Cyber Security
Cybersecurity
Italian University Struggles With Disruption After Cyberattack
Andrew Doyle
February 17, 2026
Rome’s La Sapienza University, a key academic institution in Italy, has been grappling with severe disruptions following a significant cyberattack on February 2. This attack ...
News
The Rise of TGR-STA-1030: The Global ‘Shadow Campaigns’ Targeting Government Infrastructure
Gabby Lee
February 17, 2026
A new cyberespionage group, TGR-STA-1030/UNC6619, known for its "Shadow Campaigns," has targeted government infrastructure in 155 countries, highlighting a new global threat landscape.
Cybersecurity
DKnife Toolkit: A Persistent Threat to Network Security
Andrew Doyle
February 17, 2026
DKnife is a powerful Linux-based toolkit used by cybercriminals to hijack router traffic, allowing them to monitor and manipulate data. Discovered by Cisco Talos, it ...
Cybersecurity
Lema AI Secures $24 Million to Bolster Supply Chain Security
Mitchell Langley
February 17, 2026
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Gabby Lee
February 17, 2026
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
News
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
Mitchell Langley
February 17, 2026
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Cybersecurity
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
Gabby Lee
February 17, 2026
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Cybersecurity
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
Andrew Doyle
February 17, 2026
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
Application Security
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Andrew Doyle
February 17, 2026
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Cybersecurity
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Mitchell Langley
February 17, 2026
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...
Cybersecurity
Vega Expands with $120 Million Series B Funding
Gabby Lee
February 17, 2026
Security analytics platform Vega has raised $120 million in a Series B funding round, bringing its total fundraising to $185 million. This latest investment highlights ...
Cybersecurity
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Andrew Doyle
February 17, 2026
Reco, a cloud security innovator, has secured $30 million in new funding, less than 10 months after its previous round. This investment increases its total ...
Cybersecurity
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
Mitchell Langley
February 17, 2026
Adobe has rolled out a new patch addressing 44 vulnerabilities across its suite of creative applications. These fixes aim to combat flaws in products like ...
Cybersecurity
European Commission Gives Nod to Google’s Acquisition of Wiz
Mitchell Langley
February 17, 2026
The European Commission has approved Google's $32 billion acquisition of cloud security firm Wiz. This decision followed extensive feedback from customers and rival vendors, signaling ...
Application Security
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Gabby Lee
February 17, 2026
Microsoft is addressing access issues impacting administrators of Microsoft 365 business and enterprise subscriptions. Some admins report being unable to access the admin center, with ...
News
Dutch Police Arrest Suspect in JokerOTP Phishing Tool Operation
Andrew Doyle
February 17, 2026
Authorities in the Netherlands have apprehended a suspect linked to the notorious JokerOTP, a phishing automation tool. This tool is notorious for hijacking accounts by ...
News
New Reynolds Ransomware Uses BYOVD Technique to Elude Detection
Mitchell Langley
February 17, 2026
Cybersecurity experts have discovered Reynolds ransomware, a new threat employing the Bring Your Own Vulnerable Driver (BYOVD) technique. This approach allows the ransomware to disable ...
Cybersecurity
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Gabby Lee
February 17, 2026
Nevada has developed a framework to classify data into "public," "sensitive," "confidential," and "restricted" categories, improving cybersecurity preparedness following a cyberattack.
Cybersecurity
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
Gabby Lee
February 17, 2026
Telecommunications companies may have had early alerts about the significant January Telnet vulnerability. An analysis reveals that unusual port filtering and traffic patterns might indicate ...
Cybersecurity
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
Andrew Doyle
February 17, 2026
GitGuardian, a leader in secrets detection, has successfully raised $50 million in a funding round. Learn how this financial boost aims to enhance their offerings ...
Cybersecurity
Italian University Struggles With Disruption After Cyberattack
Andrew Doyle
February 17, 2026
Cybersecurity
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Mitchell Langley
February 17, 2026
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Gabby Lee
February 17, 2026
News
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
Mitchell Langley
February 17, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
CISA Faces Challenges With Limited Resources Amid DHS Shutdown
Andrew Doyle
February 17, 2026
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Andrew Doyle
January 28, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Lema AI Secures $24 Million to Bolster Supply Chain Security
February 17, 2026
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
February 17, 2026
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
February 17, 2026
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
February 17, 2026
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
February 17, 2026
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
February 17, 2026
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
February 17, 2026
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...
Vega Expands with $120 Million Series B Funding
February 17, 2026
Security analytics platform Vega has raised $120 million in a Series B funding round, bringing its total fundraising to $185 million. This latest investment highlights ...
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
February 17, 2026
Reco, a cloud security innovator, has secured $30 million in new funding, less than 10 months after its previous round. This investment increases its total ...
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
February 17, 2026
Adobe has rolled out a new patch addressing 44 vulnerabilities across its suite of creative applications. These fixes aim to combat flaws in products like ...
European Commission Gives Nod to Google’s Acquisition of Wiz
February 17, 2026
The European Commission has approved Google's $32 billion acquisition of cloud security firm Wiz. This decision followed extensive feedback from customers and rival vendors, signaling ...
Microsoft Investigates Admin Center Access Issues in Microsoft 365
February 17, 2026
Microsoft is addressing access issues impacting administrators of Microsoft 365 business and enterprise subscriptions. Some admins report being unable to access the admin center, with ...
Dutch Police Arrest Suspect in JokerOTP Phishing Tool Operation
February 17, 2026
Authorities in the Netherlands have apprehended a suspect linked to the notorious JokerOTP, a phishing automation tool. This tool is notorious for hijacking accounts by ...
New Reynolds Ransomware Uses BYOVD Technique to Elude Detection
February 17, 2026
Cybersecurity experts have discovered Reynolds ransomware, a new threat employing the Bring Your Own Vulnerable Driver (BYOVD) technique. This approach allows the ransomware to disable ...
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
February 17, 2026
Nevada has developed a framework to classify data into "public," "sensitive," "confidential," and "restricted" categories, improving cybersecurity preparedness following a cyberattack.
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
February 17, 2026
Telecommunications companies may have had early alerts about the significant January Telnet vulnerability. An analysis reveals that unusual port filtering and traffic patterns might indicate ...
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
February 17, 2026
GitGuardian, a leader in secrets detection, has successfully raised $50 million in a funding round. Learn how this financial boost aims to enhance their offerings ...
Conduent Breach Expands in Scope, Affecting 25 Million: Impact on Volvo Group
February 17, 2026
Recent revelations show the Conduent data breach affects around 25 million individuals, considerably more than the initially estimated 10 million. The breach involves sensitive data, ...
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
February 17, 2026
Leveraging artificial intelligence, Zast.AI aims to advance the field of code security by implementing AI agents to effectively identify and verify software vulnerabilities, ensuring accuracy ...
New Malicious Packages in npm and PyPI Tied to Lazarus Group
February 17, 2026
Cybersecurity experts have uncovered malicious packages in the npm and PyPI registries, part of a recruitment-themed phishing campaign linked to the North Korean Lazarus Group.
























