Cyber Security
Cybersecurity
Google Chrome Introduces Option to Delete Local AI Models
Andrew Doyle
January 19, 2026
Google's Chrome browser introduces a new feature enabling users to delete local AI models linked to its Enhanced Protection feature. This change offers users greater ...
Cybersecurity
Tennessee Hacker Admits Guilt in Supreme Court Filing System Breach
Mitchell Langley
January 19, 2026
Nicholas Moore, a Tennessee man, confessed to hacking the U.S. Supreme Court’s filing system. His illegal activities also impacted other federal agencies, including AmeriCorps and ...
Identity and Access Management
Monnai Secures $12 Million to Bolster Identity and Risk Data Services
Mitchell Langley
January 19, 2026
The recent funding will enable Monnai to enhance its identity verification and risk management services, targeting financial institutions and digital firms.
Cybersecurity
New Chrome Extensions Disguised as HR Tools Pose Security Threat
Mitchell Langley
January 19, 2026
Researchers have identified five Chrome extensions disguising themselves as HR and ERP tools. These malicious extensions aim to steal authentication tokens, obstruct incident response, and ...
News
GootLoader Employs Malformed ZIP Files to Evade Detection
Gabby Lee
January 19, 2026
Cybersecurity analysts have discovered that GootLoader is using malformed ZIP archives in a bid to circumvent detection. By concatenating 500 to 1,000 archives, it employs ...
Network Security
Verizon Offers Compensation after Nationwide Wireless Service Outage
Andrew Doyle
January 19, 2026
Verizon Wireless addresses last week's widespread outage by informing affected customers about a $20 account credit. Customers are receiving text messages with precise steps on ...
Cybersecurity
Microsoft Patch Tuesday Update Sparks Unrest in PCs
Mitchell Langley
January 19, 2026
Microsoft’s recent Patch Tuesday update introduced a peculiar bug affecting some PCs, preventing them from shutting down or entering hibernation. The issue, tied to Secure ...
News
Law Enforcement Identifies Black Basta Ransomware Leader
Gabby Lee
January 19, 2026
Ukraine and Germany confirm the identity of the Black Basta ransomware leader, now on the Europol and Interpol wanted lists. Law enforcement's collaboration highlights global ...
Application Security
HPE OneView Mass Vulnerability Exploitation Threatens Government Agencies
Andrew Doyle
January 18, 2026
Over 40,000 cyberattacks in four hours exploited a critical HPE OneView vulnerability. The attacks primarily targeted government agencies, utilizing the RondoDox botnet to execute mass, ...
Cybersecurity
Project Eleven Secures $20 Million Funding to Propel Post-Quantum Security
Mitchell Langley
January 18, 2026
Project Eleven has successfully raised $20 million in funding to develop infrastructure and tools essential for organizations transitioning to post-quantum computing. With this substantial investment, ...
News
UAT-8837 Threat Actor Linked to China Targeting North American Infrastructure
Andrew Doyle
January 18, 2026
The cyber threat actor UAT-8837, associated with China, targets North American critical infrastructure through the exploitation of known and zero-day vulnerabilities. This sophisticated adversary demonstrates ...
Data Security
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
Mitchell Langley
January 18, 2026
The Canadian Investment Regulatory Organization (CIRO), responsible for regulating investment dealers, reported a significant data breach. Threat actors stole personal information from 750,000 people, highlighting ...
Application Security
XSS Vulnerability in StealC Malware’s Control Panel Uncovered
Gabby Lee
January 18, 2026
Security researchers exploiting an XSS flaw in StealC malware's control panel gained visibility into attackers' activities and hardware details. This access offers critical insights into ...
News
Fleeing Ransomware Leader Now Among Germany’s Most Wanted
Andrew Doyle
January 18, 2026
Russian national Oleg Evgenievich Nefekov, involved in major ransomware activities, has evaded capture, reportedly returning to his homeland. German authorities have now placed him on ...
Cybersecurity
Analyzing AI in Security Testing: SQL Injection Strong yet Fails in Controls
Mitchell Langley
January 18, 2026
A recent test assessed AI's ability to tackle SQL injection (SQLi) vulnerabilities and security controls, revealing mixed outcomes. The AI agents adeptly handled SQLi but ...
Cybersecurity
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
Gabby Lee
January 18, 2026
Google's Fast Pair protocol is facing scrutiny due to a significant vulnerability that permits unauthorized Bluetooth device hijacking, tracking, and eavesdropping.
Cybersecurity
New Attack Method, Reprompt, Poses Significant Risk to AI Chatbots
Andrew Doyle
January 18, 2026
Cybersecurity experts have unveiled a novel attack strategy, Reprompt, that facilitates unauthorized data extraction from AI chatbots like Microsoft Copilot. Exploiting this vulnerability involves a ...
Application Security
Critical Security Vulnerabilities: Redis Found at Risk of Unauthenticated RCE
Mitchell Langley
January 18, 2026
Recent discovery of a security flaw in Redis has left the system vulnerable to unauthenticated remote code execution (RCE). This unsettling development can have dire ...
Endpoint Security
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Gabby Lee
January 18, 2026
Researchers spotlight the ‘StackWarp’ attack, a novel methodology targeting AMD processors. This vulnerability enables remote code execution in confidential virtual machines (VMs), challenging security paradigms ...
Application Security
Visual Studio Code’s Copilot Studio Extension Now Widely Available
Andrew Doyle
January 18, 2026
Microsoft's Copilot Studio extension for Visual Studio Code, designed to bolster application security, is now accessible to all users. This extension aims to enhance development ...
