Cyber Security
RansomHouse Breaches Trellix; Source Code Repositories Accessed
Fake OpenAI Repo Trended on Hugging Face Before Malware Found
MacSync Infostealer Weaponizes Google Ads and Claude.ai Chats
Germany, Spain Dismantle Rebooted Crimenetwork, Arrest Operator
TCLBanker Trojan Spreads via WhatsApp and Outlook, Hits 59 Banks
cPanel and WHM Patch Three CVEs, Two Rated High Severity
Twelve Critical vm2 Vulnerabilities Allow Node.js Sandbox Escape
Fake Claude AI Site Delivers New Beagle Windows Backdoor
RCE, MCP OAuth Hijack, and Prompt Injection Found in Claude Dev Tools
“Dirty Frag” Zero-Day Grants Root Access on Most Linux Distributions
Zara Data Breach Exposes Personal Data of More Than 197,000 Customers
Nation-State Actors Exploited PAN-OS CVE-2026-0300 for Nearly a Month
Actively Exploited Ivanti EPMM CVE-2026-6973 Added to CISA KEV
ZiChatBot Backdoor Uses Zulip API as C2 in PyPI Supply Chain Attack
TCLBanker Trojan Spread via Fake Logitech Installers Hits 59 Platforms
Quasar Linux RAT Hijacks Developer Systems to Compromise Supply Chains
PCPJack Malware Exploits Five CVEs to Worm Across Cloud Environments
Virginia Contractor Convicted for Destroying Federal Databases
ACSC Warns of Active ClickFix Campaigns Delivering Vidar Stealer
Two Americans Jailed for Running North Korean IT Worker Laptop Farms
GothFerrari Gets 6.5 Years for $250M Crypto Home-Invasion Theft Ring
DAEMON Tools Build Breach Spread Three-Stage Backdoor for 27 Days
PamDOORa Linux PAM Backdoor Sold for $1,600, Grants Covert SSH Access
Sygnia Responder, DigitalMint Negotiator Sentenced for BlackCat Role
Nefilim Affiliate Stryzhak Sentenced in U.S. for Ransomware Campaign
Trend Micro: QLNX Implant Targets Developers for Supply Chain Attacks
MetInfo CVE-2026-29014 Exploited – Unauthenticated PHP Code Injection
FTC Bans Data Broker Kochava from Selling Americans Location Data
Apache CVE-2026-23918 Enables DoS and RCE in HTTP/2 — Patch to 2.4.67
China-Linked UAT-8302 Targets Governments in South America and Europe
Critical Security Vulnerabilities Redis Found at Risk of Unauthenticated RCE
Application Security
Critical Security Vulnerabilities: Redis Found at Risk of Unauthenticated RCE
Recent discovery of a security flaw in Redis has left the system vulnerable to unauthenticated remote code execution (RCE). This unsettling development can have dire ...
AMD's ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Endpoint Security
AMD’s ‘StackWarp’ Exploit Raises Concerns for Confidential Virtual Machines
Researchers spotlight the ‘StackWarp’ attack, a novel methodology targeting AMD processors. This vulnerability enables remote code execution in confidential virtual machines (VMs), challenging security paradigms ...
Visual Studio Code's Copilot Studio Extension Now Widely Available
Application Security
Visual Studio Code’s Copilot Studio Extension Now Widely Available
Microsoft's Copilot Studio extension for Visual Studio Code, designed to bolster application security, is now accessible to all users. This extension aims to enhance development ...
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
Application Security
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
A significant flaw in AWS CodeBuild could have exposed the cloud provider's GitHub repositories to unauthorized access, posing risks to multiple AWS environments. Addressed by ...
Critical Vulnerability in Modular DS WordPress Plugin Exploited
Application Security
Critical Vulnerability in Modular DS WordPress Plugin Exploited
A serious security flaw in the Modular DS WordPress plugin has been identified and exploited, permitting unauthenticated privilege escalation. This vulnerability, CVE-2026-23550, has a maximum ...
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
News
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
ConsentFix exploits browser-based OAuth flows to hijack Microsoft accounts. Understanding its mechanisms can help protect against this evolving phishing threat.
