #ciberseguridad #cybersecurity

Company Details

Employees
15
Founded
-
Address
Calle Núñez Morgado, 5,madrid, Madrid,madrid 28232,spain
Industry
Software Development
NAICS
Software Publishers
HQ
Madrid , Madrid
Looking for a particular Cybersecurity News employee's phone or email?

Cybersecurity News Questions

News

Discord Data Breach - 1.5 TB of Data and 2 Million Government ID Photos Extorted - CybersecurityNews

Discord Data Breach - 1.5 TB of Data and 2 Million Government ID Photos Extorted CybersecurityNews

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware - CybersecurityNews

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware CybersecurityNews

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code - CybersecurityNews

Critical Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code CybersecurityNews

Cybersecurity News Recap - Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack - CybersecurityNews

Cybersecurity News Recap - Chrome, Gemini Vulnerabilities, Linux Malware, and Man-in-the-Prompt Attack CybersecurityNews

Hackers Exploiting DNS Blind Spots to Hide and Deliver Malware - CybersecurityNews

Hackers Exploiting DNS Blind Spots to Hide and Deliver Malware CybersecurityNews

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM - CybersecurityNews

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM CybersecurityNews

Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack - CybersecurityNews

Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack CybersecurityNews

Critical Microsoft Office Vulnerabilities Let Attackers Execute Malicious Code - CybersecurityNews

Critical Microsoft Office Vulnerabilities Let Attackers Execute Malicious Code CybersecurityNews

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards - CybersecurityNews

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards CybersecurityNews

Tycoon Phishing Kit Employs New Technique to Hide Malicious Links - CybersecurityNews

Tycoon Phishing Kit Employs New Technique to Hide Malicious Links CybersecurityNews

What is ClickFix Attack - How Hackers are Using it to Attack User Device With Malware - CybersecurityNews

What is ClickFix Attack - How Hackers are Using it to Attack User Device With Malware CybersecurityNews

New Gmail Phishing Attack With Weaponized Login Flow Steals Credentials - CybersecurityNews

New Gmail Phishing Attack With Weaponized Login Flow Steals Credentials CybersecurityNews

Google Confirms Data Breach - Notifying Users Affected By the Cyberattack - CybersecurityNews

Google Confirms Data Breach - Notifying Users Affected By the Cyberattack CybersecurityNews

Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach - CybersecurityNews

Google Warns 2.5B Gmail Users to Reset Passwords Following Salesforce Data Breach CybersecurityNews

Street-Level QR Phishing: Cybercriminals Take Social Engineering to the Real World - CybersecurityNews

Street-Level QR Phishing: Cybercriminals Take Social Engineering to the Real World CybersecurityNews

Weekly Cybersecurity News Recap : Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks - CybersecurityNews

Weekly Cybersecurity News Recap : Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks CybersecurityNews

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data - CybersecurityNews

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data CybersecurityNews

Google Chrome 0-day Vulnerability Actively Exploited in the Wild - CybersecurityNews

Google Chrome 0-day Vulnerability Actively Exploited in the Wild CybersecurityNews

Notepad++ Vulnerability Let Attacker Gain Complete System Control - PoC Released - CybersecurityNews

Notepad++ Vulnerability Let Attacker Gain Complete System Control - PoC Released CybersecurityNews

Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems - CybersecurityNews

Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems CybersecurityNews

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks - Update Now - CybersecurityNews

Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks - Update Now CybersecurityNews

Lockbit Ransomware Hacked - Leaked Database Exposes Internal Chats - CybersecurityNews

Lockbit Ransomware Hacked - Leaked Database Exposes Internal Chats CybersecurityNews

Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild - CybersecurityNews

Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild CybersecurityNews

Microsoft 365's Direct Send Exploited to Send Phishing Emails as Internal Users - CybersecurityNews

Microsoft 365's Direct Send Exploited to Send Phishing Emails as Internal Users CybersecurityNews

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware - CybersecurityNews

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware CybersecurityNews

Cisco Hacked – Ransomware Group Allegedly Breach Internal Network & Gained AD Access - CybersecurityNews

Cisco Hacked – Ransomware Group Allegedly Breach Internal Network & Gained AD Access CybersecurityNews

Unpatched Windows Shortcut Vulnerability Let Attackers Execute Remote Code - PoC Released - CybersecurityNews

Unpatched Windows Shortcut Vulnerability Let Attackers Execute Remote Code - PoC Released CybersecurityNews

Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely - CybersecurityNews

Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely CybersecurityNews

Researchers Hacked into Apple's New USB-C Controller - CybersecurityNews

Researchers Hacked into Apple's New USB-C Controller CybersecurityNews

Hackers Bypassed Gmail’s Security Filters Bypassed for Sophisticated Phishing Attacks - CybersecurityNews

Hackers Bypassed Gmail’s Security Filters Bypassed for Sophisticated Phishing Attacks CybersecurityNews

PoC Exploit Released for Active Directory Domain Services Privilege Escalation Vulnerability - CybersecurityNews

PoC Exploit Released for Active Directory Domain Services Privilege Escalation Vulnerability CybersecurityNews

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability - CybersecurityNews

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability CybersecurityNews

Dell SupportAssist Vulnerability Let Attackers Escalate Privileges - CybersecurityNews

Dell SupportAssist Vulnerability Let Attackers Escalate Privileges CybersecurityNews

Vulnerabilities in Skoda & Volkswagen Cars Let Hackers Remotely Track Users - CybersecurityNews

Vulnerabilities in Skoda & Volkswagen Cars Let Hackers Remotely Track Users CybersecurityNews

