Cyber Security
MetInfo CVE-2026-29014 Exploited – Unauthenticated PHP Code Injection
FTC Bans Data Broker Kochava from Selling Americans Location Data
Apache CVE-2026-23918 Enables DoS and RCE in HTTP/2 — Patch to 2.4.67
China-Linked UAT-8302 Targets Governments in South America and Europe
Karakurt Negotiator Gets 8.5 Years in First U.S. Conviction
Microsoft: AiTM Phishing Hit 35,000 Users in 26 Countries
Palo Alto CVE-2026-0300 Under Active Attack — Patch Due May 13
cPanel CVE-2026-41940 Exploited Within 24 Hours, Ransomware Deployed
Kaspersky: DAEMON Tools Backdoored in Supply Chain Attack
ShinyHunters Claims 280 Million Canvas Records Lifted from Instructure
MOVEit Is Back in the Crosshairs: CVSS 9.8 Flaw in Automation
HR Emails Are the New Phishing Bait — And MFA Won’t Save You
SimpleHelp and ScreenConnect: The IT Tools That Became a Backdoor
11 Million Downloads, One Poisoned Version: PyTorch’s Close Call
Hacking the Hackers: What a Security Vendor Breach Really Means
Signed, Sealed, Stolen: Hackers Used DigiCert to Certify Malware
Five Intelligence Agencies Agree: Slow Down Your AI Agents
275 Million Students’ Records Allegedly Stolen in Canvas Breach
Tax Season Never Really Ends for Hackers
When Amazon Sends the Phishing Email
WhatsApp Patches Flaws That Let Hackers Hide Malware in Plain Sight
North Korea Turned a Gaming App Into a Spyware Platform
Debug Mode Left Open: Enterprise Platform Hit With Unauthenticated RCE
One Zero-Day, 40,000 Servers: The cPanel Mass-Compromise
Confident Posture: Navigating Ransomware Incidents with Expert Guidance
Threat Actors Are Ramping Up Microsoft Teams Exploitation for Network Access
Cybercriminals Are Bending Trust, Not Breaking Systems
Anthropic’s Claude Desktop Unauthorized Installations Raise EU Law Compliance Concerns
Severe Command Injection Flaw Discovered in SGLang
Serial-to-IP Converter Flaws in Lantronix and Silex Products Put Critical Systems at Risk
Microsoft Enhances Secure Boot Certificates for Windows 11
Application Security
Microsoft Enhances Secure Boot Certificates for Windows 11
Microsoft introduces updated Secure Boot certificates for eligible Windows 11 systems, aiming to bolster security through automated installations, adding precautionary measures against past vulnerabilities.
CISO Strategies for 2026 Navigating Future Cybersecurity Challenges
Cybersecurity
CISO Strategies for 2026: Navigating Future Cybersecurity Challenges
The cybersecurity landscape in 2026 demands that Chief Information Security Officers (CISOs) adapt to new challenges and opportunities. Strategic foresight into emerging threats, technological evolution, ...
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
Cybersecurity
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
The University of Hawaii’s Cancer Center faced a ransomware attack in August 2025, compromising study participants’ data, including old Social Security numbers.
Implementing Access Reviews to Enhance Security in Microsoft 365
Application Security
Implementing Access Reviews to Enhance Security in Microsoft 365
Microsoft 365 simplifies file sharing, potentially exposing organizations to data breaches. Access reviews can mitigate these risks by controlling permissions.
Telegram's Proxy Link Vulnerability Exposes IP Addresses
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Users' IP addresses are at risk when interacting with seemingly harmless Telegram proxy links. Learn about how Telegram is enhancing its security to mitigate these ...
Endesa Cyberattack Results in Customer Data Exposure
Data Security
Endesa Cyberattack Results in Customer Data Exposure
Spanish energy provider Endesa, along with its subsidiary Energía XXI, reported hackers gained access to their systems, exposing customer contract information. Personal data, including financial ...
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
Application Security
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) mandates government agencies to immediately secure systems against a high-severity Gogs vulnerability, CVE-2025-8110, exploited in the wild. Organizations ...
