Cyber Security
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
Microsoft Rolls Out Fast-Track Account Recovery for Windows Hardware Program Suspensions
Google Enhances Pixel Security with Rust-Based DNS Parser
US, UK, and Canadian Forces Execute Successful Anti-Cryptocurrency Theft Operation
Stolen Credentials and Zero Trust: Preventing Privilege Escalation in Security Breaches
Cybercriminals Use Ad Fraud With AI and SEO Tactics to Push Scareware
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Information Theft Revolutionized: No Local Decryption in This Security Threat
Booking.com Confirms Unauthorized Access Compromising User Data
LinkedIn’s Browser Extension Draws Corporate Espionage Allegations
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Application Security
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
A recent update in the Microsoft Edge browser has led to a bug impacting the right-click paste function in Microsoft Teams chats.
Threat Actors Repurpose Tycoon 2FA Tools in New Phishing Schemes
News
Threat Actors Repurpose Tycoon 2FA Tools in New Phishing Schemes
Cybercriminals adapt Tycoon 2FA tools for phishing, revealing new security challenges.
Attackers Exploit QEMU Virtualization to Evade Detection
CVE Vulnerability Alerts
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Three zero-day flaws in Microsoft Defender, dubbed BlueHammer, RedSun, and UnDefend, are being actively exploited to gain elevated system access.
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
Cybersecurity
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
Vercel's recent security breach exposes unauthorized data access as threat actors intend to sell compromised information from their systems.
AI Security Challenges - Vendors' Dual Messaging Raises Questions
Cybersecurity
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
AI vendors promote AI for security while denying its flaws. This raises questions about their maturity and transparency.
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Cybersecurity
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
NIST plans to halt severity scoring for lower-priority vulnerabilities due to high submission volumes.
Phishing Scams Are Now Exploiting Apple's Trusted Email Servers
News
Phishing Scams Are Now Exploiting Apple’s Trusted Email Servers
Apple account change alerts misused for phishing, mimicking legitimate iPhone purchase notices.
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Cybersecurity
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Hackers linked to organized crime infiltrate logistics companies, posing rising threats of cargo theft and payment diversion.
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
CVE Vulnerability Alerts
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Nginx servers vulnerable to attacks via a flaw (CVE-2026-33032) that allows authentication bypass.
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Application Security
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
A system-level adware attack compromises antivirus protection on thousands of endpoints across various sectors.
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Application Security
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Threat actors are exploiting n8n, an AI workflow platform, to launch advanced phishing attacks.
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Cybersecurity
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Microsoft awarded $2.3 million to researchers during this year's Zero Day Quest for discovering vulnerabilities.
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Cybersecurity
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Swedish authorities attribute a cyberattack on a heating plant to a pro-Russian group, laying bare vulnerabilities in national energy infrastructure.
Autovista Battles Ransomware Attack Across Europe and Australia
Cybersecurity
Autovista Battles Ransomware Attack Across Europe and Australia
Autovista enlists external support to tackle a ransomware attack impacting its systems in Europe and Australia.
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
Cybersecurity
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
CISA adds critical vulnerabilities in Microsoft SharePoint, Office Excel, Apple, Laravel, and Craft CMS to exploited vulnerabilities list.
A 'By Design' Flaw in Anthropic's MCP Could Enable Widespread AI Supply Chain Attacks
Cybersecurity
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
A newly discovered flaw in Anthropic's Model Context Protocol allows unsanitized command execution, endangering AI environments.
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
Cybersecurity
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
Capsule Security emerges from stealth with $7 million funding to secure AI agents.
France's Rising Kidnapping Cases Amid Crypto Extortion Schemes
Cybersecurity
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
French mother and child rescued after 20-hour kidnap, exposing extortion threats tied to crypto wealth.
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Application Security
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Over 100 Chrome extensions are stealing user data and creating backdoor vulnerabilities, posing significant threats to cybersecurity.
Modern Trucking's Cybersecurity Imperative - Industry Leaders Address Digital Threats
Cybersecurity
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Trucks transformed into digital networks face cybersecurity risks.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
Vercel's recent security breach exposes unauthorized data access as threat actors intend to sell compromised information from their systems.
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
AI vendors promote AI for security while denying its flaws. This raises questions about their maturity and transparency.
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
NIST plans to halt severity scoring for lower-priority vulnerabilities due to high submission volumes.
Phishing Scams Are Now Exploiting Apple’s Trusted Email Servers
Apple account change alerts misused for phishing, mimicking legitimate iPhone purchase notices.
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Hackers linked to organized crime infiltrate logistics companies, posing rising threats of cargo theft and payment diversion.
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Nginx servers vulnerable to attacks via a flaw (CVE-2026-33032) that allows authentication bypass.
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
A system-level adware attack compromises antivirus protection on thousands of endpoints across various sectors.
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Threat actors are exploiting n8n, an AI workflow platform, to launch advanced phishing attacks.
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Microsoft awarded $2.3 million to researchers during this year's Zero Day Quest for discovering vulnerabilities.
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Swedish authorities attribute a cyberattack on a heating plant to a pro-Russian group, laying bare vulnerabilities in national energy infrastructure.
Autovista Battles Ransomware Attack Across Europe and Australia
Autovista enlists external support to tackle a ransomware attack impacting its systems in Europe and Australia.
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
CISA adds critical vulnerabilities in Microsoft SharePoint, Office Excel, Apple, Laravel, and Craft CMS to exploited vulnerabilities list.
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
A newly discovered flaw in Anthropic's Model Context Protocol allows unsanitized command execution, endangering AI environments.
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
Capsule Security emerges from stealth with $7 million funding to secure AI agents.
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
French mother and child rescued after 20-hour kidnap, exposing extortion threats tied to crypto wealth.
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Over 100 Chrome extensions are stealing user data and creating backdoor vulnerabilities, posing significant threats to cybersecurity.
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Trucks transformed into digital networks face cybersecurity risks.
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Microsoft addresses critical Windows 10 vulnerabilities with its April 2026 security patches.
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Fake Ledger Live app drains $9.5 million from 50 victims via Apple's App Store. Investigating infiltration tactics.
Basic-Fit Data Breach Exposes Personal Information of One Million Members
A data breach at Basic-Fit has exposed sensitive data of one million members, including names, birth dates, and bank details.
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Phishing Scams Are Now Exploiting Apple’s Trusted Email Servers
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members