Cyber Security
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
Cybercriminals Exploit LLMs and MCPs in ‘Operation Bizarre Bazaar’
SolarWinds Web Help Desk Critical Vulnerabilities Patched
Critical Vulnerabilities Found in n8n’s Sandbox Mechanism: Potential for Remote Code Execution
Legal Dispute Arises Between eScan and Morphisec Over Update Server Breach
Mesh Security Secures $12 Million for CSMA Platform Innovation
Insecure Deployments of Moltbot Pose Risks in Enterprise Settings
FBI Successfully Seizes RAMP Cybercrime Forum Disrupting Ransomware Operations
Chinese Hackers Breach Phones of UK Officials in Long-term Cyber Espionage
Microsoft Office and Linux Kernel Among Newly Cataloged Vulnerabilities
Meta Implements Enhanced Security Measures on WhatsApp
Exploitations of WinRAR Vulnerability CVE-2025-8088 Emerge as a Major Threat
Meta Introduces Enhanced WhatsApp Security for High-Risk Users
ShinyHunters Allegedly Breach Panera Bread and Other Companies via Microsoft Entra SSO
Memcyco Secures $37 Million to Expand Anti-Impersonation Technology Globally
Major Security Flaw Found in vm2 Node.js Sandbox Tool
Crunchbase Data Breach Raises Security Concerns After ShinyHunters Attack
RedKitten Campaign Targets NGOs Amid Iranian Unrest
News
RedKitten Campaign Targets NGOs Amid Iranian Unrest
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
Targeted Vishing Attacks Amplify ShinyHunters's SaaS Data Breaches
News
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Instagram's Privacy Controls Data Exposure Review of Recent Findings
Application Security
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
Cybersecurity
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised Supply Chain Security Breach Uncovered
Application Security
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files Allegations of a Personal Hacker
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Android Malware Incident Hugging Face Repository Misuse
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Application Security
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
White House Revokes Software Security Rules But Keeps Key Resources
Cybersecurity
White House Revokes Software Security Rules But Keeps Key Resources
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Application Security
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Cybersecurity
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Cybersecurity
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
News
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Legal Repercussions Mount for Cognizant After TriZetto Incident
Cybersecurity
Legal Repercussions Mount for Cognizant After TriZetto Incident
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Cybersecurity
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Application Security
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
Cybersecurity
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
Match Group, owner of dating platforms such as Tinder and OkCupid, confirmed a data breach compromising user information across its networks. This incident raises significant ...
AisuruKimwolf Botnet Orchestrates Massive DDoS Attack
Cybersecurity
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
The Aisuru/Kimwolf botnet orchestrated a potent distributed denial of service (DDoS) attack in December 2025. The attack reached 31.4 Tbps and executed 200 million requests ...
Game Mods Conceal Infostealer Malware A Threat to Corporate IT Systems
Cybersecurity
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals' Shield
Cybersecurity
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
Google has effectively disrupted one of the largest residential proxy networks, impacting cybercriminals who mask illegal activities by mimicking legitimate residential traffic. This intervention aims ...
RedKitten Campaign Targets NGOs Amid Iranian Unrest
News
RedKitten Campaign Targets NGOs Amid Iranian Unrest

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files: Allegations of a “Personal Hacker”
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
White House Revokes Software Security Rules But Keeps Key Resources
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Legal Repercussions Mount for Cognizant After TriZetto Incident
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
Google has effectively disrupted one of the largest residential proxy networks, impacting cybercriminals who mask illegal activities by mimicking legitimate residential traffic. This intervention aims ...
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
The Aisuru/Kimwolf botnet orchestrated a potent distributed denial of service (DDoS) attack in December 2025. The attack reached 31.4 Tbps and executed 200 million requests ...
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
Match Group, owner of dating platforms such as Tinder and OkCupid, confirmed a data breach compromising user information across its networks. This incident raises significant ...
Cybercriminals Exploit LLMs and MCPs in ‘Operation Bizarre Bazaar’
Cybercriminals have launched 'Operation Bizarre Bazaar,' targeting exposed Large Language Models (LLMs) and Machine Content Platforms (MCPs) with commercial intent. The operation manipulates these systems ...
Critical Vulnerabilities Found in n8n’s Sandbox Mechanism: Potential for Remote Code Execution
Two newly identified vulnerabilities within n8n's sandbox could allow attackers to execute remote code. Weaknesses in the AST sanitization logic are key factors.
SolarWinds Web Help Desk Critical Vulnerabilities Patched
SolarWinds has released updates for six vulnerabilities in its Web Help Desk. Among these were four critical flaws enabling unauthenticated remote code execution or authentication ...