
Critical Vulnerability in JavaScript Cryptography Library Poses Security Risk
A flaw in ‘node-forge,’ a widely-used cryptography library, allows attackers to craft valid-looking data, bypassing signature verification. Regular updates are

A flaw in ‘node-forge,’ a widely-used cryptography library, allows attackers to craft valid-looking data, bypassing signature verification. Regular updates are

The ShadowV2, a new Mirai-based botnet, threatens IoT security by exploiting known vulnerabilities in devices from D-Link, TP-Link, and other

Comcast agrees to pay a $1.5 million fine to the Federal Communications Commission after a data breach by a vendor

A U.S. civil engineering firm’s security was compromised by RomCom malware in September 2025. Researchers at Arctic Wolf Labs discovered

The Shai-Hulud supply chain attack has advanced to the Maven ecosystem, compromising over 830 packages in the npm registry. It

ShadowV2, a Mirai-based botnet, exploited last October’s AWS outage to infect IoT devices worldwide. Experts at Fortinet highlight this event

South Korea’s financial sector has recently been hit by a sophisticated supply chain attack involving the deployment of Qilin ransomware.

CodeRED’s emergency alert system in several US towns faces a severe interruption following a cyberattack on its provider. Authorities grapple

Recent Windows updates have led to unexpected PIN prompts for users utilizing FIDO2 security keys. Microsoft identifies the issue affecting

Multiple London councils, including Kensington & Chelsea and Westminster, are grappling with a cyberattack that potentially compromised resident data. Authorities
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.