Cyber Security
Application Security
OpenAI Upgrades GPT-5 to Better Handle Conversations Involving Emotional Distress
Mitchell Langley
October 30, 2025
OpenAI’s October GPT-4 update improves how the model handles emotionally charged conversations. The upgrade enhances safety, empathy, and redirection for users expressing distress while reducing ...
Application Security
Surge in NFC Relay Malware Hits Android Users Across Eastern Europe
Andrew Doyle
October 30, 2025
Over 760 malicious Android apps are exploiting NFC tap-to-pay features to steal payment credentials in real time. The surge in NFC relay malware highlights rising ...
Application Security
Conduent Discloses Data Breach Impacting 10.5 Million Individuals
Mitchell Langley
October 30, 2025
A data breach at Conduent has exposed personal and medical information of over 10.5 million people through the MOVEit vulnerability, underscoring the massive risks of ...
Cybersecurity
Proton Launches Dark Web Data Breach Observatory to Expose Hidden Cyber Threats
Gabby Lee
October 30, 2025
Proton launched its Data Breach Observatory to detect and report dark web data exposures, providing real-time alerts and insights to help organizations prevent and mitigate ...
Cybersecurity
PhantomRaven Campaign Exploits AI Package Suggestions to Get into Developer Systems
Gabby Lee
October 30, 2025
The PhantomRaven campaign weaponized AI-generated package names to distribute malicious npm modules, stealing developer credentials and CI/CD tokens in a stealthy software supply chain attack.
Cybersecurity
Canada Confirms Hacktivist Breaches Targeting Water and Energy Infrastructure
Andrew Doyle
October 30, 2025
Canadian authorities revealed multiple hacktivist intrusions into water, energy, and agricultural systems, manipulating industrial controls in opportunistic attacks that risked operational safety but aimed mainly ...
Cybersecurity
Ribbon Communications Breach Linked to Foreign State Hackers, Exposing Telecom Supply Chains
Mitchell Langley
October 30, 2025
Nation-state hackers breached U.S. telecom provider Ribbon Communications, maintaining covert access for nearly a year and exposing sensitive customer data in a targeted cyberespionage campaign.
Application Security
WordPress Security Plugin Vulnerability Exposes Private Server Files to Site Subscribers
Gabby Lee
October 30, 2025
A flaw in the Anti-Malware Security and Brute-Force Firewall plugin let WordPress subscribers access private server files, prompting urgent updates to prevent data exposure.
Cybersecurity
Phoenix Contact UPS Vulnerabilities: Critical Flaws May Cause Denial-of-Service
Andrew Doyle
October 30, 2025
Critical flaws in Phoenix Contact’s QUINT4 UPS devices could let attackers shut down power or steal credentials. One unpatched Modbus flaw risks remote “power denial” ...
Cybersecurity
Fuji Electric HMI Configurator Flaws: Industrial Software Vulnerabilities Expose Hack Risks
Gabby Lee
October 30, 2025
Fuji Electric’s Monitouch V-SFT, Tellus Lite V-Simulator, and V-Server Lite tools contain critical flaws (CVE-2024-11787, others) enabling remote code execution. CISA urges urgent patching.
Cybersecurity
Atroposia Malware Now Comes With Built-In Local Vulnerability Scanner
Mitchell Langley
October 29, 2025
Atroposia is a newly surfaced malware-as-a-service kit that integrates remote access, credential theft and a built-in vulnerability scanner, enabling low-skill attackers to execute advanced campaigns.
Endpoint Security
TEE.Fail Attack Undermines Confidential Computing on Intel, AMD, and NVIDIA CPUs
Gabby Lee
October 29, 2025
The TEE.Fail side-channel attack allows extraction of cryptographic keys from Intel SGX, AMD SEV-SNP and NVIDIA GPU confidential environments via low-cost DDR5 memory bus interposers.
CVE Vulnerability Alerts
CISA Alerts to Actively Exploited Vulnerabilities in DELMIA Apriso by Dassault Systèmes
Mitchell Langley
October 29, 2025
CISA warns that two vulnerabilities in DELMIA Apriso (CVE-2025-6204 and CVE-2025-6205) are under active exploitation, urging immediate patching across manufacturing operations.
