Cyber Security
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Anthropic Accidentally Leaked Source Code for Claude Code
Depthfirst Secures $80 Million for AI Security Expansion
Hasbro Targeted in a Recent Cybersecurity Incident
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
FBI Cautions on Security Threats from Chinese Mobile Applications
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
UK Government Allocates £630,000 for Digital Identity Card Discussion
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
The “Doctor No” Problem Is Changing the Face of Enterprise Security
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Infinity Stealer Malware Takes Aim at macOS Systems
Iranian Hackers Breach FBI Director’s Personal Email Account
European Commission Responds to Cloud Infrastructure Cyberattack
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

Podcasts

Sorry, we couldn't find any posts. Please try a different search.

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
First American Financial Hacked: Takes IT Systems Offline to Contain the Breach
First American Financial Corporation, the second-largest and one of the very first American title insurance companies in the US, has taken certain systems offline today ...
How to Conduct a Cybersecurity Risk Assessment: Step-by-Step Guide
In today’s digital landscape, cybersecurity is a top concern for organizations of all sizes. As cyber threats continue to evolve and become more sophisticated, businesses ...
Enhance Your Email Security: 15 Best Email Security Practices for 2024
Securing emails is crucial for enterprises due to various compelling reasons, which is why they need robust email security. Given that emails serve as a ...
OilRig APT Uses Downloader Malware for Cyberespionage
Iranian state-sponsored threat actor OilRig, also known as APT34, continued its cyber espionage endeavors throughout 2022, deploying three distinctive downloader malware—ODAgent, OilCheck, and OilBooster. Slovak ...
Spear Phishing vs Phishing: How Do Spear Phishing Attacks Differ from Standard Phishing Attacks?
In today’s digital landscape, where communication is predominantly virtual, the threat of phishing attacks—especially spear phishing—has escalated. Phishing refers to the deceptive practice of sending ...
Spider-Man Developer Insomniac Games Hit by Rhysida Ransomware
Since its emergence in May 2023, Rhysida ransomware has gained notoriety as an emerging threat actor in the cybercrime landscape. The latest target of this ...
Toyota Cyberattack: Medusa Ransomware Strikes Toyota, Customer Data Compromised
Toyota Financial Services (TFS), a subsidiary of Toyota Motor Corporation, faces the aftermath of a cyberattack, courtesy of the Medusa ransomware group. The breach, detected ...
Canadian Government’s Data Security Compromised Affecting its Contractors
In a recent cybersecurity incident, the Canadian government has reported that two of its contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & ...
Microsoft Exchange Zero-Day Exploit: Experts Say Mitigation isn’t Enough
Microsoft has shared mitigations for two new Microsoft Exchange zero-day elevation of privelege vulnerability, tracked as CVE-2022-41040, and remote execution vulnerability (CVE-2022-41082). However, security researchers ...