Cyber Security
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
MIT CSAIL’s 2025 AI Agent Index Puts System Transparency Under the Microscope
FBI Issues Warning on Escalating ATM Jackpotting Losses
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Human Error Remains One of the Biggest Threats to IT Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Figure Data Breach Exposes Nearly 1 Million User Records
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
DEF CON Bars Three Men Named in Epstein Documents
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Unveiling the Extent of Leaked API Keys in Front-End Applications
Microsoft Teams Service Outage Frustrates Users Worldwide
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
New Android Malware Identified in Device Firmware Raising Alarms
Italian University Struggles With Disruption After Cyberattack
Deutsche Bahn Hit by a Large-Scale DDoS Attack Disrupting Rail Services
Cybersecurity
Deutsche Bahn Hit by a Large-Scale DDoS Attack Disrupting Rail Services
Deutsche Bahn's services were disrupted by a DDoS attack, leading to significant travel complications across Germany's national rail network.
Snyk CEO Steps Down to Make Way for AI-Focused Leadership
Cybersecurity
Snyk CEO Steps Down to Make Way for AI-Focused Leadership
Snyk's CEO announces departure to align leadership with AI advancements in code review.
Advantest Cyberattack Sparks Fears of Employee and Client Data Exposure
Cybersecurity
Advantest Cyberattack Sparks Fears of Employee and Client Data Exposure
Advantest faces a ransomware attack, investigating potential data breach impact.
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Cybersecurity
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Discover how PromptSpy malware uses Gemini AI at runtime to analyze on-screen elements and maintain persistence on Android devices even after a reboot...
Ukrainian National Gets Five Years for Helping North Korean IT Workers Infiltrate U.S. Companies
News
Ukrainian National Gets Five Years for Helping North Korean IT Workers Infiltrate U.S. Companies
A Ukrainian hacker aided North Korea in infiltrating U.S. companies by providing stolen identities, resulting in a five-year prison sentence.
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Cybersecurity
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Former Google engineers indicted for allegedly stealing trade secrets and transferring sensitive data to unauthorized locations, including Iran.
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
Cybersecurity
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
Operation Red Card 2.0 led to 651 arrests and disrupted online scam networks in Africa.
MIT CSAIL's 2025 AI Agent Index Puts System Transparency Under the Microscope
Cybersecurity
MIT CSAIL’s 2025 AI Agent Index Puts System Transparency Under the Microscope
Academic researchers spotlighted the growing role and impact of AI agents across industries, raising critical questions about transparency, accountabi...
FBI Issues Warning on Escalating ATM Jackpotting Losses
Cybersecurity
FBI Issues Warning on Escalating ATM Jackpotting Losses
The FBI alerts the public on ATM jackpotting, reporting $20M losses and 1,900 incidents since 2020 in the U.S.
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Cybersecurity
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Windows Admin Center's security flaw, CVE-2026-26119, allowed privilege escalation vulnerabilities.
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
Cybersecurity
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
A newly identified Android malware strain that uses generative AI has raised concerns among cybersecurity researchers, though debate continues over wh...
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
OpenClaw wrestles with security gaps and misconfigurations, despite swift patches and OpenAI-backed foundation support.
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Cybersecurity
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Authorities in Africa arrested 651 suspects and reclaimed $4.3 million in joint fraud mitigation efforts.
Human Error Remains One of the Biggest Threats to IT Security
Blog
Human Error Remains One of the Biggest Threats to IT Security
Human errors remain a significant security risk even in systems with strong protocols.
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Application Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Massiv Android banking trojan, disguised as an IPTV app, targets users in southern Europe.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CVE Vulnerability Alerts
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Cybersecurity
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
UK demands quick removal of non-consensual images, equating them with terror content.
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Cybersecurity
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Venice Security, formerly known as Valkyrie, has secured $33 million in funding to enhance its Privileged Access Management solutions.
Figure Data Breach Exposes Nearly 1 Million User Records
Cybersecurity
Figure Data Breach Exposes Nearly 1 Million User Records
Blockchain lender Figure confirms data breach with over 2GB of user information leaked by ShinyHunters.
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
News
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
Hackers target tech, manufacturing, and finance sectors using device code phishing and vishing in OAuth 2.0 abuse campaigns.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Discover how PromptSpy malware uses Gemini AI at runtime to analyze on-screen elements and maintain persistence on Android devices even after a reboot...
Ukrainian National Gets Five Years for Helping North Korean IT Workers Infiltrate U.S. Companies
A Ukrainian hacker aided North Korea in infiltrating U.S. companies by providing stolen identities, resulting in a five-year prison sentence.
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Former Google engineers indicted for allegedly stealing trade secrets and transferring sensitive data to unauthorized locations, including Iran.
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
Operation Red Card 2.0 led to 651 arrests and disrupted online scam networks in Africa.
MIT CSAIL’s 2025 AI Agent Index Puts System Transparency Under the Microscope
Academic researchers spotlighted the growing role and impact of AI agents across industries, raising critical questions about transparency, accountabi...
FBI Issues Warning on Escalating ATM Jackpotting Losses
The FBI alerts the public on ATM jackpotting, reporting $20M losses and 1,900 incidents since 2020 in the U.S.
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Windows Admin Center's security flaw, CVE-2026-26119, allowed privilege escalation vulnerabilities.
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
A newly identified Android malware strain that uses generative AI has raised concerns among cybersecurity researchers, though debate continues over wh...
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
OpenClaw wrestles with security gaps and misconfigurations, despite swift patches and OpenAI-backed foundation support.
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Authorities in Africa arrested 651 suspects and reclaimed $4.3 million in joint fraud mitigation efforts.
Human Error Remains One of the Biggest Threats to IT Security
Human errors remain a significant security risk even in systems with strong protocols.
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
Massiv Android banking trojan, disguised as an IPTV app, targets users in southern Europe.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
UK demands quick removal of non-consensual images, equating them with terror content.
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Venice Security, formerly known as Valkyrie, has secured $33 million in funding to enhance its Privileged Access Management solutions.
Figure Data Breach Exposes Nearly 1 Million User Records
Blockchain lender Figure confirms data breach with over 2GB of user information leaked by ShinyHunters.
Cybercriminals Exploit OAuth 2.0 Device Authorization Flow in Vishing Campaigns
Hackers target tech, manufacturing, and finance sectors using device code phishing and vishing in OAuth 2.0 abuse campaigns.
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Texas accuses TP-Link of falsely advertising its routers' security, allowing Chinese state-backed hackers to exploit firmware vulnerabilities and acce...
DEF CON Bars Three Men Named in Epstein Documents
DEF CON bans three men linked to Epstein files, raising important questions about ethics and attendee policies at major cybersecurity conferences.
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Surge in Ivanti zero-day vulnerability exploits traced back to July 2025.