Cyber Security
Cybersecurity
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Andrew Doyle
March 2, 2026
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.
Cybersecurity
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Gabby Lee
March 2, 2026
Hackers used Claude Code to infiltrate Mexican government systems, exfiltrating 150GB of sensitive data using AI-assisted exploits and automated theft...
Cybersecurity
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
Mitchell Langley
March 2, 2026
ShinyHunters group exposes a significant data breach at Odido, shaking the Dutch telecommunications sector.
Blog
How Safety Technology Is Transforming Workplace Protection
Gabby Lee
March 1, 2026
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive ...
Cybersecurity
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
Mitchell Langley
February 25, 2026
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
Cybersecurity
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
Gabby Lee
February 25, 2026
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
Cybersecurity
ShinyHunters Leak Exposes Millions of CarGurus User Records
Gabby Lee
February 25, 2026
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
Cybersecurity
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
Mitchell Langley
February 25, 2026
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
Cybersecurity
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Andrew Doyle
February 25, 2026
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.
News
Lazarus Group Expands Its Ransomware Arsenal with Medusa
Andrew Doyle
February 25, 2026
North Korea's Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.
News
Optimizely Suffers a Data Breach Through a Voice Phishing Attack
Andrew Doyle
February 25, 2026
Optimizely has reported a data breach caused by a voice phishing attack, compromising customer data.
Application Security
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
Gabby Lee
February 25, 2026
New cryptojacking campaign uses pirated software to deliver XMRig miner payloads onto hosts.
Cybersecurity
Arkanix Stealer Malware Quickly Vanishes After Its Initial Launch
Mitchell Langley
February 25, 2026
The newly launched Arkanix Stealer malware vanished shortly after targeting sensitive system and browser data.
Application Security
Microsoft Investigates Vanishing Mouse Pointer Bug in Classic Outlook
Mitchell Langley
February 25, 2026
Microsoft investigates an issue causing Outlook's mouse pointer to disappear for some users.
Application Security
GitHub’s Dependabot is Under Fire for Alert Accuracy Issues
Gabby Lee
February 25, 2026
A Go library maintainer questions the effectiveness of GitHub's Dependabot due to alert fatigue from inaccurate dependency-scanning alerts.
Cybersecurity
BeyondTrust RS and PRA Vulnerability Is Being Actively Exploited by Threat Actors
Gabby Lee
February 25, 2026
Attackers exploit CVE-2026-1731 in BeyondTrust RS and PRA, leveraging VShell for persistence, lateral movement, and system control.
Cybersecurity
Microsoft Expands Data Loss Prevention Controls for Microsoft 365 Copilot
Andrew Doyle
February 25, 2026
Microsoft expands data loss prevention (DLP) controls to block Microsoft 365 Copilot from accessing and processing confidential Word, Excel, and Power...
Cybersecurity
New Security Concerns Arise with the Proliferation of Internal LLMs
Mitchell Langley
February 25, 2026
As organizations implement LLMs, security concerns shift to the infrastructure.
Application Security
Cybercriminal Group Exploits Hundreds of FortiGate Firewalls Using Off-the-Shelf AI Tools
Gabby Lee
February 24, 2026
A cybercrime group used off-the-shelf AI tools to target FortiGate firewalls in 55 countries.
Cybersecurity
Ring Bets $10,000 That Nobody Can Hack Its Local Streaming Feature
Andrew Doyle
February 24, 2026
Ring offers $10,000 for finding security flaws in its new local streaming feature. The company's goal is to limit video access to device owners' trust...
Cybersecurity
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Andrew Doyle
March 2, 2026
Cybersecurity
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Andrew Doyle
March 2, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Andrew Doyle
February 19, 2026
Cybersecurity
CISA Faces Challenges With Limited Resources Amid DHS Shutdown
Andrew Doyle
February 17, 2026
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
How Safety Technology Is Transforming Workplace Protection
March 1, 2026
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive one is creating new demand ...
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
February 25, 2026
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
February 25, 2026
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
February 25, 2026
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
February 25, 2026
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
ShinyHunters Leak Exposes Millions of CarGurus User Records
February 25, 2026
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
Lazarus Group Expands Its Ransomware Arsenal with Medusa
February 25, 2026
North Korea's Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.
Optimizely Suffers a Data Breach Through a Voice Phishing Attack
February 25, 2026
Optimizely has reported a data breach caused by a voice phishing attack, compromising customer data.
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
February 25, 2026
New cryptojacking campaign uses pirated software to deliver XMRig miner payloads onto hosts.
Arkanix Stealer Malware Quickly Vanishes After Its Initial Launch
February 25, 2026
The newly launched Arkanix Stealer malware vanished shortly after targeting sensitive system and browser data.
Microsoft Investigates Vanishing Mouse Pointer Bug in Classic Outlook
February 25, 2026
Microsoft investigates an issue causing Outlook's mouse pointer to disappear for some users.
GitHub’s Dependabot is Under Fire for Alert Accuracy Issues
February 25, 2026
A Go library maintainer questions the effectiveness of GitHub's Dependabot due to alert fatigue from inaccurate dependency-scanning alerts.
BeyondTrust RS and PRA Vulnerability Is Being Actively Exploited by Threat Actors
February 25, 2026
Attackers exploit CVE-2026-1731 in BeyondTrust RS and PRA, leveraging VShell for persistence, lateral movement, and system control.
Microsoft Expands Data Loss Prevention Controls for Microsoft 365 Copilot
February 25, 2026
Microsoft expands data loss prevention (DLP) controls to block Microsoft 365 Copilot from accessing and processing confidential Word, Excel, and Power...
New Security Concerns Arise with the Proliferation of Internal LLMs
February 25, 2026
As organizations implement LLMs, security concerns shift to the infrastructure.
Cybercriminal Group Exploits Hundreds of FortiGate Firewalls Using Off-the-Shelf AI Tools
February 24, 2026
A cybercrime group used off-the-shelf AI tools to target FortiGate firewalls in 55 countries.
Ring Bets $10,000 That Nobody Can Hack Its Local Streaming Feature
February 24, 2026
Ring offers $10,000 for finding security flaws in its new local streaming feature. The company's goal is to limit video access to device owners' trust...
Romanian Hacker Admits to Selling Oregon State Network Access in Court
February 23, 2026
A Romanian hacker pleads guilty to selling digital access to a US state office network.
Privacy Groups Demand Compliance From Generative AI Image Creators
February 23, 2026
Privacy watchdogs insist generative AI makers adhere to data protection laws.
Spanish Hacker Arrested for Booking Luxury Hotel Rooms for One Cent
February 23, 2026
Spanish police apprehended a hacker for booking luxury rooms for €0.01 each through an exploited payment system.

























