Cyber Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Figure Data Breach Exposes Nearly 1 Million User Records
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
DEF CON Bars Three Men Named in Epstein Documents
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Unveiling the Extent of Leaked API Keys in Front-End Applications
Microsoft Teams Service Outage Frustrates Users Worldwide
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
New Android Malware Identified in Device Firmware Raising Alarms
Italian University Struggles With Disruption After Cyberattack
DKnife Toolkit: A Persistent Threat to Network Security
Lema AI Secures $24 Million to Bolster Supply Chain Security
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Vega Expands with $120 Million Series B Funding
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
OpenClaw wrestles with security gaps and misconfigurations, despite swift patches and OpenAI-backed foundation support.
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Cybersecurity
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Authorities in Africa arrested 651 suspects and reclaimed $4.3 million in joint fraud mitigation efforts.
Human Error Remains One of the Biggest Threats to IT Security
Blog
Human Error Remains One of the Biggest Threats to IT Security
Human errors remain a significant security risk even in systems with strong protocols.
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Application Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Massiv Android banking trojan, disguised as an IPTV app, targets users in southern Europe.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CVE Vulnerability Alerts
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Cybersecurity
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
UK demands quick removal of non-consensual images, equating them with terror content.
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Cybersecurity
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Venice Security, formerly known as Valkyrie, has secured $33 million in funding to enhance its Privileged Access Management solutions.
Figure Data Breach Exposes Nearly 1 Million User Records
Cybersecurity
Figure Data Breach Exposes Nearly 1 Million User Records
Blockchain lender Figure confirms data breach with over 2GB of user information leaked by ShinyHunters.
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
News
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
Hackers target tech, manufacturing, and finance sectors using device code phishing and vishing in OAuth 2.0 abuse campaigns.
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Cybersecurity
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Texas accuses TP-Link of falsely advertising its routers' security, allowing Chinese state-backed hackers to exploit firmware vulnerabilities and acce...
DEF CON Bars Three Men Named in Epstein Documents
Cybersecurity
DEF CON Bars Three Men Named in Epstein Documents
DEF CON bans three men linked to Epstein files, raising important questions about ethics and attendee policies at major cybersecurity conferences.
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Cybersecurity
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Surge in Ivanti zero-day vulnerability exploits traced back to July 2025.
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
Cybersecurity
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
A Nigerian national has been sentenced to eight years in prison for hacking into tax preparation firms and submitting $8.1 million in fraudulent tax r...
Germany Warns of Phishing Threats via Signal Targeting High-profile Individuals
News
Germany Warns of Phishing Threats via Signal Targeting High-Profile Individuals
Germany's cyber authorities have alerted citizens about a sophisticated phishing attack using Signal. High-ranking officials, journalists, and politicians are prime targets. This advisory emphasizes the ...
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybersecurity
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Chinese state-backed hackers have been identified exploiting a Dell security flaw in a series of zero-day attacks since mid-2024. These attacks underline concerns regarding the ...
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Cybersecurity
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Cybercriminals replicated a legitimate Oura MCP server in a deceptive campaign to distribute StealC malware. STAR Labs discovered the SmartLoader operation, presenting crucial cybersecurity insights.
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Cybersecurity
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Notepad++ Bolsters Security With New Double-lock Update System
Application Security
Notepad++ Bolsters Security With New Double-lock Update System
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
AI Assistants as Covert C2 Tools Implications for Enterprise Security
Cybersecurity
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Unveiling the Extent of Leaked API Keys in Front-End Applications
Cybersecurity
Unveiling the Extent of Leaked API Keys in Front-End Applications
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Massiv Android banking trojan, disguised as an IPTV app, targets users in southern Europe.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
UK demands quick removal of non-consensual images, equating them with terror content.
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Venice Security, formerly known as Valkyrie, has secured $33 million in funding to enhance its Privileged Access Management solutions.
Figure Data Breach Exposes Nearly 1 Million User Records
Blockchain lender Figure confirms data breach with over 2GB of user information leaked by ShinyHunters.
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
Hackers target tech, manufacturing, and finance sectors using device code phishing and vishing in OAuth 2.0 abuse campaigns.
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Texas accuses TP-Link of falsely advertising its routers' security, allowing Chinese state-backed hackers to exploit firmware vulnerabilities and acce...
DEF CON Bars Three Men Named in Epstein Documents
DEF CON bans three men linked to Epstein files, raising important questions about ethics and attendee policies at major cybersecurity conferences.
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Surge in Ivanti zero-day vulnerability exploits traced back to July 2025.
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
A Nigerian national has been sentenced to eight years in prison for hacking into tax preparation firms and submitting $8.1 million in fraudulent tax r...
Germany Warns of Phishing Threats via Signal Targeting High-Profile Individuals
Germany's cyber authorities have alerted citizens about a sophisticated phishing attack using Signal. High-ranking officials, journalists, and politicians are prime targets. This advisory emphasizes the ...
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Chinese state-backed hackers have been identified exploiting a Dell security flaw in a series of zero-day attacks since mid-2024. These attacks underline concerns regarding the ...
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Cybercriminals replicated a legitimate Oura MCP server in a deceptive campaign to distribute StealC malware. STAR Labs discovered the SmartLoader operation, presenting crucial cybersecurity insights.
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Notepad++ Bolsters Security With New Double-lock Update System
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Unveiling the Extent of Leaked API Keys in Front-End Applications
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.
Microsoft Teams Service Outage Frustrates Users Worldwide
Microsoft Teams has been experiencing an ongoing outage worldwide that has led to significant delays and access issues. Users are frustrated by these disruptions, with ...
Polish Authorities Detain Suspected Phobos Ransomware Operative
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Hackers claim to have stolen millions of Eurail user records and are reportedly offering these for sale. Eurail is currently trying to gauge the breach's ...