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Cybersecurity
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Microsoft and law enforcement have disrupted the RedVDS cybercrime operation, which facilitated phishing and other malicious activities. This operation involves seizing digital infrastructure and pursuing ...
Critical Remote Code Execution Threat in Fortinet's SIEM Solution Exposed
Cybersecurity
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
A significant vulnerability has been identified in Fortinet's Security Information and Event Management (SIEM) product. This flaw could let a remote attacker execute commands or ...
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
Cybersecurity
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
VoidLink, a sophisticated Linux malware, exploits cloud environments with 37 plugins enabling activities from reconnaissance to lateral movement, posing serious risks.
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Application Security
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet's Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Application Security
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Cybersecurity
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
A judicial decision marked a win for CrowdStrike as an investor lawsuit was dismissed due to inadequate evidence of intent to defraud investors following a ...
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Cybersecurity
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Lumen Technologies’ Black Lotus Labs null-routed traffic to more than 550 command-and-control nodes since October 2025, targeting AISURU and Kimwolf botnets. These networks exploit devices ...
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Data Security
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Two French telecom companies were fined €42 million by CNIL for GDPR violations. The breaches revealed significant lapses in security protocols.
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Cybersecurity
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine's Defense Amid Rising Cyber Threats
Cybersecurity
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Cybersecurity
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Verizon Wireless faces sweeping outages in the United States, leaving customers unable to access cellular services. Many report phones stuck in SOS mode, impacting communication ...
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
Cybersecurity
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Application Security
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Application Security
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Cybersecurity
NVIDIA GeForce NOW Breach Exposes Armenian Users’ Data
Application Security
Fake OpenAI Repo Trended on Hugging Face Before Malware Found
Cybersecurity
MacSync Infostealer Weaponizes Google Ads and Claude.ai Chats
Kaspersky DAEMON Tools Backdoored in Supply Chain Attack
Cybersecurity
Kaspersky: DAEMON Tools Backdoored in Supply Chain Attack
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
AWS CodeBuild Critical Security Flaw Exposed GitHub Repositories
A significant flaw in AWS CodeBuild could have exposed the cloud provider's GitHub repositories to unauthorized access, posing risks to multiple AWS environments. Addressed by ...
Critical Vulnerability in Modular DS WordPress Plugin Exploited
A serious security flaw in the Modular DS WordPress plugin has been identified and exploited, permitting unauthenticated privilege escalation. This vulnerability, CVE-2026-23550, has a maximum ...
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
ConsentFix exploits browser-based OAuth flows to hijack Microsoft accounts. Understanding its mechanisms can help protect against this evolving phishing threat.
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Microsoft and law enforcement have disrupted the RedVDS cybercrime operation, which facilitated phishing and other malicious activities. This operation involves seizing digital infrastructure and pursuing ...
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
A significant vulnerability has been identified in Fortinet's Security Information and Event Management (SIEM) product. This flaw could let a remote attacker execute commands or ...
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
VoidLink, a sophisticated Linux malware, exploits cloud environments with 37 plugins enabling activities from reconnaissance to lateral movement, posing serious risks.
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
A judicial decision marked a win for CrowdStrike as an investor lawsuit was dismissed due to inadequate evidence of intent to defraud investors following a ...
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Lumen Technologies’ Black Lotus Labs null-routed traffic to more than 550 command-and-control nodes since October 2025, targeting AISURU and Kimwolf botnets. These networks exploit devices ...
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Two French telecom companies were fined €42 million by CNIL for GDPR violations. The breaches revealed significant lapses in security protocols.
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Verizon Wireless faces sweeping outages in the United States, leaving customers unable to access cellular services. Many report phones stuck in SOS mode, impacting communication ...
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Fried Frank Data Breach: Implications for High-Profile Clients
The prestigious law firm Fried Frank has recently experienced a data breach, affecting confidential information related to its high-profile clientele. Notable entities such as JPMorgan ...
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
CrowdStrike announces a $420 million deal to acquire Seraphic, bolstering its capabilities in browser security. This acquisition, following a recent identity security purchase, reinforces CrowdStrike's ...
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since ...