Cyber Security
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
Russian Ransomware Operator Admits Guilt in U.S. Court
Meta’s Smart Glasses Face Privacy Investigation in Britain
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
HungerRush POS Platform Targeted in Data Extortion Scheme
Fake OpenClaw Installers on GitHub Are Stealing User Data
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
LexisNexis Data Breach Claimed by Fulcrumsec Group
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Madison Square Garden Cyber Incident Revealed Months Later
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
ShinyHunters Leak Exposes Millions of CarGurus User Records
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Cybersecurity
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Newly Disclosed Vulnerability in WatchGuard Firebox Active Exploitation Underway
Application Security
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Thailand Conference Launches International Initiative to Fight Online Scams
Cybersecurity
Thailand Conference Launches International Initiative to Fight Online Scams
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
Cybersecurity
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
Cybersecurity
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
Endpoint Security
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
NIS2 Directive Enhances Identity and Access Control Standards
Identity and Access Management
NIS2 Directive Enhances Identity and Access Control Standards
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
Phishing Attacks by Operation ForumTroll in Russia A Closer Look at October 2025 Campaign
News
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
NATO's Digital Backbone Efforts Winning the Information War
Cybersecurity
NATO’s Digital Backbone Efforts: Winning the Information War
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Application Security
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
Cybersecurity
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
APT28, a Russian state-sponsored threat actor, has launched a persistent credential-harvesting operation against users of UK's UKR[.]net service. The activity was tracked by Recorded Future's ...
ByBit Hack Amplifies North Korean Crypto Theft Surge
Cybersecurity
ByBit Hack Amplifies North Korean Crypto Theft Surge
North Korean hackers have escalated their cryptocurrency thefts, accumulating over $2 billion in 2025 alone. Recent attacks target platforms like ByBit, showcasing sophisticated techniques and ...
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
Cybersecurity
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
Law enforcement successfully seized E-Note cryptocurrency exchange servers and domains, suspected of laundering over $70 million for cybercriminals. Authorities believe E-Note was a key tool ...
LongNosedGoblin A New Threat from China Targets Southeast Asia and Japan
Cybersecurity
LongNosedGoblin: A New Threat from China Targets Southeast Asia and Japan
ESET reports the emergence of LongNosedGoblin, an uncharted threat targeting governmental bodies in Southeast Asia and Japan since September 2023. The group's focus is cyber ...
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Application Security
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Cybercriminals are exploiting vulnerabilities in VPN platforms such as Palo Alto Networks GlobalProtect and Cisco SSL VPN using automated campaigns. These attacks focus on credential-based ...
Study Finds Built-in Browsers Across Gadgets Often Ship Years Out of Date
Application Security
Study Finds Built-in Browsers Across Gadgets Often Ship Years Out of Date
Devices like game consoles and cars often come with embedded browsers that do not receive frequent updates. This negligence can open doors to significant security ...
Data Breach at University of Sydney Reveals Sensitive Information
Data Security
Data Breach at University of Sydney Reveals Sensitive Information
Hackers infiltrated the University of Sydney's online repository, compromising the personal information of staff and students. The breach underscores prevalent cybersecurity challenges in educational institutions, ...
Cryptocurrency Thieves Exploit AWS Mining Operations in Just Ten Minutes
Application Security
Cryptocurrency Thieves Exploit AWS: Mining Operations in Just Ten Minutes
Cryptocurrency thieves are exploiting stolen Amazon Web Services (AWS) account credentials to mine coins, using victims' Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) ...
Surge in Illicit Activities Criminal Use of DIG AI on Tor Network Increases in Q4 2025
Cybersecurity
Surge in Illicit Activities: Criminal Use of DIG AI on Tor Network Increases in Q4 2025
Resecurity reports reveal a Q4 2025 surge in the use of DIG AI among cybercriminals on the Tor network. This development poses significant challenges to ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Thailand Conference Launches International Initiative to Fight Online Scams
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
NIS2 Directive Enhances Identity and Access Control Standards
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
NATO’s Digital Backbone Efforts: Winning the Information War
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
APT28, a Russian state-sponsored threat actor, has launched a persistent credential-harvesting operation against users of UK's UKR[.]net service. The activity was tracked by Recorded Future's ...
ByBit Hack Amplifies North Korean Crypto Theft Surge
North Korean hackers have escalated their cryptocurrency thefts, accumulating over $2 billion in 2025 alone. Recent attacks target platforms like ByBit, showcasing sophisticated techniques and ...
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
Law enforcement successfully seized E-Note cryptocurrency exchange servers and domains, suspected of laundering over $70 million for cybercriminals. Authorities believe E-Note was a key tool ...
LongNosedGoblin: A New Threat from China Targets Southeast Asia and Japan
ESET reports the emergence of LongNosedGoblin, an uncharted threat targeting governmental bodies in Southeast Asia and Japan since September 2023. The group's focus is cyber ...
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Cybercriminals are exploiting vulnerabilities in VPN platforms such as Palo Alto Networks GlobalProtect and Cisco SSL VPN using automated campaigns. These attacks focus on credential-based ...
Study Finds Built-in Browsers Across Gadgets Often Ship Years Out of Date
Devices like game consoles and cars often come with embedded browsers that do not receive frequent updates. This negligence can open doors to significant security ...
Data Breach at University of Sydney Reveals Sensitive Information
Hackers infiltrated the University of Sydney's online repository, compromising the personal information of staff and students. The breach underscores prevalent cybersecurity challenges in educational institutions, ...
Cryptocurrency Thieves Exploit AWS: Mining Operations in Just Ten Minutes
Cryptocurrency thieves are exploiting stolen Amazon Web Services (AWS) account credentials to mine coins, using victims' Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) ...
Surge in Illicit Activities: Criminal Use of DIG AI on Tor Network Increases in Q4 2025
Resecurity reports reveal a Q4 2025 surge in the use of DIG AI among cybercriminals on the Tor network. This development poses significant challenges to ...
GhostPairing Campaign Hijacks WhatsApp Accounts via Device-Linking Feature
Cybercriminals are exploiting WhatsApp's device-linking feature to hijack accounts, a campaign known as GhostPairing. This method involves abusing pairing codes to gain control over unsuspecting ...
FTC Demands Accountability in Illusory Systems Cybersecurity Breach Case
The FTC has proposed a settlement agreement requiring Illusory Systems to repay users for funds lost in a 2022 cyberattack. This regulatory action highlights increased ...
Clop Ransomware Gang Targets Gladinet CentreStack in Data Extortion Attack
The Clop ransomware group is targeting Gladinet CentreStack file servers, focusing on systems vulnerable due to internet exposure. This campaign jeopardizes data security, emphasizing the ...