Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Year 2023

  • Home
  • Security
  • Year 2023
TheCyberThrone DeMystifying CyberSecurity Year 2023
Posted inYear 2023

TheCyberThrone DeMystifying CyberSecurity Year 2023

Year 2023 was also a turbulent year that experienced more prolific attacks with enhanced sophistication. Here at TheCyberThrone, we have published numerous articles summing up the year 2023. if you…
Posted by PravinKarthik December 31, 2023
Most Favorite Stories of TheCyberThrone a Review – Year 2023
Posted inYear 2023

Most Favorite Stories of TheCyberThrone a Review – Year 2023

In 2023, the threat of cyber-attacks, hacks, and security breaches loomed large, with numerous high-profile incidents impacting companies and individuals. Both in terms of cybersecurity and business generally, the past…
Posted by PravinKarthik December 30, 2023
Most Prominent Security Acquisitions a review – Year 2023
Posted inYear 2023

Most Prominent Security Acquisitions a review – Year 2023

As the digital world expands, the risk of cyberattacks is increasing, and security experts must stay vigilant to safeguard against potential breaches. As digital risks grow, big companies are acquiring…
Posted by PravinKarthik December 30, 2023
Most Prevailed Malware Families a Review -Year 2023
Posted inYear 2023

Most Prevailed Malware Families a Review -Year 2023

Malware describes any malicious program created to wreak havoc or mischief on a computer system. Thanks to the constant push-and-pull between security professionals and cybercriminals, it’s also an ever-evolving ecosystem.…
Posted by PravinKarthik December 27, 2023
Most Prolific Ransomware Attacks a Review – Year 2023
Posted inYear 2023

Most Prolific Ransomware Attacks a Review – Year 2023

2023 looks set to be another record-breaking year for ransomware. In the first half of the year our data found that publicized attacks represented a 49% increase over the first six…
Posted by PravinKarthik December 26, 2023
State of the Art Ransomware Families Arrived Newly in Year 2023
Posted inYear 2023

State of the Art Ransomware Families Arrived Newly in Year 2023

The ransomware industry remains the number one threat to organizations worldwide. The supply chain attacks became a solid technique for the mature and experienced ransomware groups. Although we have seen increased activity…
Posted by PravinKarthik December 25, 2023
TheCyberthrone’s Zero Day Vulnerabilities a review-Year 2023
Posted inYear 2023

TheCyberthrone’s Zero Day Vulnerabilities a review-Year 2023

This year 2023, have seen a total of 95+ security vulnerabilities have been exploited as unpatched zero-days in the wild, according to an stats. It affected a wide range of…
Posted by PravinKarthik December 25, 2023
Most Exploited Vulnerabilities Review -Year 2023
Posted inYear 2023

Most Exploited Vulnerabilities Review -Year 2023

There are more devices connected to the internet than ever before. This is music to an attacker's ears, as they make good use of machines like printers and cameras which were…
Posted by PravinKarthik December 24, 2023

Posts pagination

1 2 Next page
Trending post
  • Udemy Data Breach — ShinyHunters Claims 1.4M Records
    Udemy Data Breach — ShinyHunters Claims 1.4M Records
  • CISSP Domain 4: Zero Hour Exam Cram Series
    CISSP Domain 4: Zero Hour Exam Cram Series
  • CISSP Executive Briefing: The Detection Gap
    CISSP Executive Briefing: The Detection Gap
  • Bitwarden CLI Supply Chain Compromise
    Bitwarden CLI Supply Chain Compromise
  • CISSP Domain 2 – Data Protection Techniques – Encryption Masking & Tokenization
    CISSP Domain 2 – Data Protection Techniques – Encryption Masking & Tokenization
  • CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
    CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top