Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Apple Patches Critical Vulnerabilities Across Multiple Platforms
CVE Vulnerability Alerts
Apple Patches Critical Vulnerabilities Across Multiple Platforms
Apple releases crucial security patches for iOS, iPadOS, macOS, watchOS, and more, targeting two actively exploited vulnerabilities. Among these is CVE-2025-43529, a significant use-after-free flaw ...
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
CVE Vulnerability Alerts
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
The U.S. Cybersecurity and Infrastructure Security Agency has added a flaw in Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities catalog. This follows ...
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Cybersecurity
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Germany has called in Russia's ambassador to address grave concerns about alleged cyberattacks on its air traffic control and a concurrent disinformation campaign designed to ...
Justice Department Alleges Misleading Compliance in Federal Audit Case
Cybersecurity
Justice Department Alleges Misleading Compliance in Federal Audit Case
Accusations of deception rise as a former senior manager is sued for allegedly misleading the US government about the compliance status of a cloud platform ...
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Endpoint Security
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Attackers can exploit a flaw in GeoServer to define external entities within XML requests, resulting in critical security breaches. The vulnerability impacts data security, highlighting ...
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
Cybersecurity
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
MITRE's latest research identifies XSS, SQL injection, and CSRF as the primary software vulnerabilities in 2025, closely followed by buffer overflow issues and improper access ...
Shadow Spreadsheets' Stealthy Role in Data Security Risks
Data Security
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Employees using unauthorised spreadsheets for daily tasks may unknowingly introduce security risks. These "shadow spreadsheets" often lack oversight, leading to data exposure, version sprawl, and ...
New Wave of Phishing Kits Target Credential Theft at Scale
News
New Wave of Phishing Kits Target Credential Theft at Scale
Cybersecurity researchers analyze four new phishing kits, each with unique capabilities aimed at large-scale credential theft. BlackForce, GhostFrame, InboxPrime AI, and Spiderman introduce advanced tactics ...
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
Cybersecurity
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
A fake torrent for the film 'One Battle After Another' employs a unique technique by embedding malicious PowerShell loaders in subtitle files, ultimately deploying Agent ...
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Cybersecurity
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Kali Linux 2025.4 marks the final update for the year, introducing new hacking tools, desktop environment improvements, and enhanced support for Wayland, alongside the preview ...
Fieldtex Ransomware Attack Akira Group Claims Responsibility
Cybersecurity
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
The Akira ransomware group has claimed responsibility for the November cyberattack on Fieldtex Products, stating that 14 Gb of data was stolen. The breach potentially ...
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
Data Security
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
The UK's digital-only eVisa scheme is under fire as civil society groups call for a data protection investigation. Concerns include systemic data errors and possible ...
Gladinet CentreStack Flaw A Widespread Threat to Organizations
Cybersecurity
Gladinet CentreStack Flaw: A Widespread Threat to Organizations
Cybersecurity teams are grappling with a new wave of attacks targeting a Gladinet CentreStack vulnerability, threatening multiple organizations globally.
PyStoreRAT New JavaScript-Based RAT Distributed via GitHub
Cybersecurity
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Cybersecurity experts uncover a new campaign using GitHub-hosted Python repositories to deploy PyStoreRAT, a JavaScript-based Remote Access Trojan. The threat disguises itself within repositories posing ...
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
Cybersecurity
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
In a pivotal move, the Pentagon's directive to speed up the integration of post-quantum cryptography (PQC) technology comes amid heightened technical tensions. As the U.S. ...
New Cyber Threats Movie Downloads and Software Updates Under Siege
Cybersecurity
New Cyber Threats: Movie Downloads and Software Updates Under Siege
Cybersecurity incidents reveal a growing threat landscape as hackers infiltrate common online platforms, from movie downloads to browser extensions, leaving users vulnerable. Tech companies and ...
Zero-day Vulnerability in Gogs Leads to Hundreds of Compromised Servers
Cybersecurity
Zero-day Vulnerability in Gogs Leads to Hundreds of Compromised Servers
A zero-day vulnerability in Gogs, a well-known self-hosted Git service, has enabled attackers to execute remote code execution on numerous internet-facing instances, impacting hundreds of ...
Former Employee Faces Charges Over Alleged Cybersecurity Fraud DoD Compliance in Question
Cybersecurity
Former Employee Faces Charges Over Alleged Cybersecurity Fraud: DoD Compliance in Question
Danielle Hillmer, a former Accenture executive, is facing charges for allegedly misrepresenting the Department of Defense (DoD) compliance of a cloud platform used by her ...
