Cyber Security
React2Shell Exploit Continues to Deliver Undetected Malware Families
Microsoft Advances Teams Security With New Suspicious Traffic Analysis Feature
Microsoft Faces Criticism Over Unresolved .NET Vulnerability
.NET Framework Vulnerability SOAPwn: Impact on Enterprise Applications
Teen Hacker Arrested in Spain for Major Data Breach Scheme
Satellite Signal Interruption Causes Porsche Immobilization in Russia
Ivanti Urges Immediate Patch for Endpoint Manager Vulnerability
Prime Security Secures $20 Million to Advance AI-Powered Security Tools
Microsoft Appoints New Operating CISOs to Enhance AI-Driven Cyberdefense
Fortinet Releases Fixes for Critical Vulnerabilities Affecting FortiOS and Other Products
Adobe’s Comprehensive Security Update Targets Massive Vulnerabilities Array
Microsoft Enhances PowerShell Security With Script Warning Functionality
Microsoft Patches Critical Zero-Day Vulnerability in Windows
Google Introduces Layered Defenses in Chrome to Combat Prompt Injection Vulnerabilities
Microsoft Works to Mitigate Copilot Access Issues in Europe
Equixly Secures $11 Million Investment to Enhance API Penetration Testing Capabilities
Proofpoint Completes Acquisition of Hornetsecurity: A Strategic Move in Cybersecurity
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Mirai-based Broadside Botnet Exploits TBK Vision DVRs in Maritime Sector
Identity Security Firm Saviynt Secures $700 Million in Funding Amid Booming Security Market
EtherRAT Malware Implant Utilizes Linux Persistence Mechanisms in React2Shell Attack
OpenAI Responds to ChatGPT Plus Subscription Controversy Over Ads
Portugal Establishes Legal Safe Harbor for Ethical Hackers
Clickjacking Tactics Exploit SVG and CSS: Understanding the New Threat
IDEsaster: Uncovering Security Flaws in AI-Powered IDEs
FBI Warns of Social Media Images Exploited for Virtual Kidnapping Scams
GlobalProtect Logins and SonicWall APIs Come Under Fire from Hacking Campaign
ASUS Confirms Third-party Breach as Everest Ransomware Group Strikes
India Reverses Decision on Mandating Preinstalled Cybersecurity App on Smartphones
Virginia Brothers Face Conspiracy Charges Over Alleged Data Theft and Database Destruction
Qantas Customer Data Leaked on Dark Web After July Cyberattack
Cybersecurity
Qantas Customer Data Leaked on Dark Web After July Cyberattack
Hackers have leaked data of nearly six million Qantas customers on the dark web after a Salesforce-linked breach, exposing names, contact details, and frequent flyer ...
Discord Breach Exposes 70,000 ID Photos and Raises Questions about Third-Party Age Verification
Cybersecurity
Discord Breach Exposes 70,000 ID Photos and Raises Questions about Third-Party Age Verification
Discord has confirmed that government-issued identification photos belonging to roughly 70,000 users may have been exposed in a third-party breach ...
SimonMed Confirms Data Breach Exposed 1.2 Million Patients in January
Cybersecurity
SimonMed Confirms Data Breach Exposed 1.2 Million Patients in January
SimonMed Imaging says a January 2025 breach exposed data for 1.2 million patients. Medusa claimed theft of 212 GB including scanned IDs, medical records, and ...
Fake “Inflation Refund” Texts Target New Yorkers in Sophisticated Phishing Scam
Cybersecurity
Fake “Inflation Refund” Texts Target New Yorkers in Sophisticated Phishing Scam
Fraudulent “inflation refund” texts are scamming New Yorkers into surrendering personal data. Attackers steal IDs and financial information through fake government portals posing as refund ...
Zero-Day in Gladinet CentreStack and Triofox Actively Exploited
Cybersecurity
Zero-Day in Gladinet CentreStack and Triofox Actively Exploited
CVE-2025-11371, an unauthenticated LFI in Gladinet CentreStack and Triofox, is being exploited to retrieve machine keys and enable remote code execution; admins must apply Web.config ...
LockBit, Qilin, DragonForce Form Ransomware Cartel to Coordinate Attacks
Cybersecurity
LockBit, Qilin, DragonForce Form Ransomware Cartel to Coordinate Attacks
A fresh ransomware cartel reportedly unites LockBit, Qilin and DragonForce to share infrastructure, coordinate attacks and pool revenue, raising defense complexity for incident responders.
Spain Dismantles “GXC Team” Crime-as-a-Service Network and Arrests 25-Year-Old Leader
Cybersecurity
Spain Dismantles “GXC Team” Crime-as-a-Service Network and Arrests 25-Year-Old Leader
Spanish authorities dismantled GXC Team, arresting “GoogleXcoder.” The CaaS network supplied phishing kits, Android malware, and voice-scam tools across countries; tools seized, funds recovered.
