Cyber Security
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
LexisNexis Data Breach Claimed by Fulcrumsec Group
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Madison Square Garden Cyber Incident Revealed Months Later
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
ShinyHunters Leak Exposes Millions of CarGurus User Records
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
Arkanix Stealer Malware Quickly Vanishes After Its Initial Launch
Microsoft Investigates Vanishing Mouse Pointer Bug in Classic Outlook
GitHub’s Dependabot is Under Fire for Alert Accuracy Issues
BeyondTrust RS and PRA Vulnerability Is Being Actively Exploited by Threat Actors
Microsoft Expands Data Loss Prevention Controls for Microsoft 365 Copilot
New Security Concerns Arise with the Proliferation of Internal LLMs
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
News
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
Cybersecurity
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.
Fake OpenClaw Installers on GitHub Are Stealing User Data
Cybersecurity
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Cybersecurity
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Cybersecurity
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Cybersecurity
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Cybersecurity
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
Cybersecurity
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
UMMC restores IT systems and electronic medical records access after a ransomware attack caused nine days of operational interruptions.
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
News
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
LastPass alerts users of phishing emails posing as security warnings to obtain master passwords.
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
News
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
Europol disables Tycoon2FA, a PhaaS platform responsible for tens of millions of phishing messages monthly.
LexisNexis Data Breach Claimed by Fulcrumsec Group
Cybersecurity
LexisNexis Data Breach Claimed by Fulcrumsec Group
LexisNexis confirms a breach in its Legal & Professional division using React2Shell, claiming 2 GB of stolen data.
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Cybersecurity
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women's Accounts
Cybersecurity
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
A 22-year-old from Alabama pleaded guilty to cyberstalking, extortion, and computer fraud after hijacking the social media accounts of hundreds of you...
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
News
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
Cybercriminals deploy fake Google security pages to harvest one-time passcodes and cryptocurrency wallet addresses.
Chrome's Gemini Live Feature Left Users Exposed to Malicious Extensions
Cybersecurity
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Cybersecurity
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Cybersecurity
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Cybersecurity
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Cybersecurity
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Cybersecurity
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
UMMC restores IT systems and electronic medical records access after a ransomware attack caused nine days of operational interruptions.
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
LastPass alerts users of phishing emails posing as security warnings to obtain master passwords.
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
Europol disables Tycoon2FA, a PhaaS platform responsible for tens of millions of phishing messages monthly.
LexisNexis Data Breach Claimed by Fulcrumsec Group
LexisNexis confirms a breach in its Legal & Professional division using React2Shell, claiming 2 GB of stolen data.
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
A 22-year-old from Alabama pleaded guilty to cyberstalking, extortion, and computer fraud after hijacking the social media accounts of hundreds of you...
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
Cybercriminals deploy fake Google security pages to harvest one-time passcodes and cryptocurrency wallet addresses.
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Madison Square Garden Cyber Incident Revealed Months Later
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.