Microsoft Expands Vulnerability Rewards Program to Third-Party Code
Cybersecurity
Microsoft Expands Vulnerability Rewards Program to Third-Party Code
Microsoft's updated program rewards security researchers for finding critical vulnerabilities in Microsoft online services, including third-party code. The initiative aims to strengthen digital defenses and ...
Stealthy Campaign Targets Developers With Malicious VSCode Extensions
Application Security
Stealthy Campaign Targets Developers With Malicious VSCode Extensions
A stealth campaign has targeted developers using VSCode with 19 malware-infested extensions since February. Threat actors exploit the flexibility of VSCode extensions to distribute malicious ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Germany has called in Russia's ambassador to address grave concerns about alleged cyberattacks on its air traffic control and a concurrent disinformation campaign designed to ...
Justice Department Alleges Misleading Compliance in Federal Audit Case
Accusations of deception rise as a former senior manager is sued for allegedly misleading the US government about the compliance status of a cloud platform ...
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Attackers can exploit a flaw in GeoServer to define external entities within XML requests, resulting in critical security breaches. The vulnerability impacts data security, highlighting ...
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
MITRE's latest research identifies XSS, SQL injection, and CSRF as the primary software vulnerabilities in 2025, closely followed by buffer overflow issues and improper access ...
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Employees using unauthorised spreadsheets for daily tasks may unknowingly introduce security risks. These "shadow spreadsheets" often lack oversight, leading to data exposure, version sprawl, and ...
New Wave of Phishing Kits Target Credential Theft at Scale
Cybersecurity researchers analyze four new phishing kits, each with unique capabilities aimed at large-scale credential theft. BlackForce, GhostFrame, InboxPrime AI, and Spiderman introduce advanced tactics ...
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
A fake torrent for the film 'One Battle After Another' employs a unique technique by embedding malicious PowerShell loaders in subtitle files, ultimately deploying Agent ...
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Kali Linux 2025.4 marks the final update for the year, introducing new hacking tools, desktop environment improvements, and enhanced support for Wayland, alongside the preview ...
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
The Akira ransomware group has claimed responsibility for the November cyberattack on Fieldtex Products, stating that 14 Gb of data was stolen. The breach potentially ...
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
The UK's digital-only eVisa scheme is under fire as civil society groups call for a data protection investigation. Concerns include systemic data errors and possible ...
Gladinet CentreStack Flaw: A Widespread Threat to Organizations
Cybersecurity teams are grappling with a new wave of attacks targeting a Gladinet CentreStack vulnerability, threatening multiple organizations globally.
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Cybersecurity experts uncover a new campaign using GitHub-hosted Python repositories to deploy PyStoreRAT, a JavaScript-based Remote Access Trojan. The threat disguises itself within repositories posing ...
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
In a pivotal move, the Pentagon's directive to speed up the integration of post-quantum cryptography (PQC) technology comes amid heightened technical tensions. As the U.S. ...
New Cyber Threats: Movie Downloads and Software Updates Under Siege
Cybersecurity incidents reveal a growing threat landscape as hackers infiltrate common online platforms, from movie downloads to browser extensions, leaving users vulnerable. Tech companies and ...
Zero-day Vulnerability in Gogs Leads to Hundreds of Compromised Servers
A zero-day vulnerability in Gogs, a well-known self-hosted Git service, has enabled attackers to execute remote code execution on numerous internet-facing instances, impacting hundreds of ...
Former Employee Faces Charges Over Alleged Cybersecurity Fraud: DoD Compliance in Question
Danielle Hillmer, a former Accenture executive, is facing charges for allegedly misrepresenting the Department of Defense (DoD) compliance of a cloud platform used by her ...
Microsoft Expands Vulnerability Rewards Program to Third-Party Code
Microsoft's updated program rewards security researchers for finding critical vulnerabilities in Microsoft online services, including third-party code. The initiative aims to strengthen digital defenses and ...
Stealthy Campaign Targets Developers With Malicious VSCode Extensions
A stealth campaign has targeted developers using VSCode with 19 malware-infested extensions since February. Threat actors exploit the flexibility of VSCode extensions to distribute malicious ...
CyberVolk’s Return: Unpacking the Pro-Russian Hacktivist’s Ransomware Resurgence
CyberVolk, a pro-Russian hacktivist group, resurfaces with new ransomware. Despite causing alarm, they inadvertently left a method for data recovery.
Cybercrime as a Service: The New Era of Subscription-Based Attacks
Cybercriminals have adopted a subscription-based model akin to SaaS, granting low-skill hackers easy access to potent tools. Phishing kits, OTP bots, infostealer logs, and RATs ...