Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Microsoft Enhances PowerShell Security With Script Warning Functionality
Application Security
Microsoft Enhances PowerShell Security With Script Warning Functionality
Microsoft has integrated a new security feature into Windows PowerShell, alerting users when scripts utilizing the Invoke-WebRequest cmdlet to download web content are run. This ...
Microsoft Patches Critical Zero-Day Vulnerability in Windows
Cybersecurity
Microsoft Patches Critical Zero-Day Vulnerability in Windows
Microsoft has released security updates for a critical zero-day vulnerability in Windows that allowed attackers to gain System privileges. The tech giant announced the patching ...
Google Introduces Layered Defenses in Chrome to Combat Prompt Injection Vulnerabilities
Application Security
Google Introduces Layered Defenses in Chrome to Combat Prompt Injection Vulnerabilities
Google enhances Chrome's security with new features targeting prompt injection vulnerabilities. The update focuses on challenges posed by untrusted web content.
Microsoft Works to Mitigate Copilot Access Issues in Europe
Cybersecurity
Microsoft Works to Mitigate Copilot Access Issues in Europe
Microsoft is addressing an incident affecting users in Europe who face difficulties accessing its AI-powered Copilot digital assistant. The outage underscores critical reliance on cloud-based ...
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Cybersecurity
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Equixly has successfully raised $11 million to bolster its API penetration testing services by developing proprietary AI models, expanding globally, and recruiting new team members.
Proofpoint Completes Acquisition of Hornetsecurity A Strategic Move in Cybersecurity
Cybersecurity
Proofpoint Completes Acquisition of Hornetsecurity: A Strategic Move in Cybersecurity
Proofpoint's $1.8 billion transaction with Hornetsecurity signifies a strategic expansion in the cybersecurity landscape. This move underscores the substantial market presence of Hornetsecurity, whose annual ...
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Application Security
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Initial Access Broker Storm-0249 exploits Endpoint Detection and Response (EDR) solutions and Windows utilities to load malware, establish communication channels, and maintain persistence, all to ...
Mirai-based Broadside Botnet Exploits TBK Vision DVRs in Maritime Sector
CVE Vulnerability Alerts
Mirai-based Broadside Botnet Exploits TBK Vision DVRs in Maritime Sector
The Broadside botnet, a Mirai variant, exploits CVE-2024-3721 vulnerabilities in TBK Vision DVRs, posing a threat to maritime logistics.
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
Identity and Access Management
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
Saviynt, a leading player in identity security, recently raised $700 million in funding led by KKR, enhancing its market valuation to $3 billion. The round ...
EtherRAT Malware Implant Utilizes Linux Persistence Mechanisms in React2Shell Attack
Cybersecurity
EtherRAT Malware Implant Utilizes Linux Persistence Mechanisms in React2Shell Attack
EtherRAT, a new malware implant, is linked to the recent React2Shell cyberattack, exploiting Linux persistence methods and utilizing Ethereum smart contracts for control.
OpenAI Responds to ChatGPT Plus Subscription Controversy Over Ads
Cybersecurity
OpenAI Responds to ChatGPT Plus Subscription Controversy Over Ads
ChatGPT Plus users have raised concerns about perceived advertisements. OpenAI defends its approach, clarifying these are app recommendations, not ads.
Portugal Establishes Legal Safe Harbor for Ethical Hackers
Cybersecurity
Portugal Establishes Legal Safe Harbor for Ethical Hackers
Portugal reforms cybercrime law, creating a legal safe harbor for ethical hackers engaged in good-faith security research. This landmark amendment aims to address the growing ...
Clickjacking Tactics Exploit SVG and CSS Understanding the New Threat
Cybersecurity
Clickjacking Tactics Exploit SVG and CSS: Understanding the New Threat
Security researcher Lyra Rebane reveals a new clickjacking attack method leveraging SVG and CSS. This tactic bypasses traditional defense approaches, demanding updated security measures. Professionals ...
IDEsaster Uncovering Security Flaws in AI-Powered IDEs
Application Security
IDEsaster: Uncovering Security Flaws in AI-Powered IDEs
In an alarming revelation, over 30 security vulnerabilities in AI-powered Integrated Development Environments (IDEs) have been uncovered, potentially impacting countless developers. The collective vulnerabilities have ...
Critical RSC Vulnerability Added to CISA's KEV Catalog Due to Active Exploitation
CVE Vulnerability Alerts
Critical RSC Vulnerability Added to CISA’s KEV Catalog Due to Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a serious flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog. ...
React2Shell Vulnerability Exposes Over 77,000 IPs Worldwide
CVE Vulnerability Alerts
React2Shell Vulnerability Exposes Over 77,000 IPs Worldwide
Over 77,000 Internet-exposed IP addresses are endangered by the critical React2Shell vulnerability, CVE-2025-55182. Attackers have already compromised over 30 organizations, spanning diverse industry sectors. This ...
FBI Warns of Social Media Images Exploited for Virtual Kidnapping Scams
Cybersecurity
FBI Warns of Social Media Images Exploited for Virtual Kidnapping Scams
Criminals are exploiting social media images, altering them for use in virtual kidnapping and extortion scams. The FBI warns the public about these deceptive practices ...