Application Security
Microsoft Faces Lawsuit Over Misleading Customers Into Copilot-Enhanced Microsoft 365 Subscriptions
Gabby Lee
October 29, 2025
The Australian regulator alleges Microsoft misled 2.7 million consumers into Copilot-integrated Microsoft 365 plans by concealing a cheaper Classic tier, prompting legal action and potential ...
Cybersecurity
Qilin Ransomware Leverages WSL to Deploy Linux Encryptors on Windows Systems
Andrew Doyle
October 29, 2025
Qilin ransomware now exploits the Windows Subsystem for Linux to deploy Linux encryptors on Windows hosts, blending BYOVD attacks and remote-management tools for stealth/
Cybersecurity
Dentsu Confirms Data Breach Exposing Employee Payroll and Personal Information
Mitchell Langley
October 29, 2025
Dentsu has confirmed a cyberattack on its UK operations via Merkle’s servers, exposing employee payroll and personal details, raising identity theft and phishing concerns.
Cybersecurity
Palo Alto Networks Unveils AI Security Suite: Cortex Cloud 2.0 & Prisma AIRS 2.0 Launched
Gabby Lee
October 29, 2025
Palo Alto Networks has launched Cortex Cloud 2.0 and Prisma AIRS 2.0—AI-driven platforms for cloud and AI application security. Combining automation, real-time threat detection, and ...
Cybersecurity
Italian Spyware Vendor Linked to Chrome Zero-Day Attacks
Andrew Doyle
October 28, 2025
An Italian spyware vendor has been linked to Google Chrome zero-day attacks targeting Android and Windows users, exploiting CVE-2025-1234 to deliver advanced surveillance tools globally.
Cybersecurity
QNAP Warns Windows Backup Software Impacted by ASP.NET Flaw
Mitchell Langley
October 28, 2025
QNAP warned that its Windows-based NetBak Replicator backup software is vulnerable to the critical ASP.NET flaw CVE-2024-43491, urging users to apply Microsoft’s latest security patches ...
Cybersecurity
NCX Exchange Data Leak Exposes User Wallets, Passwords, and Authentication Keys
Andrew Doyle
October 28, 2025
NCX exchange exposed over 5 million records including wallet addresses, hashed passwords, 2FA codes and KYC documents—highlighting serious custodial risk and credential exploitation potential.
Data Security
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Mitchell Langley
December 15, 2025
Cybersecurity
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
Gabby Lee
December 15, 2025
Cybersecurity
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
Mitchell Langley
December 15, 2025
TOP CYBERSECURITY HEADLINES
CVE Vulnerability Alerts
Apple Patches Critical Vulnerabilities Across Multiple Platforms
CVE Vulnerability Alerts
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
This Week’s Security Spotlight
Application Security
Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic
Andrew Doyle
December 15, 2025
Cybersecurity
Justice Department Alleges Misleading Compliance in Federal Audit Case
Gabby Lee
December 15, 2025
Cybersecurity
Why Insuring Keith Richards’ Fingers Highlights Risk Management in Cybersecurity
Andrew Doyle
December 11, 2025
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Conduent Discloses Data Breach Impacting 10.5 Million Individuals
October 30, 2025
A data breach at Conduent has exposed personal and medical information of over 10.5 million people through the MOVEit vulnerability, underscoring the massive risks of ...
Proton Launches Dark Web Data Breach Observatory to Expose Hidden Cyber Threats
October 30, 2025
Proton launched its Data Breach Observatory to detect and report dark web data exposures, providing real-time alerts and insights to help organizations prevent and mitigate ...
PhantomRaven Campaign Exploits AI Package Suggestions to Get into Developer Systems
October 30, 2025
The PhantomRaven campaign weaponized AI-generated package names to distribute malicious npm modules, stealing developer credentials and CI/CD tokens in a stealthy software supply chain attack.
Canada Confirms Hacktivist Breaches Targeting Water and Energy Infrastructure
October 30, 2025
Canadian authorities revealed multiple hacktivist intrusions into water, energy, and agricultural systems, manipulating industrial controls in opportunistic attacks that risked operational safety but aimed mainly ...
Ribbon Communications Breach Linked to Foreign State Hackers, Exposing Telecom Supply Chains
October 30, 2025
Nation-state hackers breached U.S. telecom provider Ribbon Communications, maintaining covert access for nearly a year and exposing sensitive customer data in a targeted cyberespionage campaign.
