Cyber Security
CISO Communities Provide a Tactical Edge for Cybersecurity Challenges
PDVSA’s Recent Cyberattack Reveals Vulnerabilities in Export Operations
Amazon’s Operation Disrupts GRU Hackers Targeting Cloud Infrastructure
From Open Source to OpenAI: Navigating the Evolution of Third-Party Risks
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
All I Want for Christmas is All of Your Data: SantaStealer Malware Spreads for the Holidays
Texas Attorney General Sues Television Giants Over Data Privacy Concerns
ECB Decision Causes Costly Delays for Bank of England’s Payment System Overhaul
Cyber Raid on Jaguar Land Rover: August Attack Leads to Theft of Sensitive Information
Google Finds China and Iran Actors Exploiting React2Shell Flaws
Atlassian Publishes Security Patches for Critical Vulnerabilities in Multiple Products
700Credit Data Breach Exposes Sensitive Information of 5.8 Million Individuals
Google Chrome Extension With Millions of Users May Be Compromising Privacy
Militant Groups Experiment With AI, Amplifying Threats
SoundCloud’s VPN Restrictions Lead to Access Denials for Users
Unsecured 16TB Database Exposes 4.3 Billion Professional Records
Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Justice Department Alleges Misleading Compliance in Federal Audit Case
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
Gladinet CentreStack Flaw: A Widespread Threat to Organizations
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
New Cyber Threats: Movie Downloads and Software Updates Under Siege
Militant Groups Experiment With AI, Amplifying Threats
Cybersecurity
Militant Groups Experiment With AI, Amplifying Threats
Extremist groups are leveraging AI technologies to enhance their propaganda efforts, according to recent insights. This trend points to a growing challenge in cybersecurity as ...
SoundCloud's VPN Restrictions Lead to Access Denials for Users
Cybersecurity
SoundCloud’s VPN Restrictions Lead to Access Denials for Users
Users attempting to access SoundCloud via VPN connections are encountering a 403 forbidden error, resulting in blocked access to the audio streaming platform. This issue ...
Email Scam Exploits PayPal's Subscriptions Billing Feature
News
Email Scam Exploits PayPal’s Subscriptions Billing Feature
PayPal's legitimate billing feature becomes a tool for scammers sending fraudulent emails, mimicking genuine purchase notifications. This latest financial scam uses deception to its full ...
Unsecured 16TB Database Exposes 4.3 Billion Professional Records
Information Security
Unsecured 16TB Database Exposes 4.3 Billion Professional Records
A massive 16TB MongoDB database containing 4.3 billion professional records was found unsecured, raising concerns about AI-driven social engineering threats. Researchers Bob Diachenko and nexos.ai ...
Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic
Application Security
Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic
A vulnerability in Notepad++ could have let attackers hijack update traffic. This flaw stemmed from weak file authentication during updates. A report by security researcher ...
Apple Patches Critical Vulnerabilities Across Multiple Platforms
CVE Vulnerability Alerts
Apple Patches Critical Vulnerabilities Across Multiple Platforms
Apple releases crucial security patches for iOS, iPadOS, macOS, watchOS, and more, targeting two actively exploited vulnerabilities. Among these is CVE-2025-43529, a significant use-after-free flaw ...
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
CVE Vulnerability Alerts
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
The U.S. Cybersecurity and Infrastructure Security Agency has added a flaw in Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities catalog. This follows ...
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Cybersecurity
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Germany has called in Russia's ambassador to address grave concerns about alleged cyberattacks on its air traffic control and a concurrent disinformation campaign designed to ...
Justice Department Alleges Misleading Compliance in Federal Audit Case
Cybersecurity
Justice Department Alleges Misleading Compliance in Federal Audit Case
Accusations of deception rise as a former senior manager is sued for allegedly misleading the US government about the compliance status of a cloud platform ...
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Endpoint Security
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Attackers can exploit a flaw in GeoServer to define external entities within XML requests, resulting in critical security breaches. The vulnerability impacts data security, highlighting ...
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
Cybersecurity
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
MITRE's latest research identifies XSS, SQL injection, and CSRF as the primary software vulnerabilities in 2025, closely followed by buffer overflow issues and improper access ...
Shadow Spreadsheets' Stealthy Role in Data Security Risks
Data Security
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Employees using unauthorised spreadsheets for daily tasks may unknowingly introduce security risks. These "shadow spreadsheets" often lack oversight, leading to data exposure, version sprawl, and ...
New Wave of Phishing Kits Target Credential Theft at Scale
News
New Wave of Phishing Kits Target Credential Theft at Scale
Cybersecurity researchers analyze four new phishing kits, each with unique capabilities aimed at large-scale credential theft. BlackForce, GhostFrame, InboxPrime AI, and Spiderman introduce advanced tactics ...
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
Cybersecurity
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
A fake torrent for the film 'One Battle After Another' employs a unique technique by embedding malicious PowerShell loaders in subtitle files, ultimately deploying Agent ...
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Cybersecurity
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Kali Linux 2025.4 marks the final update for the year, introducing new hacking tools, desktop environment improvements, and enhanced support for Wayland, alongside the preview ...
Fieldtex Ransomware Attack Akira Group Claims Responsibility
Cybersecurity
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
The Akira ransomware group has claimed responsibility for the November cyberattack on Fieldtex Products, stating that 14 Gb of data was stolen. The breach potentially ...
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
Data Security
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
The UK's digital-only eVisa scheme is under fire as civil society groups call for a data protection investigation. Concerns include systemic data errors and possible ...
