Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
Blog
Cicada3301 Ransomware with New Linux Encryptor: A New Threat To VMware ESXi Systems
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has emerged, posing a significant threat to businesses worldwide. The group has already claimed 19 victims on its ...
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
News
1.7 Million People Hit in Massive Credit Card Data Breach: What to Do Now?
A major credit card data breach has impacted nearly 1.7 million individuals, raising concerns about the security of sensitive financial information.
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
Cybersecurity
PIXHELL Acoustic Attack: Leaking Secrets from LCD Screen Noise
A novel acoustic attack named ‘PIXHELL’ can leak secrets from audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.
Indodax Hack: A Major Blow to Indonesian Crypto Security
Cybersecurity
Indodax Hack: A Major Blow to Indonesian Crypto Security
Hackers targeted Indodax's hot wallet, which is a cryptocurrency wallet that is connected to the internet and used for frequent transactions.
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
Cybersecurity
LiteSpeed Cache Vulnerability Exposes 6 Million WordPress Sites to Takeover Attacks: A Critical Security Flaw
A critical severity vulnerability has been discovered in LiteSpeed Cache, a popular caching plugin used by over 6 million WordPress sites. The flaw, tracked as ...
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
News
Russian Military Hackers Linked to Critical Infrastructure Attacks: A Deep Dive into GRU Unit 29155
GRU Unit 29155: A Growing Threat to Global Security
This Week In Cybersecurity: 2nd September to 6th September, VK Data Leak Exposes 390 Million Users
Cybersecurity
This Week In Cybersecurity: 2nd September to 6th September, VK Data Leak Exposes 390 Million Users
VK Data Leak, Voldemort Malware Abusing Google Sheets, DICK’S Sporting Goods Cyberattack and more.
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
Cybersecurity
Critical Remote Code Execution Flaw in Progress LoadMaster: A 10/10 Severity Vulnerability
This vulnerability, tracked as CVE-2024-7591, allows attackers to remotely execute commands on vulnerable devices, posing a significant risk to organizations relying on these products.
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Security Spotlight
Avis Data Breach: Customer Data Stolen in Attack on Business Application
Car Rental Giant Avis Suffers Data Breach, Exposing Customer Information
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Blog
Ransomware Attacks Continue to Take a Major Toll on Critical Infrastructure Organizations
Ransomware attacks targeting critical national infrastructure (CNI) organizations have reached alarming heights, with costs soaring to unprecedented levels. A new ...
Clearview AI Fined €30.5 Million for Unlawful Data Collection
Cybersecurity
Clearview AI Fined €30.5 Million for Unlawful Data Collection
Dutch Data Protection Authority Takes Action Against Clearview AI Facial Recognition Company
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
News
VK Data Leak Exposes 390 Million Users: HikkI-Chan Strikes Again
HikkI-Chan Claims Responsibility for VK Data Breach
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
Cybersecurity
North Korean Hackers Target Job Seekers with Fake FreeConference App: Contagious Interview Campaign
North Korean threat actors, known for their sophisticated cyberattacks, have been targeting job seekers with a fake Windows video conferencing application disguised as FreeConference.com.
What are DDoS Attacks - A Complete Guide
Blog
What is a DDoS Attack – A Complete Guide
This comprehensive guide delves into the intricacies of DDoS attacks, their mechanisms, common types, and effective mitigation strategies, empowering enterprise businesses to safeguard their online ...
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
Cybersecurity
Verkada to Pay $2.95 Million for Security Failures Leading to Breaches
Security Camera Vendor Faces FTC Action for Lax Security Practices
CBIZ Discloses Data Breach Affecting Nearly 36,000 Individuals
News
CBIZ Discloses Data Breach Affecting Nearly 36,000 Individuals
CBIZ Benefits & Insurance Services (CBIZ), a leading provider of financial, benefits, and insurance services, has disclosed a data breach that impacted nearly 36,000 individuals
TfL Cyberattack: Transport for London Under Attack
News
TfL Cyberattack: Transport for London Under Attack
Transport for London (TfL), the city's transportation authority, is currently investigating an ongoing cyberattack. While the attack is ongoing, TfL has assured the public that ...
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
Cybersecurity
This Week in Cybersecurity: 26th August to 30th August, BlackSuit Ransomware Stole Data
BlackSuit Ransomware disrupts software vendor, Cyberattack on airport, nonprofit and government websites, credit union customers impacted by data breach.
DICK'S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
Cybersecurity
DICK’S Sporting Goods Cyberattack Shuts Down Email and Locks Employee Accounts
A Major Data Breach Impacts the Retail Giant DICK'S Sporting Goods in a Cyberattack
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
Cybersecurity
North Korean Hackers Exploit Chrome Zero-Day to Deploy Rootkit
North Korean hackers have successfully exploited a recently patched Google Chrome zero-day vulnerability (CVE-2024-7971) to deploy the FudModule rootkit.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Freddie Mac Data Breach: Social Security Numbers Compromised
Freddie Mac confirms a significant data breach exposing customer names and Social Security numbers. The extent of the breach and its cause remain under investigation. ...
