Cyber Security
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Infinity Stealer Malware Takes Aim at macOS Systems
Iranian Hackers Breach FBI Director’s Personal Email Account
European Commission Responds to Cloud Infrastructure Cyberattack
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
CareCloud Responds to a Potential Data Security Breach
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Firefox 149 Launches with a Built-In VPN for Better Privacy
FCC Adds Consumer Routers to Covered List Amid Security Concerns
DOE Rolls Out Project Armor to Fortify Critical Energy Infrastructure
Cybercriminals Exploit Google Ads in a Deceptive Tax Document Malvertising Campaign
Dutch Ministry of Finance Hit by Cyberattack as Data Breach Investigation Continues
Open Source Projects Face a Rising Tide of Malware Infections
Major Announcements from RSAC 2026: What Day 1 Revealed
QualDerm Partners Data Breach Hits Over 3.1 Million People
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Gartner Publishes Its First Market Guide for Guardian Agents
Software Supply Chains Are the New Frontline for Cyber Risk
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
Cybersecurity
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
News
Clop Ransomware Breach Compromises University of Phoenix Data
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
Cybersecurity
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...
Iranian Hacker Group Infy Resurfaces New Activities Unearthed
Cybersecurity
PwC Promotes Responsible Innovation in the Era of AI
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
News
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...
A Deliberate Attempt to Induce an Outage at NIST Raises Concerns
Cybersecurity
A Deliberate Attempt to Induce an Outage at NIST Raises Concerns
A NIST staff member recently attempted to disable backup generators supporting its Network Time Protocol infrastructure during a power outage around Boulder, Colorado, causing network ...
U.S. Department of Justice Indicts 54 Individuals in ATM Jackpotting Scheme
Cybersecurity
U.S. Department of Justice Indicts 54 Individuals in ATM Jackpotting Scheme
The U.S. Department of Justice has charged 54 people linked to a large-scale ATM jackpotting plot using Ploutus malware, targeting ATMs nationwide. The participants belong ...
Denmark Accuses Russia of Cyberattack on Water Utility A Clash in Hybrid Warfare
Cybersecurity
Denmark Accuses Russia of Cyberattack on Water Utility: A Clash in Hybrid Warfare
Denmark points to Russia in a cyberattack targeting a Danish water utility, situating it within a broader pattern of hybrid warfare by Moscow against Western ...
RansomHouse Transitions to a Multi-layered RaaS Encryptor
News
RansomHouse Transitions to a Multi-layered RaaS Encryptor
RansomHouse has enhanced their ransomware-as-a-service (RaaS) platform by transitioning from a simple single-phase encryption technique to a sophisticated multi-layered method. This development aims to complicate ...
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Cybersecurity
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Newly Disclosed Vulnerability in WatchGuard Firebox Active Exploitation Underway
Application Security
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Application Security
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Thailand Conference Launches International Initiative to Fight Online Scams
Cybersecurity
Thailand Conference Launches International Initiative to Fight Online Scams
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
Cybersecurity
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
Cybersecurity
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
Endpoint Security
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
NIS2 Directive Enhances Identity and Access Control Standards
Identity and Access Management
NIS2 Directive Enhances Identity and Access Control Standards
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
Phishing Attacks by Operation ForumTroll in Russia A Closer Look at October 2025 Campaign
News
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
NATO's Digital Backbone Efforts Winning the Information War
Cybersecurity
NATO’s Digital Backbone Efforts: Winning the Information War
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Application Security
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
PwC Promotes Responsible Innovation in the Era of AI
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...
A Deliberate Attempt to Induce an Outage at NIST Raises Concerns
A NIST staff member recently attempted to disable backup generators supporting its Network Time Protocol infrastructure during a power outage around Boulder, Colorado, causing network ...
