Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Day: December 25, 2022

  • Home
  • 2022
  • December
  • 25
Vice Society Ransomware uses PolyVice Payload

Vice Society Ransomware uses PolyVice Payload

Vice Society ransomware gang is now using a new custom payload in its recent cyberattacks. The ransomware variant, dubbed PolyVice, was first seen in the wild in July, but it was…
Posted by PravinKarthik December 25, 2022
Ecco – Danish Shoe Maker Suffers Data Breach

Ecco – Danish Shoe Maker Suffers Data Breach

Danish shoe manufacturer and retailer Ecco suffers a data breach and exposes millions of documents. The server misconfiguration’s severity, open to an attack that could have affected customers all over…
Posted by PravinKarthik December 25, 2022
TheCyberThrone Security Week In Review – December 24th 2022

TheCyberThrone Security Week In Review – December 24th 2022

Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings . This review is for the week ending Saturday, December 24th, 2022. This week started with a…
Posted by PravinKarthik December 25, 2022
Trending post
  • Fox Tempest Takedown — Microsoft DCU Dismantles Malware-Signing Service Operation
    Fox Tempest Takedown — Microsoft DCU Dismantles Malware-Signing Service Operation
  • CISSP Executive Briefing: Security Drift
    CISSP Executive Briefing: Security Drift
  • CISSP Domain 7: Zero Hour Exam Cram Series
    CISSP Domain 7: Zero Hour Exam Cram Series
  • AI Security Posture Management: The Visibility Layer Every Enterprise Is Missing
    AI Security Posture Management: The Visibility Layer Every Enterprise Is Missing
  • Windows Zero-Days Trilogy: Chaotic Eclipse's Unpatched Assault
    Windows Zero-Days Trilogy: Chaotic Eclipse's Unpatched Assault
  • CISA adds Seven Vulnerabilities to KEV Catalog
    CISA adds Seven Vulnerabilities to KEV Catalog
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top