Hackers Claim Massive Salesforce Breach Allegedly Exposing 1 Billion Records from Global Customers
Cybersecurity
Hackers Claim Massive Salesforce Breach Allegedly Exposing 1 Billion Records from Global Customers
Hackers claim to have stolen over one billion Salesforce customer records in an alleged breach tied to misconfigured integrations, prompting an active investigation by Salesforce.
Quebec HopHop App Leak Exposes Children’s Data Across Hundreds of Schools and Daycares
Cybersecurity
Quebec HopHop App Leak Exposes Children’s Data Across Hundreds of Schools and Daycares
A vulnerability in the HopHop school pickup app exposed photos, names and pickup controls for children and parents across Quebec, prompting government action and parental ...
Threat Actors Abuse Velociraptor DFIR Tool to Deploy Ransomware and Evade Detection
Cybersecurity
Threat Actors Abuse Velociraptor DFIR Tool to Deploy Ransomware and Evade Detection
Attackers are installing Velociraptor as a covert C2 channel, downloading VS Code with tunneling, staging ransomware payloads—all under the guise of legitimate forensic activity.
SonicWall Confirms Theft of All Firewall Cloud Backups, Urges Immediate Action
Cybersecurity
SonicWall Confirms Theft of All Firewall Cloud Backups, Urges Immediate Action
SonicWall confirmed all customers using cloud backups had firewall configs stolen. Encrypted credentials exposed. Admins must reset credentials, review device lists, and harden firewall access.
FBI Seizes BreachForums Infrastructure Used in Salesforce Extortion Scheme
Cybersecurity
FBI Seizes BreachForums Infrastructure Used in Salesforce Extortion Scheme
The FBI and French authorities seized BreachForums’ domain infrastructure, disrupting ShinyHunters’ Salesforce extortion campaign and signaling a major shift in international cybercrime disruption strategies.
ClayRat Spyware Tricks Android Users by Masquerading as WhatsApp, TikTok and YouTube
Cybersecurity
ClayRat Spyware Tricks Android Users by Masquerading as WhatsApp, TikTok and YouTube
ClayRat Android spyware poses as WhatsApp, TikTok, and YouTube apps, stealing data, intercepting messages, and spreading automatically via SMS links sent to user contacts.
Microsoft Warns of “Payroll Pirate” Attacks Diverting University Salaries
Cybersecurity
Microsoft Warns of “Payroll Pirate” Attacks Diverting University Salaries
Microsoft says threat actor Storm-2657 targeted university employees with phishing and MFA bypasses, enabling compromise of HR systems like Workday and redirection of salaries.
Discord Confirms Potential Age-Verification Vendor Breach Impacting About 70,000 Users
Cybersecurity
Discord Confirms Potential Age-Verification Vendor Breach Impacting About 70,000 Users
Discord has disclosed a potential data breach tied to a third-party age-verification provider that may have exposed official identification photos ...
Unisys Selected by EU Commission to Provide Cybersecurity Services to EU Public Entities
Cybersecurity
Unisys Selected by EU Commission to Provide Cybersecurity Services to EU Public Entities
Unisys has announced that it has been selected by the European Commission to deliver cybersecurity services to public-sector organizations across ...
TwoNet Hacktivists Breach Decoy Water Treatment Plant, Alter PLC Setpoints and Disable Alarms Within 26 Hours
Cybersecurity
TwoNet Hacktivists Breach Decoy Water Treatment Plant, Alter PLC Setpoints and Disable Alarms Within 26 Hours
TwoNet breached a decoy water-treatment HMI in September, altering PLC setpoints and disabling alarms within about 26 hours after exploiting a known XSS vulnerability.
AI Companion Apps Expose Millions of Intimate Messages after Unprotected Kafka Instances
Cybersecurity
AI Companion Apps Expose Millions of Intimate Messages after Unprotected Kafka Instances
Two AI companion apps exposed 43 million messages and 600,000 media files after an unprotected Kafka Broker leaked data for over 400,000 users; instance now ...
Salesforce Refuses to Pay Ransom After Widespread CRM Data-Theft Campaigns
Cybersecurity
Salesforce Refuses to Pay Ransom After Widespread CRM Data-Theft Campaigns
Salesforce refused extortion demands after attackers stole large CRM datasets via OAuth social engineering and stolen SalesLoft tokens; companies are revoking tokens and investigating scope.
Avnet Confirms EMEA Data Breach, Says Stolen Information Is Mostly Unreadable Without Internal Tools
Cybersecurity
Avnet Confirms EMEA Data Breach, Says Stolen Information Is Mostly Unreadable Without Internal Tools
Avnet confirmed a cyberattack on an EMEA cloud storage system. The company said stolen data was largely unreadable without its proprietary tools and global operations ...
