Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Critical Patch Alert MongoDB Urges Immediate Update to Prevent RCE Attack
Application Security
Critical Patch Alert: MongoDB Urges Immediate Update to Prevent RCE Attacks
MongoDB has issued an urgent advisory for IT admins to rapidly patch a high-severity vulnerability allowing potential remote code execution (RCE) attacks on susceptible servers. ...
Italy's AGCM Fines Apple €98.6 Million Over Alleged App Tracking Transparency Misuse
Cybersecurity
Italy’s AGCM Fines Apple €98.6 Million Over Alleged App Tracking Transparency Misuse
Italy's competition authority, AGCM, has fined Apple €98.6 million for allegedly abusing its dominant market position with the App Tracking Transparency framework.
Passwd Offers Secure Credential Management for Google Workspace Users
Application Security
Passwd Offers Secure Credential Management for Google Workspace Users
Passwd provides a secure credential management platform designed exclusively for businesses using Google Workspace, emphasizing integration, controlled sharing, and practicality.
Operation Sentinel INTERPOL's Comprehensive Cybercrime Crackdown Across Africa
Cybersecurity
Operation Sentinel: INTERPOL’s Comprehensive Cybercrime Crackdown Across Africa
INTERPOL's Operation Sentinel culminated in the arrest of 574 suspects and the recovery of $3 million. The operation involved collaboration with 19 countries to target ...
Feds Seize Database Targeting $28 Million Bank Account Theft
News
Feds Seize Database Targeting $28 Million Bank Account Theft
Authorities took significant action by seizing a password database used in a phishing attack that attempted a $28 million bank heist. This article delves into ...
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Cybersecurity
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
WebRAT Malware Utilizing GitHub for Malicious Distribution
Cybersecurity
WebRAT Malware Utilizing GitHub for Malicious Distribution
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
n8n Automation Platform Faces Severe Security Issue
Application Security
n8n Automation Platform Faces Severe Security Issue
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Dangerous Chrome Extensions Phantom Shuttle Targets Sensitive Data
Application Security
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
French National Postal Service Disruption Affects Millions of Users
Cybersecurity
French National Postal Service Disruption Affects Millions of Users
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Nissan Cyberattack Hackers Compromise Red Hat GitLab Instances
Data Security
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Cybersecurity
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Anna’s Archive Takes a Stand on Music Preservation
Data Security
Anna’s Archive Takes a Stand on Music Preservation
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Cybersecurity
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Cybersecurity
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
Cybersecurity
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
News
MacSync Malware Distributed via Signed Swift Application
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
Information Security
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
News
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Operation Sentinel: INTERPOL’s Comprehensive Cybercrime Crackdown Across Africa
INTERPOL's Operation Sentinel culminated in the arrest of 574 suspects and the recovery of $3 million. The operation involved collaboration with 19 countries to target ...
Feds Seize Database Targeting $28 Million Bank Account Theft
Authorities took significant action by seizing a password database used in a phishing attack that attempted a $28 million bank heist. This article delves into ...
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
WebRAT Malware Utilizing GitHub for Malicious Distribution
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
n8n Automation Platform Faces Severe Security Issue
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
French National Postal Service Disruption Affects Millions of Users
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Anna’s Archive Takes a Stand on Music Preservation
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...