Cyber Security
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Trent AI Emerges From Stealth With $13 Million in Funding
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Exchange Online Mailbox Access Issues Impact Outlook Users
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Free Android VPNs Are Quietly Working Against You
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Ticketmaster Data Breach Exposed North American Customers
Ticketmaster informed that the database breach affected some of its customers who purchased tickets to events in North America. The company is investigating the breach ...
Neiman Marcus Data Breach Compromises Personal Information of 64,000
Neiman Marcus Discloses Data Breach as Hacker Offers Stolen Customer Data for Sale
CISA’s CSAT Tool Hacked – Sensitive Data from Chemical Facilities Potentially Compromised
The Cybersecurity and Infrastructure Security Agency (CISA) recently disclosed that its Chemical Security Assessment Tool (CSAT) was hacked by malicious actors between January 23-26, 2024. ...
Levi’s Data Breach Exposes Personal Data of Over 72,000 Customers
The iconic American clothing brand pioneering in denim jeans has suffered a data breach that may have compromised personal information of over 72,000 Customers.
IRS Publicly Apologizes for Ken Griffin Tax Data Breach, Ken Griffin’s Data Leak Suit Ends in Settlement
Large-scale IRS tax data breach leads to a public apology from IRS. The Ken Griffin's Data Leak Suit has now ended up in settlement.
CDK Ransomware Attack Update: CDK Global Provides Update on Recovery Efforts
CDK Global, a leading provider of automotive retail software, has informed its dealer clients that systems impacted by a recent ransomware attack likely will not ...
Truist Bank Data Breach Confirmed After Data Shows Up on Hacking Forums
Truist Bank Confirms Cyberattack After Stolen Data Surfaces Online
The Ascension Hack: How an Honest Mistake of an Employee Resulted in One of the Biggest Data Breaches
Ascension, one of the largest healthcare networks in the United States, revealed that a ransomware attack in May 2024 was caused after an employee downloaded ...
Jollibee Data Breach Affects 32 Million Customers
Fast food giant Jollibee investigates cybersecurity incident reported to involve customer data
BlackSuit Ransomware Gang Behind Massive Cyber Attack on CDK Global
The BlackSuit Ransomware Group is Held Responsible for Ongoing Outages and Disruption at Automotive SaaS Provider
Kaspersky Antivirus Software Banned in the US Over National Security Concerns
US Bans Kaspersky to Safeguard National Security Over Alleged Ties of the Antivirus Company With Russia.
Apple Data Breach Claimed by IntelBroker: Source Code Allegedly Exposed
IntelBroker Claims to Have Gained Access to Internal Source Code Renowned threat actor IntelBroker has claimed responsibility for the Apple data breach targeting one of ...
Cyber Attack on CDK Global Impacts Thousands of US Car Dealerships
Car dealership management software provider CDK Global was hit by a significant cyberattack that forced the company to take its systems offline, severely impacting thousands ...
This Week in Cybersecurity: 17th June to 21st June, AMD Data Breach
Maxicare and AMD Data Breach, Cyber Attack on CDK, US Bans Kaspersky AMD Data Breach: Intelbroker Violates AMD Again and Releases Sensitive Data The hacking ...
Data Breach at Maxicare Philippines Exposed Personal Records of Thousands of Members
Maxicare Healthcare Corp, one of the largest health maintenance organizations (HMOs) in the Philippines, has reported a major data breach to the National Privacy Commission ...
AMD Data Breach: Intelbroker Violates AMD Again and Releases Sensitive Data
Hacking Group Intelbroker Claims Possession of Stolen AMD Data
Email Spoofing 101: Understanding the Basics and How to Protect Your Enterprise Data
Email address spoofing is a deception technique used in spam and phishing attacks. Spoofers manipulate email headers to disguise their real identity and trick recipients ...
Cybersecurity 101 for Enterprise Privacy and Protection
Imagine a single event bringing your business to a standstill. Lost revenue, damaged reputation, and a scramble to contain the fallout – this is the ...
How AI is Revolutionizing Phishing Attacks
Phishing attacks have long been a major concern for enterprise organizations wordwide. As technology continues to advance, cybercriminals are finding new and innovative ways to ...
Enterprise Attack Surface Management (ASM) and Best Security Practices
Imagine a sprawling digital castle, brimming with sensitive data and critical operations. Every door, window, and hidden passage represents a potential entry point for cybercriminals. ...