WordPress Security Plugin Vulnerability Exposes Private Server Files to Site Subscribers
October 30, 2025
A flaw in the Anti-Malware Security and Brute-Force Firewall plugin let WordPress subscribers access private server files, prompting urgent updates to prevent data exposure.
Phoenix Contact UPS Vulnerabilities: Critical Flaws May Cause Denial-of-Service
October 30, 2025
Critical flaws in Phoenix Contact’s QUINT4 UPS devices could let attackers shut down power or steal credentials. One unpatched Modbus flaw risks remote “power denial” ...
Fuji Electric HMI Configurator Flaws: Industrial Software Vulnerabilities Expose Hack Risks
October 30, 2025
Fuji Electric’s Monitouch V-SFT, Tellus Lite V-Simulator, and V-Server Lite tools contain critical flaws (CVE-2024-11787, others) enabling remote code execution. CISA urges urgent patching.
Atroposia Malware Now Comes With Built-In Local Vulnerability Scanner
October 29, 2025
Atroposia is a newly surfaced malware-as-a-service kit that integrates remote access, credential theft and a built-in vulnerability scanner, enabling low-skill attackers to execute advanced campaigns.
TEE.Fail Attack Undermines Confidential Computing on Intel, AMD, and NVIDIA CPUs
October 29, 2025
The TEE.Fail side-channel attack allows extraction of cryptographic keys from Intel SGX, AMD SEV-SNP and NVIDIA GPU confidential environments via low-cost DDR5 memory bus interposers.
CISA Alerts to Actively Exploited Vulnerabilities in DELMIA Apriso by Dassault Systèmes
October 29, 2025
CISA warns that two vulnerabilities in DELMIA Apriso (CVE-2025-6204 and CVE-2025-6205) are under active exploitation, urging immediate patching across manufacturing operations.
Microsoft Faces Lawsuit Over Misleading Customers Into Copilot-Enhanced Microsoft 365 Subscriptions
October 29, 2025
The Australian regulator alleges Microsoft misled 2.7 million consumers into Copilot-integrated Microsoft 365 plans by concealing a cheaper Classic tier, prompting legal action and potential ...
Qilin Ransomware Leverages WSL to Deploy Linux Encryptors on Windows Systems
October 29, 2025
Qilin ransomware now exploits the Windows Subsystem for Linux to deploy Linux encryptors on Windows hosts, blending BYOVD attacks and remote-management tools for stealth/
Dentsu Confirms Data Breach Exposing Employee Payroll and Personal Information
October 29, 2025
Dentsu has confirmed a cyberattack on its UK operations via Merkle’s servers, exposing employee payroll and personal details, raising identity theft and phishing concerns.
Palo Alto Networks Unveils AI Security Suite: Cortex Cloud 2.0 & Prisma AIRS 2.0 Launched
October 29, 2025
Palo Alto Networks has launched Cortex Cloud 2.0 and Prisma AIRS 2.0—AI-driven platforms for cloud and AI application security. Combining automation, real-time threat detection, and ...
Operation ForumTroll: Chrome Zero-Day Tied to Italian Spyware Developer Memento Labs
October 29, 2025
A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from ...
Palo Alto Networks Uncovers 194,000-Domain Smishing Campaign Linked to “Smishing Triad”
October 28, 2025
A global smishing campaign of unprecedented scale has been uncovered by Palo Alto Networks, revealing the vast operations of a Chinese-speaking threat actor known as ...
Coveware Reports Historic Drop in Ransomware Payments: Only 23% of Victims Paid in Q3 2025
October 28, 2025
The global ransomware economy is collapsing under growing resistance from its targets. According to new data from cybersecurity firm Coveware, the third quarter of 2025 ...
Firefox Add-Ons Must Declare Data Collection—or Be Rejected
October 28, 2025
Mozilla is taking a decisive step toward transparency and user control by requiring all Firefox extensions to disclose how they collect and handle personal data. ...
Chainguard’s $3.5 Billion Valuation Signals Massive Investor Confidence in Secure-by-Default Software
October 28, 2025
Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its ...




































