Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Year 2022

  • Home
  • Year 2022
CISA Advisory on Top Exploited Vulnerabilities of 2022

CISA Advisory on Top Exploited Vulnerabilities of 2022

The CISA has published a report that was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from different countries. The report provides a complete insight into CVEs that…
Posted by PravinKarthik August 4, 2023
Mandiant Report – Nation State Zero Day Exploits in 2022

Mandiant Report – Nation State Zero Day Exploits in 2022

Mandiant has released a report stating, threat actors with ties to nation-states were the driving force behind exploiting zero-day vulnerabilities last year Over 50% of the exploits in 2022 are…
Posted by PravinKarthik March 22, 2023
TheCyberThrone Security Week In Review – December 31st 2022

TheCyberThrone Security Week In Review – December 31st 2022

Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings . This review is for the week ending Saturday, December 31st, 2022. Last week of 2022, started…
Posted by PravinKarthik January 1, 2023
TheCyberThrone DeMystifying CyberSecurity Year 2022

TheCyberThrone DeMystifying CyberSecurity Year 2022

The past two years were defined by high-profile cybersecurity incidents. In 2020, experts uncovered the SolarWinds cyber espionage attack that targeted various businesses and government entities. In 2021, the ransomware…
Posted by PravinKarthik December 31, 2022
TheCyberThrone 2022 Cybersecurity Predictions and Outcome a Look Back Review

TheCyberThrone 2022 Cybersecurity Predictions and Outcome a Look Back Review

As we are nearing the business end of 2022, the curtains are about to be pulled. we are readying ourselves to welcome he new year with cheers and hope of…
Posted by PravinKarthik December 30, 2022
Most Favorite Stories of TheCyberThrone in Year 2022 a Review

Most Favorite Stories of TheCyberThrone in Year 2022 a Review

In 2022, the threat of cyber-attacks, hacks, and security breaches loomed large, with numerous high-profile incidents impacting companies and individuals. Both in terms of cybersecurity and business generally, the past…
Posted by PravinKarthik December 28, 2022
Twitter Data Breach ! It’s 2nd time in 2022

Twitter Data Breach ! It’s 2nd time in 2022

400 million Twitter accounts are affected by a massive Twitter data breach, according to a hacker. With users flocking to the rival Mastodon, controversial new view count feature, and now…
Posted by PravinKarthik December 27, 2022
Major Security Acquisitions in Year 2022 a Review

Major Security Acquisitions in Year 2022 a Review

The cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings. Despite growing macroeconomic challenges in 2022, tech giants continued to…
Posted by PravinKarthik December 26, 2022

Posts pagination

1 2 Next page
Trending post
  • Beyond Prompts: Engineering the LLM Security Control Plane
    Beyond Prompts: Engineering the LLM Security Control Plane
  • CISSP Domain 2 – Data Security Controls – How Classification Drives Protection
    CISSP Domain 2 – Data Security Controls – How Classification Drives Protection
  • Anthropic Code Exposed in Two incidents
    Anthropic Code Exposed in Two incidents
  • Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
    Axios npm Hijacked: 100 Million Weekly Downloads Turned Into a RAT Dropper
  • TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  March 2026
    TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  March 2026
  • CISSP Executive Briefing: Beyond Patching
    CISSP Executive Briefing: Beyond Patching
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top