Cyber Security
Cybersecurity
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Andrew Doyle
April 8, 2026
Russia-linked APT28 is harnessing vulnerable routers in a massive espionage campaign.
Cybersecurity
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Gabby Lee
April 8, 2026
Anthropic's new AI model, Claude Mythos, could protect critical software or potentially enhance cyberattacks.
Cybersecurity
Trent AI Emerges From Stealth With $13 Million in Funding
Andrew Doyle
April 8, 2026
Startup Trent AI unveils a comprehensive security framework to safeguard artificial intelligence (AI) agents, backed by significant funding.
Cybersecurity
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Mitchell Langley
April 8, 2026
Google's recent Android update fixes critical vulnerabilities in the operating system, including a severe StrongBox flaw and a DoS vulnerability in th...
Cybersecurity
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Andrew Doyle
April 8, 2026
Exploring the plateau in automated pentesting tools and the PoC cliff effect on security validation.
Cybersecurity
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Gabby Lee
April 8, 2026
A critical vulnerability in Flowise lets attackers execute arbitrary code using improperly validated JavaScript.
Application Security
Exchange Online Mailbox Access Issues Impact Outlook Users
Mitchell Langley
April 7, 2026
Exchange Online access issues have affected Outlook mobile and macOS users. Microsoft is actively working on a resolution.
Application Security
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Gabby Lee
April 7, 2026
The expansion of Shadow AI within daily apps and outdated mobile devices increases exposure to unseen mobile vulnerabilities.
Cybersecurity
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Gabby Lee
April 7, 2026
Organizations face growing cybersecurity risks from trusted vendors, SaaS tools, and subcontractors that bypass traditional security measures.
Application Security
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Andrew Doyle
April 7, 2026
Analysis reveals critical ShareFile flaws allowing server access and arbitrary file uploads.
Application Security
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Andrew Doyle
April 7, 2026
Researchers found 36 harmful npm packages posing as Strapi CMS plugins to exploit Redis, PostgreSQL, and execute further cyber attacks.
News
Bogus Traffic Violation Text Scam Targeting Americans
Andrew Doyle
April 7, 2026
Fraudulent "Notice of Default" text scams impersonate U.S. state courts, leading victims to phishing sites.
News
Qilin Ransomware Group Targets German Political Party Die Linke
Mitchell Langley
April 7, 2026
Qilin ransomware group claims responsibility for a cyberattack on German political party Die Linke.
Cybersecurity
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Gabby Lee
April 7, 2026
Detailed analysis of a .cmd malware found in an email, escalating privileges and bypassing antivirus.
CVE Vulnerability Alerts
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
Mitchell Langley
April 7, 2026
Fortinet issues emergency patches for a critical vulnerability (CVE-2026-35616) in FortiClient EMS, already exploited in the wild.
Cybersecurity
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Gabby Lee
April 7, 2026
A North Korean orchestrated cyber attack stole $285 million from Drift, a Solana-based exchange, on April 1, 2026.
Application Security
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Andrew Doyle
April 7, 2026
The popular Axios HTTP client faced a social engineering attack attributed to North Korean actors, exposing serious security risks within open-source ...
Cybersecurity
Free Android VPNs Are Quietly Working Against You
Gabby Lee
April 3, 2026
Free VPNs on Android promise protection, but often jeopardize user privacy with tracking, permissions, and risky servers.
Cybersecurity
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Andrew Doyle
April 3, 2026
Residential proxies confuse IP reputation systems, obscuring differences between malicious traffic and legitimate users.
Cybersecurity
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Gabby Lee
April 3, 2026
Drift Protocol faces a substantial breach, leading to administrative control loss and financial damages exceeding $280 million.
Cybersecurity
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Andrew Doyle
April 8, 2026
News
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
Andrew Doyle
April 2, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Mitchell Langley
April 8, 2026
Cybersecurity
Apple Rolls Out DarkSword Exploit Protection to More Devices
Mitchell Langley
April 3, 2026
Application Security
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Gabby Lee
April 3, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
April 8, 2026
Google's recent Android update fixes critical vulnerabilities in the operating system, including a severe StrongBox flaw and a DoS vulnerability in th...
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
April 8, 2026
Exploring the plateau in automated pentesting tools and the PoC cliff effect on security validation.
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
April 8, 2026
A critical vulnerability in Flowise lets attackers execute arbitrary code using improperly validated JavaScript.
Exchange Online Mailbox Access Issues Impact Outlook Users
April 7, 2026
Exchange Online access issues have affected Outlook mobile and macOS users. Microsoft is actively working on a resolution.
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
April 7, 2026
The expansion of Shadow AI within daily apps and outdated mobile devices increases exposure to unseen mobile vulnerabilities.
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
April 7, 2026
Organizations face growing cybersecurity risks from trusted vendors, SaaS tools, and subcontractors that bypass traditional security measures.
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
April 7, 2026
Analysis reveals critical ShareFile flaws allowing server access and arbitrary file uploads.
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
April 7, 2026
Researchers found 36 harmful npm packages posing as Strapi CMS plugins to exploit Redis, PostgreSQL, and execute further cyber attacks.
Bogus Traffic Violation Text Scam Targeting Americans
April 7, 2026
Fraudulent "Notice of Default" text scams impersonate U.S. state courts, leading victims to phishing sites.
Qilin Ransomware Group Targets German Political Party Die Linke
April 7, 2026
Qilin ransomware group claims responsibility for a cyberattack on German political party Die Linke.
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
April 7, 2026
Detailed analysis of a .cmd malware found in an email, escalating privileges and bypassing antivirus.
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
April 7, 2026
Fortinet issues emergency patches for a critical vulnerability (CVE-2026-35616) in FortiClient EMS, already exploited in the wild.
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
April 7, 2026
A North Korean orchestrated cyber attack stole $285 million from Drift, a Solana-based exchange, on April 1, 2026.
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
April 7, 2026
The popular Axios HTTP client faced a social engineering attack attributed to North Korean actors, exposing serious security risks within open-source ...
Free Android VPNs Are Quietly Working Against You
April 3, 2026
Free VPNs on Android promise protection, but often jeopardize user privacy with tracking, permissions, and risky servers.
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
April 3, 2026
Residential proxies confuse IP reputation systems, obscuring differences between malicious traffic and legitimate users.
Apple Rolls Out DarkSword Exploit Protection to More Devices
April 3, 2026
Apple enhances its defenses against the DarkSword exploit kit, a threat linked to state-sponsored hackers and commercial spyware vendors.
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
April 3, 2026
Drift Protocol faces a substantial breach, leading to administrative control loss and financial damages exceeding $280 million.
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
April 3, 2026
Claude Code faces a critical vulnerability discovered by Adversa AI just days after its source code was unintentionally leaked by Anthropic.
Cybercriminals Exploit Empty Properties for Postal Fraud
April 3, 2026
Threat actors use vacant homes to snatch mail and perpetrate fraud using Flare's findings.