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data
Application Security
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data
Docker Hub Data Exposure Puts Thousands of Containers at Risk
Data Security
Docker Hub Data Exposure Puts Thousands of Containers at Risk
React2Shell Exploit Continues to Deliver Undetected Malware Families
Cybersecurity
React2Shell Exploit Continues to Deliver Undetected Malware Families
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep
Application Security
Storm-0249 Exploits EDR and Windows Tools for Ransomware Prep

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project ...
AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly ...
AI-Powered Villager Pen Test Tool Hits 11K Downloads, Sparks Abuse Concerns
Villager, an AI-driven penetration testing tool released on PyPI, has surged past 11,000 downloads by automating network scanning, exploitation, and privilege escalation via natural language ...
Oracle E-Business Suite Hit by Cl0p Ransomware Using CVE-2025-61882
Cl0p ransomware is actively exploiting a zero-day in Oracle E-Business Suite (CVE-2025-61882), allowing unauthenticated remote code execution via the BI Publisher component. The attacks have ...
Microsoft Revokes 200+ Fraudulent Certificates: Thwarts Rhysida Ransomware Campaign
Microsoft has revoked over 200 compromised digital certificates to disrupt a ransomware campaign abusing fake Microsoft Teams installers. Threat actor Vanilla Tempest used SEO poisoning ...
WatchGuard Fireware OS Vulnerability: CVE-2025-9242 Enables Remote Code Execution
A critical flaw in WatchGuard Fireware OS (CVE-2025-9242) allows remote, unauthenticated code execution through vulnerable VPN configurations and is already being actively exploited. Even devices ...
SonicWall VPN Breach: Over 100 Accounts Compromised in Security Incident
Attackers have compromised over 100 SonicWall VPN accounts by exploiting stolen credentials, unpatched vulnerabilities, and OTP seed theft to bypass MFA. Threat groups like UNC6148 ...
Stealit Malware Exploits Node.js: Sneaky Infection via Game and VPN Installers
Cybersecurity researchers have uncovered a stealthy malware campaign abusing Node.js’s Single Executable Application feature to package Stealit malware as fake game and VPN installers. Distributed ...
Linux Rootkit Conceals Itself with eBPF & Magic Packets: Exploiting CVE-2024-23897
A sophisticated Linux rootkit dubbed LinkPro uses eBPF modules and magic TCP packets to stay hidden and activate on demand. Discovered after attackers exploited a ...
GPT-4-Powered MalTerminal Malware Automates Ransomware Creation: Reverse Shells at Scale
MalTerminal, a next-generation malware, embeds GPT-4 to autonomously generate ransomware or reverse shells at runtime, producing unique payloads that bypass signature-based defenses. Researchers say it ...
Wondershare RepairIt Vulnerabilities Exposed: CVE-2025-10643 & 10644 Threaten Data & AI Models
Two critical vulnerabilities in Wondershare RepairIt (CVE-2025-10643 and CVE-2025-10644) allow unauthenticated remote code execution through misconfigured storage tokens. With CVSS scores up to 9.4 and ...
Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that ...
Mango Retailer Confirms Marketing Vendor Breach Exposing Customer Contact Details
MANGO says a marketing vendor compromise exposed customer first names, countries, postal codes, email and phone data. Core accounts, financials, and credentials were not impacted.
NPM Supply Chain Attack: 175 Malicious Packages Target Industrial Firms
A wave of coordinated supply chain attacks is targeting the NPM ecosystem, with over 400 malicious packages used to deploy malware, steal credentials, and compromise ...
F5 Admits Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities
F5 disclosed a breach in which threat actors exfiltrated portions of BIG-IP source code and undisclosed vulnerability information. CISA ordered federal agencies to patch and ...
Sotheby’s Confirms Data Breach Exposing Financial Information
Sotheby’s confirmed a cyber intrusion in July 2025 that exposed names, Social Security numbers and financial account details. It is offering identity monitoring and investigating.
Fake LastPass and Bitwarden “Breach Alerts” Lead to PC Hijacks via Remote Access Tools
Phishing emails impersonating LastPass and Bitwarden lure users to install malicious binaries. The payload deploys Syncro and ScreenConnect for remote PC control, code execution and ...
PowerSchool Hacker Sentenced to Four Years for Cyberattack on Education Platform
A 20-year-old college student has been sentenced to four years in prison for hacking PowerSchool and stealing data from more than 70 million students and ...
ICTBroadcast Servers Under Threat: Cookie Vulnerability Enables Remote Code Execution
A critical vulnerability in ICTBroadcast (CVE-2025-2611) enables unauthenticated remote code execution through malicious session cookies. With public exploits and Metasploit modules available, attackers are actively ...
SAP NetWeaver Patch Released for CVSS 10.0 Deserialization Flaw Vulnerability
A critical CVSS 10.0 vulnerability in SAP NetWeaver AS Java (CVE-2025-42944) allows unauthenticated attackers to remotely execute OS commands through insecure deserialization in the RMI-P4 ...