Gladinet CentreStack Flaw A Widespread Threat to Organizations
Cybersecurity
Gladinet CentreStack Flaw: A Widespread Threat to Organizations
Cybersecurity teams are grappling with a new wave of attacks targeting a Gladinet CentreStack vulnerability, threatening multiple organizations globally.
PyStoreRAT New JavaScript-Based RAT Distributed via GitHub
Cybersecurity
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Cybersecurity experts uncover a new campaign using GitHub-hosted Python repositories to deploy PyStoreRAT, a JavaScript-based Remote Access Trojan. The threat disguises itself within repositories posing ...
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
Cybersecurity
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
In a pivotal move, the Pentagon's directive to speed up the integration of post-quantum cryptography (PQC) technology comes amid heightened technical tensions. As the U.S. ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Email Scam Exploits PayPal’s Subscriptions Billing Feature
PayPal's legitimate billing feature becomes a tool for scammers sending fraudulent emails, mimicking genuine purchase notifications. This latest financial scam uses deception to its full ...
Unsecured 16TB Database Exposes 4.3 Billion Professional Records
A massive 16TB MongoDB database containing 4.3 billion professional records was found unsecured, raising concerns about AI-driven social engineering threats. Researchers Bob Diachenko and nexos.ai ...
Notepad++ Fixes Updater Vulnerability Allowing Attackers to Hijack Update Traffic
A vulnerability in Notepad++ could have let attackers hijack update traffic. This flaw stemmed from weak file authentication during updates. A report by security researcher ...
Apple Patches Critical Vulnerabilities Across Multiple Platforms
Apple releases crucial security patches for iOS, iPadOS, macOS, watchOS, and more, targeting two actively exploited vulnerabilities. Among these is CVE-2025-43529, a significant use-after-free flaw ...
CISA Alerts on Exploited Vulnerability in Sierra Wireless AirLink ALEOS Routers
The U.S. Cybersecurity and Infrastructure Security Agency has added a flaw in Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities catalog. This follows ...
Germany Accuses Russia of Cyberattacks on Air Traffic Control and Election Interference
Germany has called in Russia's ambassador to address grave concerns about alleged cyberattacks on its air traffic control and a concurrent disinformation campaign designed to ...
Justice Department Alleges Misleading Compliance in Federal Audit Case
Accusations of deception rise as a former senior manager is sued for allegedly misleading the US government about the compliance status of a cloud platform ...
GeoServer Vulnerability Exploitation Facilitates External Entity Attacks
Attackers can exploit a flaw in GeoServer to define external entities within XML requests, resulting in critical security breaches. The vulnerability impacts data security, highlighting ...
MITRE Highlights XSS and SQL Injection as Top Software Vulnerabilities for 2025
MITRE's latest research identifies XSS, SQL injection, and CSRF as the primary software vulnerabilities in 2025, closely followed by buffer overflow issues and improper access ...
Shadow Spreadsheets’ Stealthy Role in Data Security Risks
Employees using unauthorised spreadsheets for daily tasks may unknowingly introduce security risks. These "shadow spreadsheets" often lack oversight, leading to data exposure, version sprawl, and ...
New Wave of Phishing Kits Target Credential Theft at Scale
Cybersecurity researchers analyze four new phishing kits, each with unique capabilities aimed at large-scale credential theft. BlackForce, GhostFrame, InboxPrime AI, and Spiderman introduce advanced tactics ...
Torrent Disguised as Leonardo DiCaprio Film Evades Detection Using Subtle Malware Delivery Technique
A fake torrent for the film 'One Battle After Another' employs a unique technique by embedding malicious PowerShell loaders in subtitle files, ultimately deploying Agent ...
Kali Linux Version 2025.4 Introduces New Hacking Tools and Improvements
Kali Linux 2025.4 marks the final update for the year, introducing new hacking tools, desktop environment improvements, and enhanced support for Wayland, alongside the preview ...
Fieldtex Ransomware Attack: Akira Group Claims Responsibility
The Akira ransomware group has claimed responsibility for the November cyberattack on Fieldtex Products, stating that 14 Gb of data was stolen. The breach potentially ...
Digital-only eVisa Scheme Faces Scrutiny Over Data Leaks and GDPR Concerns
The UK's digital-only eVisa scheme is under fire as civil society groups call for a data protection investigation. Concerns include systemic data errors and possible ...
Gladinet CentreStack Flaw: A Widespread Threat to Organizations
Cybersecurity teams are grappling with a new wave of attacks targeting a Gladinet CentreStack vulnerability, threatening multiple organizations globally.
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Cybersecurity experts uncover a new campaign using GitHub-hosted Python repositories to deploy PyStoreRAT, a JavaScript-based Remote Access Trojan. The threat disguises itself within repositories posing ...
Pentagon Pushes for Post-Quantum Cryptography Amid Rising Tech Tensions
In a pivotal move, the Pentagon's directive to speed up the integration of post-quantum cryptography (PQC) technology comes amid heightened technical tensions. As the U.S. ...
New Cyber Threats: Movie Downloads and Software Updates Under Siege
Cybersecurity incidents reveal a growing threat landscape as hackers infiltrate common online platforms, from movie downloads to browser extensions, leaving users vulnerable. Tech companies and ...
Zero-day Vulnerability in Gogs Leads to Hundreds of Compromised Servers
A zero-day vulnerability in Gogs, a well-known self-hosted Git service, has enabled attackers to execute remote code execution on numerous internet-facing instances, impacting hundreds of ...