Cyber Security
Cybersecurity
FleetWave Users Left Without Service After Chevin Takes Platform Offline
Mitchell Langley
April 10, 2026
A security incident results in major FleetWave outages across UK and US as Chevin takes affected platforms offline.
Cybersecurity
Authorities Crack a $45 Million Global Cryptocurrency Scam and Recover $12 Million
Gabby Lee
April 10, 2026
Global authorities dismantled a $45M crypto scam, rescuing $12M from fraudsters and aiding 20K affected wallets.
Application Security
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Andrew Doyle
April 10, 2026
Vulnerability in EngageLab SDK put Android cryptocurrency wallets at risk, bypassing security sandbox protections.
Cybersecurity
Newly Discovered UAT-10362 Threat Cluster Aims at Taiwanese NGOs
Mitchell Langley
April 10, 2026
UAT-10362 threatens Taiwanese NGOs with new LucidRook malware.
News
New Extortion Crew Uses Phishing to Breach High-Value Corporations
Gabby Lee
April 10, 2026
Emerging extortion crew targets corporations through sophisticated phishing schemes.
Application Security
Smart Slider 3 Pro Plugin Update System Was Hijacked to Push Backdoored Versions
Andrew Doyle
April 10, 2026
Cybercriminals hijacked the Smart Slider 3 Pro plugin update system, pushing malicious versions loaded with multiple backdoors to WordPress and Joomla...
Cybersecurity
Covert PDF Exploitation: Hackers Use Adobe Acrobat Reader for Targeted Payload Delivery
Mitchell Langley
April 10, 2026
Cybercriminals exploit Adobe Acrobat Reader to assess targets and selectively deploy further payloads.
Cybersecurity
Stolen Credentials Are Turning Authentication Systems Into Attack Surfaces
Gabby Lee
April 10, 2026
Discover how wearable biometric authentication is reshaping identity verification by focusing on the user, rather than the session.
Cybersecurity
Microsoft’s Communication Breakdown Leaves Developers Locked Out Without Warning
Andrew Doyle
April 10, 2026
Microsoft's handling of developer account lockouts reveals serious communication gaps that are disrupting open source workflows.
Application Security
Google Enhances Chrome Security with Device Bound Session Credentials
Mitchell Langley
April 10, 2026
Google unveils Device Bound Session Credentials in Chrome 146 for Windows to thwart information-stealing malware.
Application Security
New Bypass Technique Bypasses Apple’s AI Safeguards
Gabby Lee
April 10, 2026
Researchers bypass Apple Intelligence guardrails using Neural Exect and Unicode manipulation.
Cybersecurity
ChipSoft’s Website Goes Offline After Ransomware Attack While Email Stays Operational
Gabby Lee
April 9, 2026
ChipSoft's website is down following a ransomware attack, though email communication remains functional.
Cybersecurity
Telehealth Company Hims & Hers Health Discloses Data Breach Involving Support Tickets
Gabby Lee
April 8, 2026
Hims & Hers Health reports a data breach linked to a third-party customer service platform, impacting support tickets.
Cybersecurity
Data Theft Incidents Escalate as SaaS Integration Provider Suffers Major Breach
Mitchell Langley
April 8, 2026
Authentication tokens were stolen during a breach, impacting numerous companies.
Cybersecurity
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
Andrew Doyle
April 8, 2026
Discover how CrystalX RAT combines surveillance, data theft, and remote access capabilities in a sophisticated Malware-as-a-Service operation uncovere...
News
Chinese Threat Actors Exploit TrueConf Zero-Day to Breach Asian Governments
Mitchell Langley
April 8, 2026
Chinese threat actors used TrueConf zero-day vulnerability to breach Asian government networks for reconnaissance and payload execution.
CVE Vulnerability Alerts
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
Andrew Doyle
April 8, 2026
A new Docker Engine vulnerability allows attackers to bypass authorization plug-ins due to an incomplete fix.
Cybersecurity
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Mitchell Langley
April 8, 2026
Iranian hackers exploit U.S. critical infrastructure networks by targeting internet-exposed Rockwell/Allen-Bradley PLCs.
Cybersecurity
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Andrew Doyle
April 8, 2026
Russia-linked APT28 is harnessing vulnerable routers in a massive espionage campaign.
Cybersecurity
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Gabby Lee
April 8, 2026
Anthropic's new AI model, Claude Mythos, could protect critical software or potentially enhance cyberattacks.
