Cyber Security
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Infinity Stealer Malware Takes Aim at macOS Systems
Iranian Hackers Breach FBI Director’s Personal Email Account
European Commission Responds to Cloud Infrastructure Cyberattack
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
CareCloud Responds to a Potential Data Security Breach
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Firefox 149 Launches with a Built-In VPN for Better Privacy
FCC Adds Consumer Routers to Covered List Amid Security Concerns
DOE Rolls Out Project Armor to Fortify Critical Energy Infrastructure
Cybercriminals Exploit Google Ads in a Deceptive Tax Document Malvertising Campaign
Dutch Ministry of Finance Hit by Cyberattack as Data Breach Investigation Continues
Open Source Projects Face a Rising Tide of Malware Infections
Major Announcements from RSAC 2026: What Day 1 Revealed
QualDerm Partners Data Breach Hits Over 3.1 Million People
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Gartner Publishes Its First Market Guide for Guardian Agents
Software Supply Chains Are the New Frontline for Cyber Risk
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
Cybersecurity
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.
New Phishing Techniques Threaten TikTok Business Account Security
News
New Phishing Techniques Threaten TikTok Business Account Security
Cybercriminals use phishing tactics to hijack TikTok business accounts.
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
Cybersecurity
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
US and UK aim to strengthen maritime defense against underwater drones.
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
Cybersecurity
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
AFC Ajax confirms a significant data breach that exposed vulnerabilities in its internal systems, enabling unauthorized access.
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cybersecurity
TP-Link Routers Receive Patches for High-Severity Security Flaws
TP-Link patches high-severity router flaws that could enable authentication bypass, arbitrary command execution, and configuration file decryption.
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Cybersecurity
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Cloudflare-themed attack uses ClickFix tactics to deliver Python-based Infiniti stealer on macOS systems.
Infinity Stealer Malware Takes Aim at macOS Systems
Cybersecurity
Infinity Stealer Malware Takes Aim at macOS Systems
New malware, Infinity Stealer, targeting macOS via Python payload compiled with Nuitka.
Iranian Hackers Breach FBI Director's Personal Email Account
Cybersecurity
Iranian Hackers Breach FBI Director’s Personal Email Account
Iranian-backed hackers penetrated FBI director's email, leaked sensitive information online.
Russian-Affiliated Attackers Deploy DarkSword Exploit Kit Targeting iOS Devices
News
Russian-Affiliated Attackers Deploy DarkSword Exploit Kit Targeting iOS Devices
Russian-based TA446 group wields DarkSword to compromise iOS devices, escalating cybersecurity threats.
European Commission Responds to Cloud Infrastructure Cyberattack
Cybersecurity
European Commission Responds to Cloud Infrastructure Cyberattack
The European Commission contained a cyberattack affecting its cloud infrastructure, ensuring no internal network disruption to Europa.eu websites.
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Application Security
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Security flaw in Smart Slider 3 WordPress plugin risks unauthorized file access across more than 800,000 websites.
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
Cybersecurity
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
Apple is urging iOS and iPadOS users to update their devices immediately due to active web-based security threats.
CareCloud Responds to a Potential Data Security Breach
Cybersecurity
CareCloud Responds to a Potential Data Security Breach
CareCloud investigates potential data breach in its electronic health record system, raising cybersecurity concerns.
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
Cybersecurity
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
Cybercrime group associated with Trivy attack uploads malicious Telnyx packages to PyPI aiming to deploy credential-stealing malware.
Hackers Exploit a Critical Citrix Vulnerability to Steal Sensitive Data
CVE Vulnerability Alerts
Hackers Exploit a Critical Citrix Vulnerability to Steal Sensitive Data
Critical Citrix vulnerability CVE-2026-3055 is targeted by attackers to steal data.
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Cybersecurity
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
New vulnerability in OpenAI ChatGPT allows secret data leaks.
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Cybersecurity
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
DeepLoad, a new malware loader, exploits the ClickFix tactic with AI-assisted obfuscation.
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Cybersecurity
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Huskeys announces its $8M funding and an AI-driven edge security management platform built to secure the full edge security stack.
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Application Security
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Apple adds a security feature in macOS Tahoe 26.4 to block harmful Terminal commands, alerting users to potential risks before execution.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
US and UK aim to strengthen maritime defense against underwater drones.
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
AFC Ajax confirms a significant data breach that exposed vulnerabilities in its internal systems, enabling unauthorized access.
TP-Link Routers Receive Patches for High-Severity Security Flaws
TP-Link patches high-severity router flaws that could enable authentication bypass, arbitrary command execution, and configuration file decryption.
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Cloudflare-themed attack uses ClickFix tactics to deliver Python-based Infiniti stealer on macOS systems.
Infinity Stealer Malware Takes Aim at macOS Systems
New malware, Infinity Stealer, targeting macOS via Python payload compiled with Nuitka.
Iranian Hackers Breach FBI Director’s Personal Email Account
Iranian-backed hackers penetrated FBI director's email, leaked sensitive information online.
Russian-Affiliated Attackers Deploy DarkSword Exploit Kit Targeting iOS Devices
Russian-based TA446 group wields DarkSword to compromise iOS devices, escalating cybersecurity threats.
European Commission Responds to Cloud Infrastructure Cyberattack
The European Commission contained a cyberattack affecting its cloud infrastructure, ensuring no internal network disruption to Europa.eu websites.
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Security flaw in Smart Slider 3 WordPress plugin risks unauthorized file access across more than 800,000 websites.
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
Apple is urging iOS and iPadOS users to update their devices immediately due to active web-based security threats.
CareCloud Responds to a Potential Data Security Breach
CareCloud investigates potential data breach in its electronic health record system, raising cybersecurity concerns.
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
Cybercrime group associated with Trivy attack uploads malicious Telnyx packages to PyPI aiming to deploy credential-stealing malware.
Hackers Exploit a Critical Citrix Vulnerability to Steal Sensitive Data
Critical Citrix vulnerability CVE-2026-3055 is targeted by attackers to steal data.
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
New vulnerability in OpenAI ChatGPT allows secret data leaks.
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
DeepLoad, a new malware loader, exploits the ClickFix tactic with AI-assisted obfuscation.
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Huskeys announces its $8M funding and an AI-driven edge security management platform built to secure the full edge security stack.
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Apple adds a security feature in macOS Tahoe 26.4 to block harmful Terminal commands, alerting users to potential risks before execution.
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Discover the high-severity Telegram flaw enabling zero-click remote code execution.
Firefox 149 Launches with a Built-In VPN for Better Privacy
Mozilla introduces Firefox 149 with an integrated VPN offering 50GB monthly traffic to bolster online privacy.
FCC Adds Consumer Routers to Covered List Amid Security Concerns
The FCC bans the sale of foreign-made consumer routers in the United States, citing security concerns.