Cyber Security
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Madison Square Garden Cyber Incident Revealed Months Later
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
ShinyHunters Leak Exposes Millions of CarGurus User Records
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
Arkanix Stealer Malware Quickly Vanishes After Its Initial Launch
Microsoft Investigates Vanishing Mouse Pointer Bug in Classic Outlook
GitHub’s Dependabot is Under Fire for Alert Accuracy Issues
BeyondTrust RS and PRA Vulnerability Is Being Actively Exploited by Threat Actors
Microsoft Expands Data Loss Prevention Controls for Microsoft 365 Copilot
New Security Concerns Arise with the Proliferation of Internal LLMs
Cybercriminal Group Exploits Hundreds of FortiGate Firewalls Using Off-the-Shelf AI Tools
Ring Bets $10,000 That Nobody Can Hack Its Local Streaming Feature
Romanian Hacker Admits to Selling Oregon State Network Access in Court
Privacy Groups Demand Compliance From Generative AI Image Creators
Spanish Hacker Arrested for Booking Luxury Hotel Rooms for One Cent
Anthropic Introduces Claude Code Security for Vulnerability Detection
PayPal Data Breach Exposed User Data for Six Months Due to Software Bug
Critical Grandstream Phone Vulnerability Allows for Eavesdropping Opportunities
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Cybersecurity
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women's Accounts
Cybersecurity
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
A 22-year-old from Alabama pleaded guilty to cyberstalking, extortion, and computer fraud after hijacking the social media accounts of hundreds of you...
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
News
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
Cybercriminals deploy fake Google security pages to harvest one-time passcodes and cryptocurrency wallet addresses.
Chrome's Gemini Live Feature Left Users Exposed to Malicious Extensions
Cybersecurity
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Cybersecurity
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Cybersecurity
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Cybersecurity
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Cybersecurity
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Cybersecurity
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Cybersecurity
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Madison Square Garden Cyber Incident Revealed Months Later
Cybersecurity
Madison Square Garden Cyber Incident Revealed Months Later
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Cybersecurity
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Cybersecurity
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Hackers used Claude Code to infiltrate Mexican government systems, exfiltrating 150GB of sensitive data using AI-assisted exploits and automated theft...
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido's Full Customer Database
Cybersecurity
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
ShinyHunters group exposes a significant data breach at Odido, shaking the Dutch telecommunications sector.
How Safety Technology Is Transforming Workplace Protection
Blog
How Safety Technology Is Transforming Workplace Protection
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive ...
'Sandworm_Mode' Supply Chain Attack Hits the NPM Ecosystem
Cybersecurity
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
ICO Fines Reddit £14.47 Million for Failing to Protect Children's Data
Cybersecurity
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
ShinyHunters Leak Exposes Millions of CarGurus User Records
Cybersecurity
ShinyHunters Leak Exposes Millions of CarGurus User Records
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
Cybersecurity
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Cybersecurity
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Madison Square Garden Cyber Incident Revealed Months Later
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Hackers used Claude Code to infiltrate Mexican government systems, exfiltrating 150GB of sensitive data using AI-assisted exploits and automated theft...
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
ShinyHunters group exposes a significant data breach at Odido, shaking the Dutch telecommunications sector.
How Safety Technology Is Transforming Workplace Protection
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive one is creating new demand ...
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
ShinyHunters Leak Exposes Millions of CarGurus User Records
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
Lazarus Group Expands Its Ransomware Arsenal with Medusa
North Korea's Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.
Optimizely Suffers a Data Breach Through a Voice Phishing Attack
Optimizely has reported a data breach caused by a voice phishing attack, compromising customer data.
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
New cryptojacking campaign uses pirated software to deliver XMRig miner payloads onto hosts.