Apache Tika Vulnerability CVE-2025-66516 Exposes Systems to Critical Risks
CVE Vulnerability Alerts
Apache Tika Vulnerability CVE-2025-66516 Exposes Systems to Critical Risks
Apache Tika users face critical risks due to a severe vulnerability allowing XML external entity (XXE) attacks. With a CVSS score of 10.0, the flaw ...
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
Endpoint Security
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
A sophisticated hacking campaign launched on December 2, 2025, is targeting Palo Alto's GlobalProtect portals and SonicWall's SonicOS API endpoints. Involving over 7,000 IPs linked ...
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
Endpoint Security
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
ASUS has verified a disruption resulting from a third-party breach. The Everest ransomware group has claimed responsibility, asserting they compromised companies like ASUS, ArcSoft, and ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Google Introduces Layered Defenses in Chrome to Combat Prompt Injection Vulnerabilities
Google enhances Chrome's security with new features targeting prompt injection vulnerabilities. The update focuses on challenges posed by untrusted web content.
Microsoft Works to Mitigate Copilot Access Issues in Europe
Microsoft is addressing an incident affecting users in Europe who face difficulties accessing its AI-powered Copilot digital assistant. The outage underscores critical reliance on cloud-based ...
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Equixly has successfully raised $11 million to bolster its API penetration testing services by developing proprietary AI models, expanding globally, and recruiting new team members.
Proofpoint Completes Acquisition of Hornetsecurity: A Strategic Move in Cybersecurity
Proofpoint's $1.8 billion transaction with Hornetsecurity signifies a strategic expansion in the cybersecurity landscape. This move underscores the substantial market presence of Hornetsecurity, whose annual ...
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Initial Access Broker Storm-0249 exploits Endpoint Detection and Response (EDR) solutions and Windows utilities to load malware, establish communication channels, and maintain persistence, all to ...
Mirai-based Broadside Botnet Exploits TBK Vision DVRs in Maritime Sector
The Broadside botnet, a Mirai variant, exploits CVE-2024-3721 vulnerabilities in TBK Vision DVRs, posing a threat to maritime logistics.
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
Saviynt, a leading player in identity security, recently raised $700 million in funding led by KKR, enhancing its market valuation to $3 billion. The round ...
EtherRAT Malware Implant Utilizes Linux Persistence Mechanisms in React2Shell Attack
EtherRAT, a new malware implant, is linked to the recent React2Shell cyberattack, exploiting Linux persistence methods and utilizing Ethereum smart contracts for control.
OpenAI Responds to ChatGPT Plus Subscription Controversy Over Ads
ChatGPT Plus users have raised concerns about perceived advertisements. OpenAI defends its approach, clarifying these are app recommendations, not ads.
Portugal Establishes Legal Safe Harbor for Ethical Hackers
Portugal reforms cybercrime law, creating a legal safe harbor for ethical hackers engaged in good-faith security research. This landmark amendment aims to address the growing ...
Clickjacking Tactics Exploit SVG and CSS: Understanding the New Threat
Security researcher Lyra Rebane reveals a new clickjacking attack method leveraging SVG and CSS. This tactic bypasses traditional defense approaches, demanding updated security measures. Professionals ...
IDEsaster: Uncovering Security Flaws in AI-Powered IDEs
In an alarming revelation, over 30 security vulnerabilities in AI-powered Integrated Development Environments (IDEs) have been uncovered, potentially impacting countless developers. The collective vulnerabilities have ...
Critical RSC Vulnerability Added to CISA’s KEV Catalog Due to Active Exploitation
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a serious flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog. ...
React2Shell Vulnerability Exposes Over 77,000 IPs Worldwide
Over 77,000 Internet-exposed IP addresses are endangered by the critical React2Shell vulnerability, CVE-2025-55182. Attackers have already compromised over 30 organizations, spanning diverse industry sectors. This ...
FBI Warns of Social Media Images Exploited for Virtual Kidnapping Scams
Criminals are exploiting social media images, altering them for use in virtual kidnapping and extortion scams. The FBI warns the public about these deceptive practices ...
Apache Tika Vulnerability CVE-2025-66516 Exposes Systems to Critical Risks
Apache Tika users face critical risks due to a severe vulnerability allowing XML external entity (XXE) attacks. With a CVSS score of 10.0, the flaw ...
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
A sophisticated hacking campaign launched on December 2, 2025, is targeting Palo Alto's GlobalProtect portals and SonicWall's SonicOS API endpoints. Involving over 7,000 IPs linked ...
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
ASUS has verified a disruption resulting from a third-party breach. The Everest ransomware group has claimed responsibility, asserting they compromised companies like ASUS, ArcSoft, and ...
India Reverses Decision on Mandating Preinstalled Cybersecurity App on Smartphones
In a surprising turn, the Indian government has withdrawn its directive for smartphone manufacturers to preinstall the “Sanchar Saathi” app. This move follows privacy concerns ...
Virginia Brothers Face Conspiracy Charges Over Alleged Data Theft and Database Destruction
Two brothers in Virginia are accused of conspiring to steal sensitive information and destroy government databases post-termination from their roles as federal contractors. The charges, ...