Cyber Security
Cybersecurity
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Andrew Doyle
February 4, 2026
A critical flaw in React Native's Metro server is being exploited to propagate malware across Windows and Linux systems. The attacks, despite escalating in severity, ...
Cybersecurity
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
Mitchell Langley
February 4, 2026
A coordinated reconnaissance campaign used thousands of proxies to target Citrix NetScaler, aiming to pinpoint login panels. This marks a substantial cyber concern due to ...
Cybersecurity
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Gabby Lee
February 4, 2026
Chinese hackers hijacked Notepad++ updates for months, claims the developer. State-sponsored involvement underlines cybersecurity challenges. Key details on tactics and duration shared.
Cybersecurity
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Andrew Doyle
February 4, 2026
Over 1,400 MongoDB servers, lacking secure access controls, have been seized by hackers who wiped data and left ransom notes. Cybercriminals demanded $500 in Bitcoin ...
Application Security
Malicious VS Code Extensions Spread GlassWorm Loader
Mitchell Langley
February 4, 2026
Hackers hijacked an account to publish harmful VS Code extensions, distributing the GlassWorm malware loader. This compromised open-source repositories impacting numerous users by embedding malicious ...
Cybersecurity
Surge in Fake Investment Platforms Exploiting Social Media
Gabby Lee
February 4, 2026
High-yield investment platforms are exploiting unsuspecting investors with promises of high returns. These scams, often resembling Ponzi schemes, use social media, recycled scripts, and referral ...
Cybersecurity
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Gabby Lee
February 4, 2026
McDonald's is urging individuals to enhance their cybersecurity by creating more complex passwords. This comes in light of "Change Your Password Day," emphasizing the importance ...
Cybersecurity
Identity Challenges in User Data Storage and Security Maintenance
Andrew Doyle
February 4, 2026
The StopICE platform, focused on tracking immigration enforcement, faces scrutiny following claims of user data leaks instigated by a CBP agent. Learn about the complexities ...
CVE Vulnerability Alerts
Russian Hackers Exploit Vulnerability in Microsoft Office to Target Ukraine
Mitchell Langley
February 4, 2026
Russian hackers exploited CVE-2026-21509 vulnerability in Microsoft Office targeting Ukrainian systems. CERT Ukraine urges immediate security updates as exploitation risk persists.
Application Security
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
Gabby Lee
February 4, 2026
Microsoft outlines its plan to discontinue NTLM, pushing for Kerberos-based solutions due to NTLM's vulnerability to attacks. Their strategy aims at enhanced security for Windows ...
Cybersecurity
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Gabby Lee
February 4, 2026
A security audit of ClawHub has uncovered 341 malicious skills out of an examined total of 2,857, raising significant concerns about supply chain risks for ...
Application Security
Firefox Introduces Options to Control AI Features
Andrew Doyle
February 4, 2026
Mozilla is responding to user concerns by allowing control over AI features in Firefox's next update. Users can choose to disable these features entirely or ...
Application Security
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Mitchell Langley
February 4, 2026
Microsoft confirms a shutdown bug in Windows 11 also affects Windows 10 with Virtual Secure Mode enabled, impacting system operations.
Application Security
Increasing Threats from Automated Data Extortion Targeting MongoDB
Gabby Lee
February 4, 2026
A threat actor has launched automated attacks on MongoDB databases, exploiting weak security to extort low ransoms from victims for data restoration. This situation highlights ...
Cybersecurity
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Andrew Doyle
February 4, 2026
Apple's new privacy feature allows users to reduce the precision of location data shared with networks, bolstering privacy on select iPhone and iPad models. This ...
Application Security
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Mitchell Langley
February 4, 2026
Ivanti has addressed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) following warnings from security experts about their active exploitation, raising significant threats to ...
News
Global Cloud Storage Scam Emails Threaten Users With False Data Deletion Alerts
Mitchell Langley
February 4, 2026
A widespread phishing campaign has emerged, tricking users with fake alerts about impending deletion of their cloud storage files due to alleged payment failures. The ...
