Cyber Security
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Unveiling the Extent of Leaked API Keys in Front-End Applications
Microsoft Teams Service Outage Frustrates Users Worldwide
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
New Android Malware Identified in Device Firmware Raising Alarms
Italian University Struggles With Disruption After Cyberattack
DKnife Toolkit: A Persistent Threat to Network Security
Lema AI Secures $24 Million to Bolster Supply Chain Security
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Vega Expands with $120 Million Series B Funding
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
European Commission Gives Nod to Google’s Acquisition of Wiz
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
Conduent Breach Expands in Scope, Affecting 25 Million: Impact on Volvo Group
New Malicious Packages in npm and PyPI Tied to Lazarus Group
DavaIndia Security Breach Exposed Critical System Control
Cloud-Based Password Managers Face New Security Vulnerabilities
South Korean Fine Imposed on Dior, Louis Vuitton, and Tiffany Following Salesforce Breach
Odido Faces Cybersecurity Breach Threatening Customer Data
Germany Warns of Phishing Threats via Signal Targeting High-profile Individuals
News
Germany Warns of Phishing Threats via Signal Targeting High-Profile Individuals
Germany's cyber authorities have alerted citizens about a sophisticated phishing attack using Signal. High-ranking officials, journalists, and politicians are prime targets. This advisory emphasizes the ...
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybersecurity
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Chinese state-backed hackers have been identified exploiting a Dell security flaw in a series of zero-day attacks since mid-2024. These attacks underline concerns regarding the ...
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Cybersecurity
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
Cybercriminals replicated a legitimate Oura MCP server in a deceptive campaign to distribute StealC malware. STAR Labs discovered the SmartLoader operation, presenting crucial cybersecurity insights.
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Cybersecurity
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Notepad++ Bolsters Security With New Double-lock Update System
Application Security
Notepad++ Bolsters Security With New Double-lock Update System
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
AI Assistants as Covert C2 Tools Implications for Enterprise Security
Cybersecurity
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Unveiling the Extent of Leaked API Keys in Front-End Applications
Cybersecurity
Unveiling the Extent of Leaked API Keys in Front-End Applications
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.
Microsoft Teams Service Outage Frustrates Users Worldwide
Application Security
Microsoft Teams Service Outage Frustrates Users Worldwide
Microsoft Teams has been experiencing an ongoing outage worldwide that has led to significant delays and access issues. Users are frustrated by these disruptions, with ...
Polish Authorities Detain Suspected Phobos Ransomware Operative
News
Polish Authorities Detain Suspected Phobos Ransomware Operative
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Cybersecurity
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Hackers claim to have stolen millions of Eurail user records and are reportedly offering these for sale. Eurail is currently trying to gauge the breach's ...
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Cybersecurity
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
New research details the growing misuse of APIs by attackers leveraging machine speed and AI capabilities. Enhanced API attacks increase exposure and amplify impact, indicating ...
Allegations of Data Violations by Lenovo US Law Firm Raises Concerns
Cybersecurity
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
Lenovo is under scrutiny as a US law firm alleges the company breached DOJ guidelines concerning data transfers to foreign adversaries, specifically China. Lenovo has ...
New Android Malware Identified in Device Firmware Raising Alarms
Cybersecurity
New Android Malware Identified in Device Firmware Raising Alarms
Android malware known as Keenadu has been discovered within the firmware of various brands, enabling it to breach installed apps and seize control of affected ...
Italian University Struggles With Disruption After Cyberattack
Cybersecurity
Italian University Struggles With Disruption After Cyberattack
Rome’s La Sapienza University, a key academic institution in Italy, has been grappling with severe disruptions following a significant cyberattack on February 2. This attack ...
The Rise of TGR-STA-1030 The Global 'Shadow Campaigns' Targeting Government Infrastructure
News
The Rise of TGR-STA-1030: The Global ‘Shadow Campaigns’ Targeting Government Infrastructure
A new cyberespionage group, TGR-STA-1030/UNC6619, known for its "Shadow Campaigns," has targeted government infrastructure in 155 countries, highlighting a new global threat landscape.
DKnife Toolkit A Persistent Threat to Network Security
Cybersecurity
DKnife Toolkit: A Persistent Threat to Network Security
DKnife is a powerful Linux-based toolkit used by cybercriminals to hijack router traffic, allowing them to monitor and manipulate data. Discovered by Cisco Talos, it ...
Lema AI Secures $24 Million to Bolster Supply Chain Security
Cybersecurity
Lema AI Secures $24 Million to Bolster Supply Chain Security
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Warlock Ransomware Gang Breach at SmarterTools Email System Compromised
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
News
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Outtake's $40 Million Infusion to Battle AI-Powered Cyber Threats
Cybersecurity
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
VulnCheck, a company specializing in vulnerability intelligence, has successfully raised $25 million in a Series B funding round. The investment, led by Sorenson Capital, demonstrates ...
Notepad++ Bolsters Security With New Double-lock Update System
After a recent supply-chain attack, Notepad++ has revamped its update mechanism with a double-lock design. This new approach is intended to tighten security and prevent ...
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Cybersecurity experts have found methods to transform AI assistants with web capabilities into covert command-and-control (C2) tools. Such exploits could let attackers mask their activities ...
Unveiling the Extent of Leaked API Keys in Front-End Applications
Intruder's comprehensive scan of JavaScript bundles across 5 million applications reveals a staggering number of exposed API keys, uncovering a critical security threat.
Microsoft Teams Service Outage Frustrates Users Worldwide
Microsoft Teams has been experiencing an ongoing outage worldwide that has led to significant delays and access issues. Users are frustrated by these disruptions, with ...
Polish Authorities Detain Suspected Phobos Ransomware Operative
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Hackers claim to have stolen millions of Eurail user records and are reportedly offering these for sale. Eurail is currently trying to gauge the breach's ...
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
New research details the growing misuse of APIs by attackers leveraging machine speed and AI capabilities. Enhanced API attacks increase exposure and amplify impact, indicating ...
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
Lenovo is under scrutiny as a US law firm alleges the company breached DOJ guidelines concerning data transfers to foreign adversaries, specifically China. Lenovo has ...
New Android Malware Identified in Device Firmware Raising Alarms
Android malware known as Keenadu has been discovered within the firmware of various brands, enabling it to breach installed apps and seize control of affected ...
Italian University Struggles With Disruption After Cyberattack
Rome’s La Sapienza University, a key academic institution in Italy, has been grappling with severe disruptions following a significant cyberattack on February 2. This attack ...
The Rise of TGR-STA-1030: The Global ‘Shadow Campaigns’ Targeting Government Infrastructure
A new cyberespionage group, TGR-STA-1030/UNC6619, known for its "Shadow Campaigns," has targeted government infrastructure in 155 countries, highlighting a new global threat landscape.
DKnife Toolkit: A Persistent Threat to Network Security
DKnife is a powerful Linux-based toolkit used by cybercriminals to hijack router traffic, allowing them to monitor and manipulate data. Discovered by Cisco Talos, it ...
Lema AI Secures $24 Million to Bolster Supply Chain Security
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...