Cyber Security
News
RedKitten Campaign Targets NGOs Amid Iranian Unrest
Mitchell Langley
February 4, 2026
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
News
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
Gabby Lee
February 4, 2026
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Application Security
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Andrew Doyle
February 4, 2026
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
Cybersecurity
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
Mitchell Langley
February 4, 2026
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
Application Security
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Gabby Lee
February 4, 2026
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
Mitchell Langley
February 4, 2026
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Application Security
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Gabby Lee
February 4, 2026
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
Cybersecurity
White House Revokes Software Security Rules But Keeps Key Resources
Andrew Doyle
February 4, 2026
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Application Security
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Mitchell Langley
February 4, 2026
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Cybersecurity
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Gabby Lee
February 4, 2026
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Cybersecurity
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Andrew Doyle
February 4, 2026
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
News
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
Andrew Doyle
February 4, 2026
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Cybersecurity
Legal Repercussions Mount for Cognizant After TriZetto Incident
Mitchell Langley
February 4, 2026
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Cybersecurity
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Gabby Lee
February 4, 2026
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
Application Security
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Andrew Doyle
February 4, 2026
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...
Cybersecurity
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
Gabby Lee
January 30, 2026
Match Group, owner of dating platforms such as Tinder and OkCupid, confirmed a data breach compromising user information across its networks. This incident raises significant ...
Cybersecurity
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
Gabby Lee
January 30, 2026
The Aisuru/Kimwolf botnet orchestrated a potent distributed denial of service (DDoS) attack in December 2025. The attack reached 31.4 Tbps and executed 200 million requests ...
Cybersecurity
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Mitchell Langley
January 30, 2026
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Cybersecurity
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
Andrew Doyle
January 30, 2026
Google has effectively disrupted one of the largest residential proxy networks, impacting cybercriminals who mask illegal activities by mimicking legitimate residential traffic. This intervention aims ...
Cybersecurity
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
Mitchell Langley
February 4, 2026
News
Ingram Micro Faces Data Breach Impacting 42,000 Individuals’ Personal Information
Andrew Doyle
January 20, 2026
TOP CYBERSECURITY HEADLINES
Application Security
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
This Week’s Security Spotlight
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Andrew Doyle
January 28, 2026
Network Security
TP-Link’s Vulnerability: Critical Patch for VIGI Cameras
Gabby Lee
January 20, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
February 4, 2026
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
February 4, 2026
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files: Allegations of a “Personal Hacker”
February 4, 2026
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Android Malware Incident: Hugging Face Repository Misuse
February 4, 2026
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Chrome Extensions Prove Malicious with Data Hijacking Tricks
February 4, 2026
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
White House Revokes Software Security Rules But Keeps Key Resources
February 4, 2026
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
February 4, 2026
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
February 4, 2026
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
February 4, 2026
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
February 4, 2026
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Legal Repercussions Mount for Cognizant After TriZetto Incident
February 4, 2026
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
February 4, 2026
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
February 4, 2026
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
January 30, 2026
Google has effectively disrupted one of the largest residential proxy networks, impacting cybercriminals who mask illegal activities by mimicking legitimate residential traffic. This intervention aims ...
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
January 30, 2026
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
January 30, 2026
The Aisuru/Kimwolf botnet orchestrated a potent distributed denial of service (DDoS) attack in December 2025. The attack reached 31.4 Tbps and executed 200 million requests ...
Match Group Confirms Data Breach Impacting Multiple Dating Platforms
January 30, 2026
Match Group, owner of dating platforms such as Tinder and OkCupid, confirmed a data breach compromising user information across its networks. This incident raises significant ...
Cybercriminals Exploit LLMs and MCPs in ‘Operation Bizarre Bazaar’
January 30, 2026
Cybercriminals have launched 'Operation Bizarre Bazaar,' targeting exposed Large Language Models (LLMs) and Machine Content Platforms (MCPs) with commercial intent. The operation manipulates these systems ...
Critical Vulnerabilities Found in n8n’s Sandbox Mechanism: Potential for Remote Code Execution
January 30, 2026
Two newly identified vulnerabilities within n8n's sandbox could allow attackers to execute remote code. Weaknesses in the AST sanitization logic are key factors.
SolarWinds Web Help Desk Critical Vulnerabilities Patched
January 30, 2026
SolarWinds has released updates for six vulnerabilities in its Web Help Desk. Among these were four critical flaws enabling unauthenticated remote code execution or authentication ...

