News
RedKitten Campaign Targets NGOs Amid Iranian Unrest
Mitchell Langley
February 4, 2026
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
News
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
Gabby Lee
February 4, 2026
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Application Security
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Andrew Doyle
February 4, 2026
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
CVE Vulnerability Alerts
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Mitchell Langley
April 16, 2026
Application Security
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Gabby Lee
April 16, 2026
Cybersecurity
Autovista Battles Ransomware Attack Across Europe and Australia
Gabby Lee
April 16, 2026
Cybersecurity
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Mitchell Langley
April 14, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Andrew Doyle
April 16, 2026
Cybersecurity
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
Gabby Lee
April 16, 2026
Cybersecurity
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Mitchell Langley
April 16, 2026
Application Security
OpenAI Responds to Supply Chain Attack Affecting macOS Security
Andrew Doyle
April 14, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Harrods Data Breach Exposes Customer Details in Third-Party Hack
Andrew Doyle
September 29, 2025
Steam Game BlockBlasters Turns Malicious, Drains $150K in Crypto
Andrew Doyle
September 23, 2025
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
February 4, 2026
Over 1,400 MongoDB servers, lacking secure access controls, have been seized by hackers who wiped data and left ransom notes. Cybercriminals demanded $500 in Bitcoin ...
Malicious VS Code Extensions Spread GlassWorm Loader
February 4, 2026
Hackers hijacked an account to publish harmful VS Code extensions, distributing the GlassWorm malware loader. This compromised open-source repositories impacting numerous users by embedding malicious ...
Surge in Fake Investment Platforms Exploiting Social Media
February 4, 2026
High-yield investment platforms are exploiting unsuspecting investors with promises of high returns. These scams, often resembling Ponzi schemes, use social media, recycled scripts, and referral ...
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
February 4, 2026
McDonald's is urging individuals to enhance their cybersecurity by creating more complex passwords. This comes in light of "Change Your Password Day," emphasizing the importance ...
Identity Challenges in User Data Storage and Security Maintenance
February 4, 2026
The StopICE platform, focused on tracking immigration enforcement, faces scrutiny following claims of user data leaks instigated by a CBP agent. Learn about the complexities ...
Russian Hackers Exploit Vulnerability in Microsoft Office to Target Ukraine
February 4, 2026
Russian hackers exploited CVE-2026-21509 vulnerability in Microsoft Office targeting Ukrainian systems. CERT Ukraine urges immediate security updates as exploitation risk persists.
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
February 4, 2026
Microsoft outlines its plan to discontinue NTLM, pushing for Kerberos-based solutions due to NTLM's vulnerability to attacks. Their strategy aims at enhanced security for Windows ...
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
February 4, 2026
A security audit of ClawHub has uncovered 341 malicious skills out of an examined total of 2,857, raising significant concerns about supply chain risks for ...
Firefox Introduces Options to Control AI Features
February 4, 2026
Mozilla is responding to user concerns by allowing control over AI features in Firefox's next update. Users can choose to disable these features entirely or ...
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
February 4, 2026
Microsoft confirms a shutdown bug in Windows 11 also affects Windows 10 with Virtual Secure Mode enabled, impacting system operations.
Increasing Threats from Automated Data Extortion Targeting MongoDB
February 4, 2026
A threat actor has launched automated attacks on MongoDB databases, exploiting weak security to extort low ransoms from victims for data restoration. This situation highlights ...
Apple Enhances Location Privacy With New Feature for iPhone and iPad
February 4, 2026
Apple's new privacy feature allows users to reduce the precision of location data shared with networks, bolstering privacy on select iPhone and iPad models. This ...
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
February 4, 2026
Ivanti has addressed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) following warnings from security experts about their active exploitation, raising significant threats to ...
Global Cloud Storage Scam Emails Threaten Users With False Data Deletion Alerts
February 4, 2026
A widespread phishing campaign has emerged, tricking users with fake alerts about impending deletion of their cloud storage files due to alleged payment failures. The ...
RedKitten Campaign Targets NGOs Amid Iranian Unrest
February 4, 2026
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
February 4, 2026
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
February 4, 2026
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
February 4, 2026
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
February 4, 2026
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files: Allegations of a “Personal Hacker”
February 4, 2026
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.




































