Cyber Security
Severe Command Injection Flaw Discovered in SGLang
Serial-to-IP Converter Flaws in Lantronix and Silex Products Put Critical Systems at Risk
Scottish Man Pleads Guilty in $8 Million Cryptocurrency Heist
Cyberattacks Are Outpacing MSP and Corporate Defenses
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Lawmakers’ Concerns About AI Include Worries of Potential ‘Destruction’
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Cybersecurity
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine's Defense Amid Rising Cyber Threats
Cybersecurity
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Cybersecurity
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Verizon Wireless faces sweeping outages in the United States, leaving customers unable to access cellular services. Many report phones stuck in SOS mode, impacting communication ...
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
Cybersecurity
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Application Security
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Application Security
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Fried Frank Data Breach Implications for High-Profile Clients
Data Security
Fried Frank Data Breach: Implications for High-Profile Clients
The prestigious law firm Fried Frank has recently experienced a data breach, affecting confidential information related to its high-profile clientele. Notable entities such as JPMorgan ...
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
Cybersecurity
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
CrowdStrike announces a $420 million deal to acquire Seraphic, bolstering its capabilities in browser security. This acquisition, following a recent identity security purchase, reinforces CrowdStrike's ...
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since ...
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Cybersecurity
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Belgian healthcare facility AZ Monica was hit by a cyberattack, leading to a temporary shutdown of all servers, the cancellation of procedures, and patient transfers. ...
Adobe's Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Application Security
Adobe’s Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Adobe recently released updates to resolve 25 vulnerabilities across its software products. A critical bug in ColdFusion, linked to Apache Tika, is among the flaws ...
Central Maine Healthcare Data Breach Sensitive Information of Over 145,000 at Risk
Data Security
Central Maine Healthcare Data Breach: Sensitive Information of Over 145,000 at Risk
Central Maine Healthcare suffered a data breach affecting more than 145,000 individuals. Sensitive data such as Social Security numbers and addresses was potentially exposed. Investigators ...
Microsoft Enhances Secure Boot Certificates for Windows 11
Application Security
Microsoft Enhances Secure Boot Certificates for Windows 11
Microsoft introduces updated Secure Boot certificates for eligible Windows 11 systems, aiming to bolster security through automated installations, adding precautionary measures against past vulnerabilities.
CISO Strategies for 2026 Navigating Future Cybersecurity Challenges
Cybersecurity
CISO Strategies for 2026: Navigating Future Cybersecurity Challenges
The cybersecurity landscape in 2026 demands that Chief Information Security Officers (CISOs) adapt to new challenges and opportunities. Strategic foresight into emerging threats, technological evolution, ...
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
Cybersecurity
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
The University of Hawaii’s Cancer Center faced a ransomware attack in August 2025, compromising study participants’ data, including old Social Security numbers.
Implementing Access Reviews to Enhance Security in Microsoft 365
Application Security
Implementing Access Reviews to Enhance Security in Microsoft 365
Microsoft 365 simplifies file sharing, potentially exposing organizations to data breaches. Access reviews can mitigate these risks by controlling permissions.
Telegram's Proxy Link Vulnerability Exposes IP Addresses
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Users' IP addresses are at risk when interacting with seemingly harmless Telegram proxy links. Learn about how Telegram is enhancing its security to mitigate these ...
Endesa Cyberattack Results in Customer Data Exposure
Data Security
Endesa Cyberattack Results in Customer Data Exposure
Spanish energy provider Endesa, along with its subsidiary Energía XXI, reported hackers gained access to their systems, exposing customer contract information. Personal data, including financial ...
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
Application Security
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) mandates government agencies to immediately secure systems against a high-severity Gogs vulnerability, CVE-2025-8110, exploited in the wild. Organizations ...
Meta Addresses Security Vulnerability in Instagram Password Resets
Application Security
Meta Addresses Security Vulnerability in Instagram Password Resets
Meta recently resolved a flaw in Instagram’s password reset process that allowed unauthorized entities to trigger reset emails, raising security concerns. Despite addressing this issue, ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Fried Frank Data Breach: Implications for High-Profile Clients
The prestigious law firm Fried Frank has recently experienced a data breach, affecting confidential information related to its high-profile clientele. Notable entities such as JPMorgan ...
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
CrowdStrike announces a $420 million deal to acquire Seraphic, bolstering its capabilities in browser security. This acquisition, following a recent identity security purchase, reinforces CrowdStrike's ...
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since ...
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Belgian healthcare facility AZ Monica was hit by a cyberattack, leading to a temporary shutdown of all servers, the cancellation of procedures, and patient transfers. ...
Adobe’s Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Adobe recently released updates to resolve 25 vulnerabilities across its software products. A critical bug in ColdFusion, linked to Apache Tika, is among the flaws ...
Central Maine Healthcare Data Breach: Sensitive Information of Over 145,000 at Risk
Central Maine Healthcare suffered a data breach affecting more than 145,000 individuals. Sensitive data such as Social Security numbers and addresses was potentially exposed. Investigators ...
Microsoft Enhances Secure Boot Certificates for Windows 11
Microsoft introduces updated Secure Boot certificates for eligible Windows 11 systems, aiming to bolster security through automated installations, adding precautionary measures against past vulnerabilities.
CISO Strategies for 2026: Navigating Future Cybersecurity Challenges
The cybersecurity landscape in 2026 demands that Chief Information Security Officers (CISOs) adapt to new challenges and opportunities. Strategic foresight into emerging threats, technological evolution, ...
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
The University of Hawaii’s Cancer Center faced a ransomware attack in August 2025, compromising study participants’ data, including old Social Security numbers.
Implementing Access Reviews to Enhance Security in Microsoft 365
Microsoft 365 simplifies file sharing, potentially exposing organizations to data breaches. Access reviews can mitigate these risks by controlling permissions.
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Users' IP addresses are at risk when interacting with seemingly harmless Telegram proxy links. Learn about how Telegram is enhancing its security to mitigate these ...
Endesa Cyberattack Results in Customer Data Exposure
Spanish energy provider Endesa, along with its subsidiary Energía XXI, reported hackers gained access to their systems, exposing customer contract information. Personal data, including financial ...
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) mandates government agencies to immediately secure systems against a high-severity Gogs vulnerability, CVE-2025-8110, exploited in the wild. Organizations ...
Meta Addresses Security Vulnerability in Instagram Password Resets
Meta recently resolved a flaw in Instagram’s password reset process that allowed unauthorized entities to trigger reset emails, raising security concerns. Despite addressing this issue, ...
AI and Security: Block’s CISO Discusses AI Agents’ Potential
AI agents should surpass human capabilities in security, akin to self-driving cars, says Block's CISO James Nettesheim. In a discussion with The Register, Nettesheim outlines ...
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Apex Legends players were rudely interrupted over the weekend when malicious actors took control of their in-game characters. The intrusions included disconnecting players and tampering ...
Target’s Source Code Allegedly Exposed in Cyber Breach
Allegations have surfaced of hackers offering Target Corporation’s internal code for sale. The incident came to light after files suggesting a breach were seen on ...