Cyber Security
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant’s Own Tool
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
Russian Ransomware Operator Admits Guilt in U.S. Court
Meta’s Smart Glasses Face Privacy Investigation in Britain
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
HungerRush POS Platform Targeted in Data Extortion Scheme
Fake OpenClaw Installers on GitHub Are Stealing User Data
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
LexisNexis Data Breach Claimed by Fulcrumsec Group
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
ELECQ Data Breach May Have Exposed EV Charger Users' Private Information
Cybersecurity
ELECQ Data Breach May Have Exposed EV Charger Users’ Private Information
ELECQ warns of potential data theft after ransomware attack on its cloud systems.
Ericsson Inc. Faces Data Breach Through a Third-Party Service Provider
Cybersecurity
Ericsson Inc. Faces Data Breach Through a Third-Party Service Provider
Ericsson Inc. reports data theft affecting employees and customers due to a service provider breach.
Malicious npm Package Disguises as OpenClaw Installer for Data Theft
Application Security
Malicious npm Package Disguises as OpenClaw Installer for Data Theft
New npm threat involves package posing as OpenClaw installer deploying RAT to steal sensitive data.
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant's Own Tool
Application Security
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant’s Own Tool
ShinyHunters claims responsibility for a high-profile data breach affecting Salesforce and other major companies, utilizing an open-source tool develo...
Salesforce's Experience Cloud Platform Faces Vulnerability Challenges
Application Security
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
Salesforce's Experience Cloud under scrutiny as vulnerabilities expose extensive data risks.
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
News
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
Russian hackers are targeting Signal and WhatsApp accounts of officials globally, posing cyber risks.
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
Cybersecurity
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
North Korean state-sponsored threat actors are suspected of a 2025 cryptocurrency cloud heist.
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Cybersecurity
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Microsoft is still working to resolve a bright white flash issue in Windows 11's File Explorer that continues to affect users on certain systems.
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
News
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
Dutch police give 100 alleged scammers two weeks to surrender, or their images could be displayed nationwide.
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
Cybersecurity
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
New ClickFix technique utilizes Windows Terminal instead of the Run dialog to bypass security measures.
Perplexity's Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Application Security
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
A vulnerability in Perplexity's Comet browser exposed local files to potential theft via calendar events.
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Cybersecurity
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Cybersecurity
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
Cybersecurity
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
Application Security
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
CVE Vulnerability Alerts
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
US Government Contractor's Son Charged with Cryptocurrency Theft from US Marshals Service
Cybersecurity
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
News
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Cybersecurity
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta's Smart Glasses Face Privacy Investigation in Britain
Cybersecurity
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant’s Own Tool
ShinyHunters claims responsibility for a high-profile data breach affecting Salesforce and other major companies, utilizing an open-source tool develo...
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
Salesforce's Experience Cloud under scrutiny as vulnerabilities expose extensive data risks.
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
Russian hackers are targeting Signal and WhatsApp accounts of officials globally, posing cyber risks.
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
North Korean state-sponsored threat actors are suspected of a 2025 cryptocurrency cloud heist.
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Microsoft is still working to resolve a bright white flash issue in Windows 11's File Explorer that continues to affect users on certain systems.
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
Dutch police give 100 alleged scammers two weeks to surrender, or their images could be displayed nationwide.
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
New ClickFix technique utilizes Windows Terminal instead of the Run dialog to bypass security measures.
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
A vulnerability in Perplexity's Comet browser exposed local files to potential theft via calendar events.
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.