Meta Addresses Security Vulnerability in Instagram Password Resets
Application Security
Meta Addresses Security Vulnerability in Instagram Password Resets
Meta recently resolved a flaw in Instagram’s password reset process that allowed unauthorized entities to trigger reset emails, raising security concerns. Despite addressing this issue, ...
AI and Security Block's CISO Discusses AI Agents' Potential
Cybersecurity
AI and Security: Block’s CISO Discusses AI Agents’ Potential
AI agents should surpass human capabilities in security, akin to self-driving cars, says Block's CISO James Nettesheim. In a discussion with The Register, Nettesheim outlines ...
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Application Security
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Apex Legends players were rudely interrupted over the weekend when malicious actors took control of their in-game characters. The intrusions included disconnecting players and tampering ...
Target's Source Code Allegedly Exposed in Cyber Breach
Cybersecurity
Target’s Source Code Allegedly Exposed in Cyber Breach
Allegations have surfaced of hackers offering Target Corporation’s internal code for sale. The incident came to light after files suggesting a breach were seen on ...
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
Blog
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
Drones are now embedded in public safety, energy, and defense operations, making their networks a critical attack surface. This blog explores how fragile connectivity, legacy ...
California Privacy Protection Agency Takes Action Against Datamasters for Unauthorized Data Sales
Data Security
California Privacy Protection Agency Takes Action Against Datamasters for Unauthorized Data Sales
Datamasters faces legal action for selling health and personal data without proper registration. Learn how the agency enforces California's data privacy laws.
Instagram Data Breach Affects 17.5 Million Users Security Implications Explored
Application Security
Instagram Data Breach Affects 17.5 Million Users: Security Implications Explored
A significant data breach has compromised the personal details of approximately 17.5 million Instagram users. This breach, as reported by Malwarebytes Labs researchers, has exposed ...
U.S. Immigration and Customs Enforcement's Surveillance Tactics Scrutinized
Information Security
U.S. Immigration and Customs Enforcement’s Surveillance Tactics Scrutinized
The U.S. Immigration and Customs Enforcement (ICE) is under scrutiny for its substantial investment in surveillance technology, drawing criticism for privacy implications and its role ...
UK Government Faces Rising Cybersecurity Concerns Amid Legal Aid and Foreign Office Attacks
Cybersecurity
UK Government Faces Rising Cybersecurity Concerns Amid Legal Aid and Foreign Office Attacks
The UK's cybersecurity standards are in question after breaches at the Legal Aid Agency and Foreign Office. Without legal obligations to meet previous EU standards, ...
Authorities in Spain Dismantle Cyber Fraud Network Tied to Black Axe Group
News
Authorities in Spain Dismantle Cyber Fraud Network Tied to Black Axe Group
Officials in Spain apprehended 34 individuals linked to a sophisticated cyber fraud organization. Suspected of affiliations with the notorious Black Axe group, these arrests are ...
Ireland Recalls Thousands of Passports Due to Software-Induced Printing Defect
Data Security
Ireland Recalls Thousands of Passports Due to Software-Induced Printing Defect
Ireland's Foreign Affairs Department has recalled 13,000 passports after a software update led to a printing issue, rendering them non-compliant with international standards and potentially ...
BreachForums Re-emerges Only to Fall Victim to Data Breach
Application Security
BreachForums Re-emerges Only to Fall Victim to Data Breach
The latest iteration of BreachForums, a well-known hacking community, has suffered a data breach with its user database leaked online. The breach occurred despite recent ...
Anthropic Responds to Viral Allegations of Account Bans
Cybersecurity
Anthropic Responds to Viral Allegations of Account Bans
Anthropic, the company behind Claude AI, addresses allegations of unauthorized account bans. The viral post on X stirred significant discussion among users.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Kaspersky DAEMON Tools Backdoored in Supply Chain Attack
Cybersecurity
Kaspersky: DAEMON Tools Backdoored in Supply Chain Attack
Signed, Sealed, Stolen Hackers Used DigiCert to Certify Malware
Application Security
Signed, Sealed, Stolen: Hackers Used DigiCert to Certify Malware
When Amazon Sends the Phishing Email
Cybersecurity
When Amazon Sends the Phishing Email
Application Security
Anthropic’s Claude Desktop Unauthorized Installations Raise EU Law Compliance Concerns
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Implementing Access Reviews to Enhance Security in Microsoft 365
Microsoft 365 simplifies file sharing, potentially exposing organizations to data breaches. Access reviews can mitigate these risks by controlling permissions.
