Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Day: December 25, 2022

  • Home
  • 2022
  • December
  • 25
Vice Society Ransomware uses PolyVice Payload

Vice Society Ransomware uses PolyVice Payload

Vice Society ransomware gang is now using a new custom payload in its recent cyberattacks. The ransomware variant, dubbed PolyVice, was first seen in the wild in July, but it was…
Posted by PravinKarthik December 25, 2022
Ecco – Danish Shoe Maker Suffers Data Breach

Ecco – Danish Shoe Maker Suffers Data Breach

Danish shoe manufacturer and retailer Ecco suffers a data breach and exposes millions of documents. The server misconfiguration’s severity, open to an attack that could have affected customers all over…
Posted by PravinKarthik December 25, 2022
TheCyberThrone Security Week In Review – December 24th 2022

TheCyberThrone Security Week In Review – December 24th 2022

Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings . This review is for the week ending Saturday, December 24th, 2022. This week started with a…
Posted by PravinKarthik December 25, 2022
Trending post
  • CISSP Domain 2 – DLP Preventing Data Leakage
    CISSP Domain 2 – DLP Preventing Data Leakage
  • Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
    Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
  • The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
    The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
  • CISSP Domain 2 – Data Handling and Security Policies
    CISSP Domain 2 – Data Handling and Security Policies
  • CISSP Domain 5: Zero Hour Exam Cram Series
    CISSP Domain 5: Zero Hour Exam Cram Series
  • PyTorch Lightning Poisoned — Mini Shai-Hulud Worm Crosses Into the AI/ML Supply Chain
    PyTorch Lightning Poisoned — Mini Shai-Hulud Worm Crosses Into the AI/ML Supply Chain
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top