Cyber Security
Data Security
Anna’s Archive Takes a Stand on Music Preservation
Andrew Doyle
December 23, 2025
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Cybersecurity
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Mitchell Langley
December 23, 2025
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Cybersecurity
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Andrew Doyle
December 23, 2025
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Cybersecurity
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
Gabby Lee
December 23, 2025
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
News
MacSync Malware Distributed via Signed Swift Application
Andrew Doyle
December 22, 2025
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
Information Security
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
Andrew Doyle
December 22, 2025
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cybersecurity
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Mitchell Langley
December 22, 2025
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
News
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Gabby Lee
December 22, 2025
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
Cybersecurity
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
Mitchell Langley
December 22, 2025
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
News
Clop Ransomware Breach Compromises University of Phoenix Data
Mitchell Langley
December 22, 2025
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Cybersecurity
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
Gabby Lee
December 22, 2025
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...
Cybersecurity
PwC Promotes Responsible Innovation in the Era of AI
Andrew Doyle
December 22, 2025
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
News
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
Andrew Doyle
December 22, 2025
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...
Cybersecurity
A Deliberate Attempt to Induce an Outage at NIST Raises Concerns
Mitchell Langley
December 22, 2025
A NIST staff member recently attempted to disable backup generators supporting its Network Time Protocol infrastructure during a power outage around Boulder, Colorado, causing network ...
Cybersecurity
U.S. Department of Justice Indicts 54 Individuals in ATM Jackpotting Scheme
Mitchell Langley
December 22, 2025
The U.S. Department of Justice has charged 54 people linked to a large-scale ATM jackpotting plot using Ploutus malware, targeting ATMs nationwide. The participants belong ...
Cybersecurity
Denmark Accuses Russia of Cyberattack on Water Utility: A Clash in Hybrid Warfare
Gabby Lee
December 22, 2025
Denmark points to Russia in a cyberattack targeting a Danish water utility, situating it within a broader pattern of hybrid warfare by Moscow against Western ...
News
RansomHouse Transitions to a Multi-layered RaaS Encryptor
Mitchell Langley
December 22, 2025
RansomHouse has enhanced their ransomware-as-a-service (RaaS) platform by transitioning from a simple single-phase encryption technique to a sophisticated multi-layered method. This development aims to complicate ...
Cybersecurity
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Andrew Doyle
December 22, 2025
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Application Security
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
Gabby Lee
December 22, 2025
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Mitchell Langley
December 22, 2025
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Mitchell Langley
December 22, 2025
Application Security
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Andrew Doyle
December 22, 2025
Identity and Access Management
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
Andrew Doyle
December 17, 2025
Cybersecurity
All I Want for Christmas is All of Your Data: SantaStealer Malware Spreads for the Holidays
Mitchell Langley
December 17, 2025
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
December 23, 2025
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
December 22, 2025
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
December 22, 2025
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
December 22, 2025
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
December 22, 2025
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
December 22, 2025
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
December 22, 2025
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
December 22, 2025
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...
PwC Promotes Responsible Innovation in the Era of AI
December 22, 2025
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
December 22, 2025
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...
A Deliberate Attempt to Induce an Outage at NIST Raises Concerns
December 22, 2025
A NIST staff member recently attempted to disable backup generators supporting its Network Time Protocol infrastructure during a power outage around Boulder, Colorado, causing network ...
U.S. Department of Justice Indicts 54 Individuals in ATM Jackpotting Scheme
December 22, 2025
The U.S. Department of Justice has charged 54 people linked to a large-scale ATM jackpotting plot using Ploutus malware, targeting ATMs nationwide. The participants belong ...
Denmark Accuses Russia of Cyberattack on Water Utility: A Clash in Hybrid Warfare
December 22, 2025
Denmark points to Russia in a cyberattack targeting a Danish water utility, situating it within a broader pattern of hybrid warfare by Moscow against Western ...
RansomHouse Transitions to a Multi-layered RaaS Encryptor
December 22, 2025
RansomHouse has enhanced their ransomware-as-a-service (RaaS) platform by transitioning from a simple single-phase encryption technique to a sophisticated multi-layered method. This development aims to complicate ...
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
December 22, 2025
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
December 22, 2025
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
December 22, 2025
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Thailand Conference Launches International Initiative to Fight Online Scams
December 22, 2025
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
December 22, 2025
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
December 22, 2025
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...























