Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Increasing Threats from Automated Data Extortion Targeting MongoDB
Application Security
Increasing Threats from Automated Data Extortion Targeting MongoDB
A threat actor has launched automated attacks on MongoDB databases, exploiting weak security to extort low ransoms from victims for data restoration. This situation highlights ...
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Cybersecurity
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Apple's new privacy feature allows users to reduce the precision of location data shared with networks, bolstering privacy on select iPhone and iPad models. This ...
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Application Security
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Ivanti has addressed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) following warnings from security experts about their active exploitation, raising significant threats to ...
Global Cloud Storage Scam Emails Threaten Users With False Data Deletion Alerts
News
Global Cloud Storage Scam Emails Threaten Users With False Data Deletion Alerts
A widespread phishing campaign has emerged, tricking users with fake alerts about impending deletion of their cloud storage files due to alleged payment failures. The ...
RedKitten Campaign Targets NGOs Amid Iranian Unrest
News
RedKitten Campaign Targets NGOs Amid Iranian Unrest
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
Targeted Vishing Attacks Amplify ShinyHunters's SaaS Data Breaches
News
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Instagram's Privacy Controls Data Exposure Review of Recent Findings
Application Security
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
Cybersecurity
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised Supply Chain Security Breach Uncovered
Application Security
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files Allegations of a Personal Hacker
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Android Malware Incident Hugging Face Repository Misuse
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Application Security
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
White House Revokes Software Security Rules But Keeps Key Resources
Cybersecurity
White House Revokes Software Security Rules But Keeps Key Resources
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Application Security
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Cybersecurity
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Cybersecurity
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
News
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Legal Repercussions Mount for Cognizant After TriZetto Incident
Cybersecurity
Legal Repercussions Mount for Cognizant After TriZetto Incident
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Cybersecurity
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Application Security
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Global Cloud Storage Scam Emails Threaten Users With False Data Deletion Alerts
A widespread phishing campaign has emerged, tricking users with fake alerts about impending deletion of their cloud storage files due to alleged payment failures. The ...
RedKitten Campaign Targets NGOs Amid Iranian Unrest
A group likely linked to Iranian state interests, RedKitten, targets NGOs working on human rights documentation. This activity arose during the nationwide unrest in Iran.
Targeted Vishing Attacks Amplify ShinyHunters’s SaaS Data Breaches
ShinyHunters group intensifies SaaS data breaches, leveraging voice phishing and custom phishing sites to harvest SSO credentials and tap multi-factor authentication.
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
A researcher found that Instagram's private accounts were not as secure as users believed, exposing photo links to unauthorized visitors. Despite the issue being fixed, ...
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
A federal jury recently found Linwei Ding, an ex-Google software engineer, guilty of misappropriating AI supercomputer project data for Chinese tech companies. This case highlights ...
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Hackers breached an update server at MicroWorld Technologies, delivering malware to customers through eScan Antivirus software. This supply chain attack exposed vulnerabilities within the software's ...
Revelations from Epstein Files: Allegations of a “Personal Hacker”
A Justice Department document, recently disclosed, reveals that in 2017, Jeffrey Epstein was alleged to have a "personal hacker," linked to his network.
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Chrome Extensions Prove Malicious with Data Hijacking Tricks
Security experts have discovered Chrome extensions hijacking data and targeting OpenAI ChatGPT tokens. One identified extension, "Amazon Ads Blocker," falsely claims to remove sponsored content ...
White House Revokes Software Security Rules But Keeps Key Resources
The White House has annulled two Biden-era security memorandums, deemed burdensome, while preserving resources that provided value. This decision affects guidelines for agencies working with ...
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
To bolster cybersecurity, Microsoft announced plans to phase out the NTLM authentication protocol, which has been part of Windows for over three decades, citing vulnerabilities ...
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Aisy announces a successful $2.3 million seed funding round for its innovative AI platform dedicated to transforming vulnerability management. This stealth stage company aims to ...
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Illegal cryptocurrency transactions surged to a record $158 billion in 2025, reversing a trend of decreasing activity from $86 billion in 2021 to $64 billion ...
China-linked Threat Actor UAT-8099 Targets Asian IIS Servers
Cisco Talos uncovered an operation by UAT-8099 aimed at compromised Internet Information Services servers throughout Asia, focusing heavily on Thailand and Vietnam.
Legal Repercussions Mount for Cognizant After TriZetto Incident
The TriZetto data breach ignited a series of legal battles for Cognizant, its parent company. Thousands of affected Oregonians will receive data breach notifications linked ...
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
Law enforcement officials have announced the successful cessation of three massive illegal IPTV services. This law enforcement action forms part of a broader attempt to ...
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Research identifies 175,000 exposed Ollama hosts potentially facilitating LLM misuse, with 23,000 persistently active. Highlighted by SecurityWeek, this cybersecurity risk could enable unauthorized access to ...
Google Disrupts Major Residential Proxy Network to Weaken Cybercriminals’ Shield
Google has effectively disrupted one of the largest residential proxy networks, impacting cybercriminals who mask illegal activities by mimicking legitimate residential traffic. This intervention aims ...
Game Mods Conceal Infostealer Malware: A Threat to Corporate IT Systems
Seemingly innocuous game modifications can carry infostealer malware that quietly compromises identities and systems. An example is how Roblox mods could escalate PC infections into ...
Aisuru/Kimwolf Botnet Orchestrates Massive DDoS Attack
The Aisuru/Kimwolf botnet orchestrated a potent distributed denial of service (DDoS) attack in December 2025. The attack reached 31.4 Tbps and executed 200 million requests ...