Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Sedgwick Breach Raises Concerns Over Security of Government Data Transfers
Data Security
Sedgwick Breach Raises Concerns Over Security of Government Data Transfers
Hackers have targeted a file transfer system used by Sedgwick’s government-focused subsidiary. This breach raises concerns about the security of sensitive data managed by government ...
Brightspeed Experiences Large-Scale Data Breach Claimed by Crimson Collective
Cybersecurity
Brightspeed Experiences Large-Scale Data Breach Claimed by Crimson Collective
A substantial data breach at Brightspeed has been claimed by the hacking group Crimson Collective. They assert responsibility for stealing personal information from over one ...
The Trump Administration Lifts Sanctions With Implications for Spyware Distribution
Information Security
The Trump Administration Lifts Sanctions With Implications for Spyware Distribution
The Trump administration has lifted sanctions on three individuals linked to the Intellexa spyware consortium. This consortium is associated with the Predator surveillance tool, leading ...
AI Agents Emerge as a Significant Challenge for Cybersecurity by 2026
Cybersecurity
AI Agents Emerge as a Significant Challenge for Cybersecurity by 2026
AI agents are anticipated to become a notable insider threat by 2026, requiring firms to modify their security strategies, as a report from Palo Alto ...
ShinyHunters' Strategic Use of Decoy Accounts in Cyber Espionage
News
ShinyHunters’ Strategic Use of Decoy Accounts in Cyber Espionage
In September 2025, a significant development in the realm of cyber threats emerged with the activities of a hacker group ...
Trump Orders Emcore to Divest Chip Manufacturing Assets
Cybersecurity
Trump Orders Emcore to Divest Chip Manufacturing Assets
President Trump's recent decision mandates Emcore Corp. to divest its computer chip operation, underscoring a calculated effort to protect U.S. security interests. This article examines ...
France Probes AI-Generated Sexual Deepfakes Targeting Women and Teens
Cybersecurity
France Probes AI-Generated Sexual Deepfakes Targeting Women and Teens
The French authorities have launched an investigation into AI-generated sexually explicit deepfakes that altered images of hundreds of women and teenagers. Utilizing an AI tool ...
Adobe ColdFusion Cyberattacks Surge During Holiday Period
Application Security
Adobe ColdFusion Cyberattacks Surge During Holiday Period
GreyNoise detected a significant surge in attack attempts targeting Adobe ColdFusion vulnerabilities over Christmas 2025, revealing a coordinated effort exploiting multiple vulnerabilities in ColdFusion servers.
Phishing Campaign Targets Users with Google Cloud Application Exploitation
News
Phishing Campaign Targets Users with Google Cloud Application Exploitation
Recent phishing operations exploit Google Cloud Application Integration, sending fake Google emails that deceive users into trusting malicious messages.
Two US Cybersecurity Professionals Admit Guilt in Ransomware Schemes
News
Two US Cybersecurity Professionals Admit Guilt in Ransomware Schemes
Ryan Goldberg and Kevin Martin, two American cybersecurity professionals, have confessed to being affiliates of the notorious BlackCat/Alphv ransomware group. This revelation poses significant implications ...
Gavin Webb's Role in the Takedown of LockBit Ransomware
News
Gavin Webb’s Role in the Takedown of LockBit Ransomware
Recognized for his exemplary public service, Gavin Webb spearheaded the strategic takedown of the notorious LockBit ransomware, marking a significant achievement in global cybersecurity efforts.
British Security Researcher Earns Australia's Prestigious Visa for Vulnerability Discovery
Cybersecurity
British Security Researcher Earns Australia’s Prestigious Visa for Vulnerability Discovery
British security analyst Jacob Riggs has achieved Australia's strictest, invite-only visa for exposure of a critical vulnerability in its government system.
Ongoing Cryptocurrency Thefts Linked to 2022 LastPass Breach
Cybersecurity
Ongoing Cryptocurrency Thefts Linked to 2022 LastPass Breach
Blockchain investigation has revealed that recent cryptocurrency thefts are tied to the 2022 LastPass breach. Attackers laundered stolen funds through Russian exchanges, exploiting vulnerabilities exposed ...
Pickett and Associates Data Breach Hacker Demands Bitcoin
News
Pickett and Associates Data Breach: Hacker Demands Bitcoin
A cybercriminal is selling stolen data from Pickett and Associates, impacting major utilities like Tampa Electric, Duke Energy, and American Electric Power.
Netflix Documentary Could Explore Crypto Crime Part 2 Potential
Cybersecurity
Netflix Documentary Could Explore Crypto Crime: Part 2 Potential
Ilya Lichtenstein, linked to the 2016 Bitfinex bitcoin heist, has recently been released from prison after serving 14 months. Rumors suggest a Netflix documentary might ...
Covenant Health Ransomware Breach Impacts 478,000 Individuals Across Multiple States
News
Covenant Health Ransomware Breach Impacts 478,000 Individuals Across Multiple States
In May 2025, a ransomware attack by the Qilin group on Covenant Health compromised sensitive data of over 478,000 individuals at the healthcare organization located ...
OFAC Lifts Sanctions on Individuals Linked to Predator Spyware Consortium
Cybersecurity
OFAC Lifts Sanctions on Individuals Linked to Predator Spyware Consortium
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) recently took a significant action by removing Merom Harpaz, Andrea Nicola Constantino Hermes ...