U.S. Department of Justice Indicts 54 Individuals in ATM Jackpotting Scheme
The U.S. Department of Justice has charged 54 people linked to a large-scale ATM jackpotting plot using Ploutus malware, targeting ATMs nationwide. The participants belong ...
Denmark Accuses Russia of Cyberattack on Water Utility: A Clash in Hybrid Warfare
Denmark points to Russia in a cyberattack targeting a Danish water utility, situating it within a broader pattern of hybrid warfare by Moscow against Western ...
RansomHouse Transitions to a Multi-layered RaaS Encryptor
RansomHouse has enhanced their ransomware-as-a-service (RaaS) platform by transitioning from a simple single-phase encryption technique to a sophisticated multi-layered method. This development aims to complicate ...
Arrests in Nigeria Reveal Cyberattack Links to Raccoon0365 and Microsoft 365
Three individuals in Nigeria, targeting Microsoft 365 users via Raccoon0365, have been detained. Learn about the phishing-as-a-service method they used.
Newly Disclosed Vulnerability in WatchGuard Firebox: Active Exploitation Underway
A critical remote code execution flaw in WatchGuard's Firebox firewalls has come under active exploitation. Users are urged to implement the latest security measures to ...
Microsoft Teams Outage Affects Thousands of Users Trying to Send Messages
Microsoft Teams experienced a significant outage with thousands unable to send messages. Users faced delays and disruptions in communication, impacting productivity.
Thailand Conference Launches International Initiative to Fight Online Scams
The conference in Bangkok united cybersecurity experts and ASEAN members to combat online scams, focusing on technology, regulation, and partnerships.
Latest Charges Amplify Indictments Against Alleged Tren de Aragua Members
A Venezuelan gang, labeled a ruthless terrorist organization by U.S. officials, faces charges for deploying malware on ATMs. This cyber attack strategy allowed the gang ...
Vulnerabilities in SonicWall Remote-Access Appliance Threaten Security
SonicWall urges users to patch a critical zero-day vulnerability in its SMA 1000 remote-access appliance. This flaw allows attackers to escalate privileges and potentially seize ...
UEFI Vulnerability Exposes Major Motherboards to Early-Boot Attacks
A critical Unified Extensible Firmware Interface (UEFI) vulnerability has been identified in major motherboard brands like ASRock, Asus, Gigabyte, and MSI. This flaw potentially opens ...
NIS2 Directive Enhances Identity and Access Control Standards
The NIS2 Directive places heightened emphasis on identity and access controls, turning weak passwords and inadequate authentication into compliance risks. Specops Software advises on aligning ...
Phishing Attacks by Operation ForumTroll in Russia: A Closer Look at October 2025 Campaign
In October 2025, new phishing attacks by Operation ForumTroll targeted individuals within Russia, shifting focus from organizations previously attacked in spring.
NATO’s Digital Backbone Efforts: Winning the Information War
NATO focuses on developing sovereign cloud-based technologies to secure its operations. The alliance is in a race to build a robust digital infrastructure that can ...
Microsoft Folder Permission Changes Lead to Queue Failures and Erroneous Error Messages
Microsoft’s recent update to folder permissions in older Windows versions has led to unexpected queue failures caused by the misleading error messages produced. Despite organizations ...
Russian Hackers Target UKR[.]net in Credential-Stealing Campaign
APT28, a Russian state-sponsored threat actor, has launched a persistent credential-harvesting operation against users of UK's UKR[.]net service. The activity was tracked by Recorded Future's ...
ByBit Hack Amplifies North Korean Crypto Theft Surge
North Korean hackers have escalated their cryptocurrency thefts, accumulating over $2 billion in 2025 alone. Recent attacks target platforms like ByBit, showcasing sophisticated techniques and ...
Law Enforcement Shuts Down E-Note Exchange for Money Laundering
Law enforcement successfully seized E-Note cryptocurrency exchange servers and domains, suspected of laundering over $70 million for cybercriminals. Authorities believe E-Note was a key tool ...