Belgian Intelligence Service Breach: Chinese Hackers Under Investigation
Belgian authorities investigate a potential Chinese state-sponsored cyberattack on its State Security Service (VSSE), compromising sensitive data and emails between 2021 and 2023. The breach ...
Via Credit Union Data Breach Impacts Thousands: Indiana Credit Unions Face Cybersecurity Challenges
Via Credit Union suffered a significant data breach affecting over 60,000 members, exposing sensitive personal and financial data. Interra Credit Union also experienced a smaller ...
Angel One Data Leak: AWS Breach Exposes User Data
Angel One, a leading stockbroking firm, suffered a data leak. Unauthorized access to AWS resources exposed client data. An investigation is underway.
This Week In Cybersecurity: 24th February to 28th February
Explore the latest cybersecurity incidents, including the EncryptHub ransomware affecting 618 organizations, a Jasper network breach, and the $1.5 billion Bybit hack. Southern Water faced ...
State of Code Security in 2025: A Wiz Report Reveals Critical Vulnerabilities
Wiz's 2025 State of Code Security Report exposes alarming vulnerabilities in code repositories: 61% of organizations have secrets exposed in public repositories, leaving sensitive data ...
Serbian Police Exploit Cellebrite Zero-Day to Unlock Android Phones
Serbian authorities exploited Cellebrite's zero-day Android vulnerabilities (CVE-2024-53104, CVE-2024-53197, CVE-2024-50302) to unlock a phone, raising serious security concerns for enterprises.
Ransomware Groups Use BYOVD Attacks Exploiting Paragon Partition Manager Bug
Critical Paragon Partition Manager vulnerabilities are being exploited in BYOVD attacks, allowing ransomware gangs SYSTEM-level access and execution of malicious code. Urgent patching is advised. ...
Major Data Breach Exposes 33,000+ Users of Flat Earth Zodiac App
A significant data breach impacting the "Flat Earth Sun, Moon and Zodiac" mobile application has exposed the personal information of over 33,000 users. This incident ...
Akira Ransomware: The Extortion Ghost in a Shell
Akira has targeted a range of organizations, including universities (Stanford), major IT service providers (Tietoevry), and numerous businesses across various sectors. Critical infrastructure, including healthcare ...
9 Million Downloads, Now Banned: VSCode Extensions Under Fire
In a shocking move, Microsoft has banned the popular Material Theme – Free and Material Theme Icons – Free extensions from the Visual Studio Marketplace, ...
EncryptHub Ransomware and Infostealer Campaign Targets 618 Organizations Globally
EncryptHub Breach Affects 618 Organizations Hit Using Infostealers and Ransomware
Genea IVF Data Breach Claimed by Termite Ransomware Gang
Australian IVF provider Genea suffered a major data breach. The Termite ransomware gang stole 940GB of sensitive patient data. This includes medical histories, personal details, ...
Lazarus Group Stole $1.5 Billion in Bybit Hack by Exploiting a Safe{Wallet} Developer Machine
Lazarus hackers stole $1.5 billion from Bybit by compromising a Safe{Wallet} developer machine. The attack involved malicious JavaScript, highlighting vulnerabilities in multisig wallet platforms.
Black Basta Ransomware Costs Southern Water £4.5 Million
Southern Water reveals a £4.5 million cost from a Black Basta ransomware attack in February 2024. The attack, while not impacting operations, triggered significant expenses ...
Jasper Network Breach: City Investigates Cybersecurity Incident
Jasper, Alabama, is investigating a network security breach. Experts are working to determine the extent of the unauthorized access. No personal data is believed compromised.
Bybit’s $1.5 Billion Ether Theft: Analysis, investigation and finds
Bybit, a cryptocurrency exchange, experienced a massive security breach resulting in a $1.46 billion loss, the largest crypto hack in history. The attack involved social ...
GitVenom Malware Campaign Targets Crypto Users via GitHub
The GitVenom malware campaign uses hundreds of compromised GitHub repositories to distribute info-stealers, RATs, and clipboard hijackers, stealing cryptocurrency and credentials.
Auto-Color Linux Backdoor Malware Targets Governments and Universities
A new, highly evasive Auto-Color Linux backdoor targets North American and Asian governments and universities. The malware uses custom encryption and rootkit-like features for persistence.
Data Breach at DISA Impacts 3.3 Million Compromising Social Security Numbers and Financial Data
DISA Global Solutions, a US drug testing firm, suffered a data breach exposing the sensitive data of 3.3 million individuals. Social Security numbers and financial ...