Cyber Security
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Anthropic Accidentally Leaked Source Code for Claude Code
Depthfirst Secures $80 Million for AI Security Expansion
Hasbro Targeted in a Recent Cybersecurity Incident
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
FBI Cautions on Security Threats from Chinese Mobile Applications
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
UK Government Allocates £630,000 for Digital Identity Card Discussion
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
The “Doctor No” Problem Is Changing the Face of Enterprise Security
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Infinity Stealer Malware Takes Aim at macOS Systems
Iranian Hackers Breach FBI Director’s Personal Email Account
European Commission Responds to Cloud Infrastructure Cyberattack
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
CareCloud Responds to a Potential Data Security Breach
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Cybersecurity
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Anthropic confirms internal code leak of Claude Code due to human error, no sensitive data involved.
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Cybersecurity
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Microsoft has released an emergency fix for the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to widespread ...
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Application Security
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Google introduces a feature to change Gmail addresses, enhancing user email customization options in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Application Security
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Cybersecurity
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
News
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
News
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.
Depthfirst Secures $80 Million for AI Security Expansion
Cybersecurity
Depthfirst Secures $80 Million for AI Security Expansion
Depthfirst secures Series B funding to enhance AI research, train security models, and boost enterprise adoption.
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
News
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
New malware named DeepLoad threatens cybersecurity by deploying a malicious browser extension and spreading via USB drives to steal credentials.
Hasbro Targeted in a Recent Cybersecurity Incident
Cybersecurity
Hasbro Targeted in a Recent Cybersecurity Incident
Toy manufacturer Hasbro investigates potential data compromise following a cyberattack.
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Application Security
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Google addresses 21 vulnerabilities, including a zero-day in Chrome's Dawn component.
FBI Cautions on Security Threats from Chinese Mobile Applications
Cybersecurity
FBI Cautions on Security Threats from Chinese Mobile Applications
The FBI alerts users about data privacy issues connected to Chinese mobile applications, urging caution.
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Application Security
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Application Security
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
UK Government Allocates £630,000 for Digital Identity Card Discussion
Cybersecurity
UK Government Allocates £630,000 for Digital Identity Card Discussion
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Cybersecurity
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Cybersecurity
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.
The Doctor No Problem Is Changing the Face of Enterprise Security
Cybersecurity
The “Doctor No” Problem Is Changing the Face of Enterprise Security
The controversial "Doctor No" role in security operations highlights a shift from mere obstruction to strategic decision-making.
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
Cybersecurity
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.
Depthfirst Secures $80 Million for AI Security Expansion
Depthfirst secures Series B funding to enhance AI research, train security models, and boost enterprise adoption.
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
New malware named DeepLoad threatens cybersecurity by deploying a malicious browser extension and spreading via USB drives to steal credentials.
Hasbro Targeted in a Recent Cybersecurity Incident
Toy manufacturer Hasbro investigates potential data compromise following a cyberattack.
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Google addresses 21 vulnerabilities, including a zero-day in Chrome's Dawn component.
FBI Cautions on Security Threats from Chinese Mobile Applications
The FBI alerts users about data privacy issues connected to Chinese mobile applications, urging caution.
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
UK Government Allocates £630,000 for Digital Identity Card Discussion
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.
The “Doctor No” Problem Is Changing the Face of Enterprise Security
The controversial "Doctor No" role in security operations highlights a shift from mere obstruction to strategic decision-making.
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.
New Phishing Techniques Threaten TikTok Business Account Security
Cybercriminals use phishing tactics to hijack TikTok business accounts.
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
US and UK aim to strengthen maritime defense against underwater drones.
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
AFC Ajax confirms a significant data breach that exposed vulnerabilities in its internal systems, enabling unauthorized access.