Cybersecurity
Google Chrome Introduces Option to Delete Local AI Models
Andrew Doyle
January 19, 2026
Data Security
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
Mitchell Langley
January 18, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Data Security
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
Mitchell Langley
January 18, 2026
Endpoint Security
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Gabby Lee
January 18, 2026
Cybersecurity
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Mitchell Langley
January 15, 2026
Data Security
Fried Frank Data Breach: Implications for High-Profile Clients
Andrew Doyle
January 14, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
New Chrome Extensions Disguised as HR Tools Pose Security Threat
January 19, 2026
Researchers have identified five Chrome extensions disguising themselves as HR and ERP tools. These malicious extensions aim to steal authentication tokens, obstruct incident response, and ...
GootLoader Employs Malformed ZIP Files to Evade Detection
January 19, 2026
Cybersecurity analysts have discovered that GootLoader is using malformed ZIP archives in a bid to circumvent detection. By concatenating 500 to 1,000 archives, it employs ...
Verizon Offers Compensation after Nationwide Wireless Service Outage
January 19, 2026
Verizon Wireless addresses last week's widespread outage by informing affected customers about a $20 account credit. Customers are receiving text messages with precise steps on ...
Microsoft Patch Tuesday Update Sparks Unrest in PCs
January 19, 2026
Microsoft’s recent Patch Tuesday update introduced a peculiar bug affecting some PCs, preventing them from shutting down or entering hibernation. The issue, tied to Secure ...
Law Enforcement Identifies Black Basta Ransomware Leader
January 19, 2026
Ukraine and Germany confirm the identity of the Black Basta ransomware leader, now on the Europol and Interpol wanted lists. Law enforcement's collaboration highlights global ...
HPE OneView Mass Vulnerability Exploitation Threatens Government Agencies
January 18, 2026
Over 40,000 cyberattacks in four hours exploited a critical HPE OneView vulnerability. The attacks primarily targeted government agencies, utilizing the RondoDox botnet to execute mass, ...
Project Eleven Secures $20 Million Funding to Propel Post-Quantum Security
January 18, 2026
Project Eleven has successfully raised $20 million in funding to develop infrastructure and tools essential for organizations transitioning to post-quantum computing. With this substantial investment, ...
UAT-8837 Threat Actor Linked to China Targeting North American Infrastructure
January 18, 2026
The cyber threat actor UAT-8837, associated with China, targets North American critical infrastructure through the exploitation of known and zero-day vulnerabilities. This sophisticated adversary demonstrates ...
Canada’s Investment Watchdog Suffers Massive Data Breach: 750,000 Impacted by CIRO Security Incident
January 18, 2026
The Canadian Investment Regulatory Organization (CIRO), responsible for regulating investment dealers, reported a significant data breach. Threat actors stole personal information from 750,000 people, highlighting ...
XSS Vulnerability in StealC Malware’s Control Panel Uncovered
January 18, 2026
Security researchers exploiting an XSS flaw in StealC malware's control panel gained visibility into attackers' activities and hardware details. This access offers critical insights into ...
Fleeing Ransomware Leader Now Among Germany’s Most Wanted
January 18, 2026
Russian national Oleg Evgenievich Nefekov, involved in major ransomware activities, has evaded capture, reportedly returning to his homeland. German authorities have now placed him on ...
Analyzing AI in Security Testing: SQL Injection Strong yet Fails in Controls
January 18, 2026
A recent test assessed AI's ability to tackle SQL injection (SQLi) vulnerabilities and security controls, revealing mixed outcomes. The AI agents adeptly handled SQLi but ...
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
January 18, 2026
Google's Fast Pair protocol is facing scrutiny due to a significant vulnerability that permits unauthorized Bluetooth device hijacking, tracking, and eavesdropping.
New Attack Method, Reprompt, Poses Significant Risk to AI Chatbots
January 18, 2026
Cybersecurity experts have unveiled a novel attack strategy, Reprompt, that facilitates unauthorized data extraction from AI chatbots like Microsoft Copilot. Exploiting this vulnerability involves a ...
Critical Security Vulnerabilities: Redis Found at Risk of Unauthenticated RCE
January 18, 2026
Recent discovery of a security flaw in Redis has left the system vulnerable to unauthenticated remote code execution (RCE). This unsettling development can have dire ...
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
January 18, 2026
Researchers spotlight the ‘StackWarp’ attack, a novel methodology targeting AMD processors. This vulnerability enables remote code execution in confidential virtual machines (VMs), challenging security paradigms ...
Visual Studio Code’s Copilot Studio Extension Now Widely Available
January 18, 2026
Microsoft's Copilot Studio extension for Visual Studio Code, designed to bolster application security, is now accessible to all users. This extension aims to enhance development ...
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
January 18, 2026
A significant flaw in AWS CodeBuild could have exposed the cloud provider's GitHub repositories to unauthorized access, posing risks to multiple AWS environments. Addressed by ...
Critical Vulnerability in Modular DS WordPress Plugin Exploited
January 18, 2026
A serious security flaw in the Modular DS WordPress plugin has been identified and exploited, permitting unauthenticated privilege escalation. This vulnerability, CVE-2026-23550, has a maximum ...
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
January 15, 2026
ConsentFix exploits browser-based OAuth flows to hijack Microsoft accounts. Understanding its mechanisms can help protect against this evolving phishing threat.






