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Users' IP addresses are at risk when interacting with seemingly harmless Telegram proxy links. Learn about how Telegram is enhancing its security to mitigate these ...
Endesa Cyberattack Results in Customer Data Exposure
Spanish energy provider Endesa, along with its subsidiary Energía XXI, reported hackers gained access to their systems, exposing customer contract information. Personal data, including financial ...
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) mandates government agencies to immediately secure systems against a high-severity Gogs vulnerability, CVE-2025-8110, exploited in the wild. Organizations ...
Meta Addresses Security Vulnerability in Instagram Password Resets
Meta recently resolved a flaw in Instagram’s password reset process that allowed unauthorized entities to trigger reset emails, raising security concerns. Despite addressing this issue, ...
AI and Security: Block’s CISO Discusses AI Agents’ Potential
AI agents should surpass human capabilities in security, akin to self-driving cars, says Block's CISO James Nettesheim. In a discussion with The Register, Nettesheim outlines ...
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Apex Legends players were rudely interrupted over the weekend when malicious actors took control of their in-game characters. The intrusions included disconnecting players and tampering ...
Target’s Source Code Allegedly Exposed in Cyber Breach
Allegations have surfaced of hackers offering Target Corporation’s internal code for sale. The incident came to light after files suggesting a breach were seen on ...
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
Drones are now embedded in public safety, energy, and defense operations, making their networks a critical attack surface. This blog explores how fragile connectivity, legacy ...
California Privacy Protection Agency Takes Action Against Datamasters for Unauthorized Data Sales
Datamasters faces legal action for selling health and personal data without proper registration. Learn how the agency enforces California's data privacy laws.
Instagram Data Breach Affects 17.5 Million Users: Security Implications Explored
A significant data breach has compromised the personal details of approximately 17.5 million Instagram users. This breach, as reported by Malwarebytes Labs researchers, has exposed ...
U.S. Immigration and Customs Enforcement’s Surveillance Tactics Scrutinized
The U.S. Immigration and Customs Enforcement (ICE) is under scrutiny for its substantial investment in surveillance technology, drawing criticism for privacy implications and its role ...
UK Government Faces Rising Cybersecurity Concerns Amid Legal Aid and Foreign Office Attacks
The UK's cybersecurity standards are in question after breaches at the Legal Aid Agency and Foreign Office. Without legal obligations to meet previous EU standards, ...
Authorities in Spain Dismantle Cyber Fraud Network Tied to Black Axe Group
Officials in Spain apprehended 34 individuals linked to a sophisticated cyber fraud organization. Suspected of affiliations with the notorious Black Axe group, these arrests are ...
Ireland Recalls Thousands of Passports Due to Software-Induced Printing Defect
Ireland's Foreign Affairs Department has recalled 13,000 passports after a software update led to a printing issue, rendering them non-compliant with international standards and potentially ...
BreachForums Re-emerges Only to Fall Victim to Data Breach
The latest iteration of BreachForums, a well-known hacking community, has suffered a data breach with its user database leaked online. The breach occurred despite recent ...
Anthropic Responds to Viral Allegations of Account Bans
Anthropic, the company behind Claude AI, addresses allegations of unauthorized account bans. The viral post on X stirred significant discussion among users.
Iranian APT Group MuddyWater Launches Sophisticated Spear-Phishing Campaign
MuddyWater, an Iranian threat actor, is running a spear-phishing campaign targeting multiple sectors in the Middle East using Rust-based implants. The attack leverages icon spoofing ...
CISA Streamlines Security Measures With Vulnerability Catalog Adoption
The Cybersecurity and Infrastructure Security Agency (CISA) officially retired 10 emergency directives, transferring security focus toward the Known Exploited Vulnerabilities catalog, which offers a more ...
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Using a compromised SonicWall VPN device, Chinese-speaking hackers allegedly targeted a VMware ESXi system with a potential exploit dating back to February 2024. The cybersecurity ...