Disney Agrees to $10 Million Settlement for COPPA Violations
Data Security
Disney Agrees to $10 Million Settlement for COPPA Violations
Disney has settled COPPA violation allegations with a $10 million penalty, addressing claims about mislabeling videos and improper data use in targeted advertising. The case ...
DarkSpectre's Third Wave A New Browser Extension Threat
News
DarkSpectre’s Third Wave: A New Browser Extension Threat
A new attack campaign codenamed DarkSpectre, attributed to a Chinese threat actor, has affected 2.2 million users across major web browsers. Leveraging two prior campaigns, ...
RondoDox Botnet Utilizes React2Shell Vulnerability to Infiltrate Servers
CVE Vulnerability Alerts
RondoDox Botnet Utilizes React2Shell Vulnerability to Infiltrate Servers
RondoDox is exploiting the React2Shell flaw in Next.js to gain remote code execution, deploy malware, and install cryptominers. The campaign highlights how unpatched web frameworks ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
AI Agents Emerge as a Significant Challenge for Cybersecurity by 2026
AI agents are anticipated to become a notable insider threat by 2026, requiring firms to modify their security strategies, as a report from Palo Alto ...
ShinyHunters’ Strategic Use of Decoy Accounts in Cyber Espionage
In September 2025, a significant development in the realm of cyber threats emerged with the activities of a hacker group known as the “ShinyHunters” or ...
Trump Orders Emcore to Divest Chip Manufacturing Assets
President Trump's recent decision mandates Emcore Corp. to divest its computer chip operation, underscoring a calculated effort to protect U.S. security interests. This article examines ...
France Probes AI-Generated Sexual Deepfakes Targeting Women and Teens
The French authorities have launched an investigation into AI-generated sexually explicit deepfakes that altered images of hundreds of women and teenagers. Utilizing an AI tool ...
Adobe ColdFusion Cyberattacks Surge During Holiday Period
GreyNoise detected a significant surge in attack attempts targeting Adobe ColdFusion vulnerabilities over Christmas 2025, revealing a coordinated effort exploiting multiple vulnerabilities in ColdFusion servers.
Phishing Campaign Targets Users with Google Cloud Application Exploitation
Recent phishing operations exploit Google Cloud Application Integration, sending fake Google emails that deceive users into trusting malicious messages.
Two US Cybersecurity Professionals Admit Guilt in Ransomware Schemes
Ryan Goldberg and Kevin Martin, two American cybersecurity professionals, have confessed to being affiliates of the notorious BlackCat/Alphv ransomware group. This revelation poses significant implications ...
Gavin Webb’s Role in the Takedown of LockBit Ransomware
Recognized for his exemplary public service, Gavin Webb spearheaded the strategic takedown of the notorious LockBit ransomware, marking a significant achievement in global cybersecurity efforts.
British Security Researcher Earns Australia’s Prestigious Visa for Vulnerability Discovery
British security analyst Jacob Riggs has achieved Australia's strictest, invite-only visa for exposure of a critical vulnerability in its government system.
Ongoing Cryptocurrency Thefts Linked to 2022 LastPass Breach
Blockchain investigation has revealed that recent cryptocurrency thefts are tied to the 2022 LastPass breach. Attackers laundered stolen funds through Russian exchanges, exploiting vulnerabilities exposed ...
Pickett and Associates Data Breach: Hacker Demands Bitcoin
A cybercriminal is selling stolen data from Pickett and Associates, impacting major utilities like Tampa Electric, Duke Energy, and American Electric Power.
Netflix Documentary Could Explore Crypto Crime: Part 2 Potential
Ilya Lichtenstein, linked to the 2016 Bitfinex bitcoin heist, has recently been released from prison after serving 14 months. Rumors suggest a Netflix documentary might ...
Covenant Health Ransomware Breach Impacts 478,000 Individuals Across Multiple States
In May 2025, a ransomware attack by the Qilin group on Covenant Health compromised sensitive data of over 478,000 individuals at the healthcare organization located ...
OFAC Lifts Sanctions on Individuals Linked to Predator Spyware Consortium
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) recently took a significant action by removing Merom Harpaz, Andrea Nicola Constantino Hermes ...
Disney Agrees to $10 Million Settlement for COPPA Violations
Disney has settled COPPA violation allegations with a $10 million penalty, addressing claims about mislabeling videos and improper data use in targeted advertising. The case ...
DarkSpectre’s Third Wave: A New Browser Extension Threat
A new attack campaign codenamed DarkSpectre, attributed to a Chinese threat actor, has affected 2.2 million users across major web browsers. Leveraging two prior campaigns, ...
RondoDox Botnet Utilizes React2Shell Vulnerability to Infiltrate Servers
RondoDox is exploiting the React2Shell flaw in Next.js to gain remote code execution, deploy malware, and install cryptominers. The campaign highlights how unpatched web frameworks ...
New Variant of Shai Hulud Malware Found in npm Registry
Cybersecurity experts uncover a new Shai Hulud malware strain in the npm registry, stressing the importance of vigilant security practices within open-source ecosystems.
Unleash Protocol Experiences a $3.9 Million Cryptocurrency Loss
Unleash Protocol has incurred a $3.9 million loss in cryptocurrency following an unauthorized contract upgrade that enabled asset withdrawals, exposing vulnerabilities within decentralized systems.
IBM Discloses Critical Security Vulnerability in API Connect
IBM has identified a critical vulnerability in its API Connect software, CVE-2025-13915, which allows attackers to bypass authentication and gain remote access. With a CVSS ...