Critical 7-Zip Vulnerability Let Attackers Execute Arbitrary Code - CybersecurityNews

Critical 7-Zip Vulnerability Let Attackers Execute Arbitrary Code CybersecurityNews

Nokia Investigating Data Breach, IntelBroker Allegedly Selling Source Code - CybersecurityNews

Nokia Investigating Data Breach, IntelBroker Allegedly Selling Source Code CybersecurityNews

Amazon Dismantles Russian APT 29 Infrastructure Used to Attack Users - CybersecurityNews

Amazon Dismantles Russian APT 29 Infrastructure Used to Attack Users CybersecurityNews

Weekly Cybersecurity News Recap : Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks - CybersecurityNews

Weekly Cybersecurity News Recap : Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks CybersecurityNews

Hackers Allegedly Destroyed Aeroflot Airlines' IT Infrastructure in Year-Long Attack - CybersecurityNews

Hackers Allegedly Destroyed Aeroflot Airlines' IT Infrastructure in Year-Long Attack CybersecurityNews

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction - CybersecurityNews

RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction CybersecurityNews

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers - Detailed Case Study - CybersecurityNews

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers - Detailed Case Study CybersecurityNews

Critical macOS 'Sploitlight' Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC - CybersecurityNews

Critical macOS 'Sploitlight' Vulnerability Let Attackers Steal Private Data of Files Bypassing TCC CybersecurityNews

SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access - CybersecurityNews

SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access CybersecurityNews

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery - CybersecurityNews

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery CybersecurityNews

Oracle Acknowledges Data Breach and Starts Informing Affected Clients - CybersecurityNews

Oracle Acknowledges Data Breach and Starts Informing Affected Clients CybersecurityNews

Critical Firefox 0-Interaction libvpx Vulnerability Let Attackers Execute Arbitrary Code - CybersecurityNews

Critical Firefox 0-Interaction libvpx Vulnerability Let Attackers Execute Arbitrary Code CybersecurityNews

How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Ongoing Salesforce Attack Campaign - CybersecurityNews

How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Ongoing Salesforce Attack Campaign CybersecurityNews

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems - CybersecurityNews

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems CybersecurityNews

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails - CybersecurityNews

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails CybersecurityNews

Top 15 Best Security Incident Response Tools In 2025 - CybersecurityNews

Top 15 Best Security Incident Response Tools In 2025 CybersecurityNews

Tenable Confirms Data Breach - Hackers Accessed Customers' Contact Details - CybersecurityNews

Tenable Confirms Data Breach - Hackers Accessed Customers' Contact Details CybersecurityNews

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption - CybersecurityNews

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption CybersecurityNews

Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control - CybersecurityNews

Critical Microsoft's Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control CybersecurityNews

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code - CybersecurityNews

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code CybersecurityNews

Critical Chrome Vulnerability Let Attackers Execute Arbitrary Code - CybersecurityNews

Critical Chrome Vulnerability Let Attackers Execute Arbitrary Code CybersecurityNews

Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages - CybersecurityNews

Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages CybersecurityNews

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely - CybersecurityNews

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely CybersecurityNews

Google Patched Android 0-Day Vulnerability Exploited in the Wild - CybersecurityNews

Google Patched Android 0-Day Vulnerability Exploited in the Wild CybersecurityNews

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware - CybersecurityNews

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware CybersecurityNews

Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges - CybersecurityNews

Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges CybersecurityNews

Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code - Patch Now - CybersecurityNews

Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code - Patch Now CybersecurityNews

Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware - CybersecurityNews

Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware CybersecurityNews

40,000+ CVEs Published In 2024, Marking A 38% Increase From 2023 - CybersecurityNews

40,000+ CVEs Published In 2024, Marking A 38% Increase From 2023 CybersecurityNews

Chrome Security Update, Fix For Multiple Vulnerabilities - CybersecurityNews

Chrome Security Update, Fix For Multiple Vulnerabilities CybersecurityNews

Beware of Free File Word To PDF Converter That Delivers Malware - CybersecurityNews

Beware of Free File Word To PDF Converter That Delivers Malware CybersecurityNews

Hackers Exploiting Microsoft Teams to Gain Remote Access to User’s System - CybersecurityNews

Hackers Exploiting Microsoft Teams to Gain Remote Access to User’s System CybersecurityNews

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers - CybersecurityNews

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers CybersecurityNews

Oracle Agile PLM Zero-Day Vulnerability Exploited In The Wild - CybersecurityNews

Oracle Agile PLM Zero-Day Vulnerability Exploited In The Wild CybersecurityNews

Threat Actor IntelBroker Allegedly Claims Leak of Deloitte Internal Communications - CybersecurityNews

Threat Actor IntelBroker Allegedly Claims Leak of Deloitte Internal Communications CybersecurityNews

Volkswagen Data Breach: 800,000 Electric Car Owners' Data Leaked - CybersecurityNews

Volkswagen Data Breach: 800,000 Electric Car Owners' Data Leaked CybersecurityNews

Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited - CybersecurityNews

Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited CybersecurityNews

TeamViewer Windows App Let Attackers Escalate Privileges to System User - CybersecurityNews

TeamViewer Windows App Let Attackers Escalate Privileges to System User CybersecurityNews

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader - CybersecurityNews

Zero-Day Vulnerability in PDF Files Leaking NTLM Data in Adobe & Foxit Reader CybersecurityNews

Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Attacks - CybersecurityNews

Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Attacks CybersecurityNews

Top Cybersecurity News Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant