Cyber Security
Cybersecurity
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Andrew Doyle
December 22, 2025
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Application Security
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
Gabby Lee
December 22, 2025
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Mitchell Langley
December 22, 2025
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Cybersecurity
Thailand Conference Launches International Initiative to Fight Online Scams
Gabby Lee
December 22, 2025
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Cybersecurity
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
Andrew Doyle
December 22, 2025
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Cybersecurity
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
Mitchell Langley
December 22, 2025
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
Endpoint Security
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
Gabby Lee
December 22, 2025
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
Identity and Access Management
NIS2 Directive Enhances Identity and Access Control Standards
Andrew Doyle
December 22, 2025
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
News
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
Mitchell Langley
December 22, 2025
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
Cybersecurity
NATO’s Digital Backbone Efforts: Winning the Information War
Gabby Lee
December 22, 2025
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Application Security
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Andrew Doyle
December 22, 2025
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
Cybersecurity
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
Andrew Doyle
December 22, 2025
APT28, a Russian state-sponsored threat actor, has launched a persistent credential-harvesting operation against users of UK's UKR[.]net service. The activity was tracked by Recorded Future's ...
Cybersecurity
ByBit Hack Amplifies North Korean Crypto Theft Surge
Gabby Lee
December 22, 2025
North Korean hackers have escalated their cryptocurrency thefts, accumulating over $2 billion in 2025 alone. Recent attacks target platforms like ByBit, showcasing sophisticated techniques and ...
Cybersecurity
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
Andrew Doyle
December 22, 2025
Law enforcement successfully seized E-Note cryptocurrency exchange servers and domains, suspected of laundering over $70 million for cybercriminals. Authorities believe E-Note was a key tool ...
Cybersecurity
LongNosedGoblin: A New Threat from China Targets Southeast Asia and Japan
Andrew Doyle
December 22, 2025
ESET reports the emergence of LongNosedGoblin, an uncharted threat targeting governmental bodies in Southeast Asia and Japan since September 2023. The group's focus is cyber ...
Application Security
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Mitchell Langley
December 22, 2025
Cybercriminals are exploiting vulnerabilities in VPN platforms such as Palo Alto Networks GlobalProtect and Cisco SSL VPN using automated campaigns. These attacks focus on credential-based ...
Application Security
Study Finds Built-in Browsers Across Gadgets Often Ship Years Out of Date
Gabby Lee
December 22, 2025
Devices like game consoles and cars often come with embedded browsers that do not receive frequent updates. This negligence can open doors to significant security ...
Data Security
Data Breach at University of Sydney Reveals Sensitive Information
Gabby Lee
December 22, 2025
Hackers infiltrated the University of Sydney's online repository, compromising the personal information of staff and students. The breach underscores prevalent cybersecurity challenges in educational institutions, ...
Application Security
Cryptocurrency Thieves Exploit AWS: Mining Operations in Just Ten Minutes
Andrew Doyle
December 22, 2025
Cryptocurrency thieves are exploiting stolen Amazon Web Services (AWS) account credentials to mine coins, using victims' Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) ...
Cybersecurity
Surge in Illicit Activities: Criminal Use of DIG AI on Tor Network Increases in Q4 2025
Mitchell Langley
December 22, 2025
Resecurity reports reveal a Q4 2025 surge in the use of DIG AI among cybercriminals on the Tor network. This development poses significant challenges to ...
Application Security
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Andrew Doyle
March 6, 2026
TOP CYBERSECURITY HEADLINES
Application Security
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
CVE Vulnerability Alerts
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
This Week’s Security Spotlight
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Andrew Doyle
February 19, 2026
Cybersecurity
CISA Faces Challenges With Limited Resources Amid DHS Shutdown
Andrew Doyle
February 17, 2026
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Thailand Conference Launches International Initiative to Fight Online Scams
December 22, 2025
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
December 22, 2025
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
December 22, 2025
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
December 22, 2025
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
NIS2 Directive Enhances Identity and Access Control Standards
December 22, 2025
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
December 22, 2025
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
NATO’s Digital Backbone Efforts: Winning the Information War
December 22, 2025
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
December 22, 2025
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
December 22, 2025
APT28, a Russian state-sponsored threat actor, has launched a persistent credential-harvesting operation against users of UK's UKR[.]net service. The activity was tracked by Recorded Future's ...
ByBit Hack Amplifies North Korean Crypto Theft Surge
December 22, 2025
North Korean hackers have escalated their cryptocurrency thefts, accumulating over $2 billion in 2025 alone. Recent attacks target platforms like ByBit, showcasing sophisticated techniques and ...
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
December 22, 2025
Law enforcement successfully seized E-Note cryptocurrency exchange servers and domains, suspected of laundering over $70 million for cybercriminals. Authorities believe E-Note was a key tool ...
LongNosedGoblin: A New Threat from China Targets Southeast Asia and Japan
December 22, 2025
ESET reports the emergence of LongNosedGoblin, an uncharted threat targeting governmental bodies in Southeast Asia and Japan since September 2023. The group's focus is cyber ...
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
December 22, 2025
Cybercriminals are exploiting vulnerabilities in VPN platforms such as Palo Alto Networks GlobalProtect and Cisco SSL VPN using automated campaigns. These attacks focus on credential-based ...
Study Finds Built-in Browsers Across Gadgets Often Ship Years Out of Date
December 22, 2025
Devices like game consoles and cars often come with embedded browsers that do not receive frequent updates. This negligence can open doors to significant security ...
Data Breach at University of Sydney Reveals Sensitive Information
December 22, 2025
Hackers infiltrated the University of Sydney's online repository, compromising the personal information of staff and students. The breach underscores prevalent cybersecurity challenges in educational institutions, ...
Cryptocurrency Thieves Exploit AWS: Mining Operations in Just Ten Minutes
December 22, 2025
Cryptocurrency thieves are exploiting stolen Amazon Web Services (AWS) account credentials to mine coins, using victims' Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) ...
Surge in Illicit Activities: Criminal Use of DIG AI on Tor Network Increases in Q4 2025
December 22, 2025
Resecurity reports reveal a Q4 2025 surge in the use of DIG AI among cybercriminals on the Tor network. This development poses significant challenges to ...
GhostPairing Campaign Hijacks WhatsApp Accounts via Device-Linking Feature
December 22, 2025
Cybercriminals are exploiting WhatsApp's device-linking feature to hijack accounts, a campaign known as GhostPairing. This method involves abusing pairing codes to gain control over unsuspecting ...
FTC Demands Accountability in Illusory Systems Cybersecurity Breach Case
December 22, 2025
The FTC has proposed a settlement agreement requiring Illusory Systems to repay users for funds lost in a 2022 cyberattack. This regulatory action highlights increased ...
Clop Ransomware Gang Targets Gladinet CentreStack in Data Extortion Attack
December 19, 2025
The Clop ransomware group is targeting Gladinet CentreStack file servers, focusing on systems vulnerable due to internet exposure. This campaign jeopardizes data security, emphasizing the ...











![Russian Hackers Target UKR[.]net in Credential-Stealing Campaign](https://dailysecurityreview.com/wp-content/uploads/2025/12/Russian-Hackers-Target-UKR.net-in-Credential-Stealing-Campaign.png)


