Cybersecurity
Juniper Networks Addresses Critical Junos OS Vulnerabilities
Andrew Doyle
April 13, 2026
Cybersecurity
UK Government Seeks Public Input on Radiofrequency Jammers to Shape Upcoming Legislation
Gabby Lee
April 13, 2026
TOP CYBERSECURITY HEADLINES
Application Security
AI Browser Extensions Pose a Hidden Risk to Network Security
Application Security
Critical Marimo Vulnerability Is Now Being Actively Exploited for Credential Theft
This Week’s Security Spotlight
Cybersecurity
U.S. Cybersecurity Agencies Warn of Rising Threats From Exposed Rockwell Automation PLCs
Mitchell Langley
April 13, 2026
Cybersecurity
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Mitchell Langley
April 8, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Newly Discovered UAT-10362 Threat Cluster Aims at Taiwanese NGOs
April 10, 2026
UAT-10362 threatens Taiwanese NGOs with new LucidRook malware.
New Extortion Crew Uses Phishing to Breach High-Value Corporations
April 10, 2026
Emerging extortion crew targets corporations through sophisticated phishing schemes.
Smart Slider 3 Pro Plugin Update System Was Hijacked to Push Backdoored Versions
April 10, 2026
Cybercriminals hijacked the Smart Slider 3 Pro plugin update system, pushing malicious versions loaded with multiple backdoors to WordPress and Joomla...
Covert PDF Exploitation: Hackers Use Adobe Acrobat Reader for Targeted Payload Delivery
April 10, 2026
Cybercriminals exploit Adobe Acrobat Reader to assess targets and selectively deploy further payloads.
Stolen Credentials Are Turning Authentication Systems Into Attack Surfaces
April 10, 2026
Discover how wearable biometric authentication is reshaping identity verification by focusing on the user, rather than the session.
Microsoft’s Communication Breakdown Leaves Developers Locked Out Without Warning
April 10, 2026
Microsoft's handling of developer account lockouts reveals serious communication gaps that are disrupting open source workflows.
Google Enhances Chrome Security with Device Bound Session Credentials
April 10, 2026
Google unveils Device Bound Session Credentials in Chrome 146 for Windows to thwart information-stealing malware.
New Bypass Technique Bypasses Apple’s AI Safeguards
April 10, 2026
Researchers bypass Apple Intelligence guardrails using Neural Exect and Unicode manipulation.
ChipSoft’s Website Goes Offline After Ransomware Attack While Email Stays Operational
April 9, 2026
ChipSoft's website is down following a ransomware attack, though email communication remains functional.
Telehealth Company Hims & Hers Health Discloses Data Breach Involving Support Tickets
April 8, 2026
Hims & Hers Health reports a data breach linked to a third-party customer service platform, impacting support tickets.
Data Theft Incidents Escalate as SaaS Integration Provider Suffers Major Breach
April 8, 2026
Authentication tokens were stolen during a breach, impacting numerous companies.
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
April 8, 2026
Discover how CrystalX RAT combines surveillance, data theft, and remote access capabilities in a sophisticated Malware-as-a-Service operation uncovere...
Chinese Threat Actors Exploit TrueConf Zero-Day to Breach Asian Governments
April 8, 2026
Chinese threat actors used TrueConf zero-day vulnerability to breach Asian government networks for reconnaissance and payload execution.
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
April 8, 2026
A new Docker Engine vulnerability allows attackers to bypass authorization plug-ins due to an incomplete fix.
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
April 8, 2026
Iranian hackers exploit U.S. critical infrastructure networks by targeting internet-exposed Rockwell/Allen-Bradley PLCs.
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
April 8, 2026
Russia-linked APT28 is harnessing vulnerable routers in a massive espionage campaign.
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
April 8, 2026
Anthropic's new AI model, Claude Mythos, could protect critical software or potentially enhance cyberattacks.
Trent AI Emerges From Stealth With $13 Million in Funding
April 8, 2026
Startup Trent AI unveils a comprehensive security framework to safeguard artificial intelligence (AI) agents, backed by significant funding.
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
April 8, 2026
Google's recent Android update fixes critical vulnerabilities in the operating system, including a severe StrongBox flaw and a DoS vulnerability in th...
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
April 8, 2026
Exploring the plateau in automated pentesting tools and the PoC cliff effect on security validation.



































