Cyber Security
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Free Android VPNs Are Quietly Working Against You
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Anthropic Accidentally Leaked Source Code for Claude Code
Depthfirst Secures $80 Million for AI Security Expansion
Hasbro Targeted in a Recent Cybersecurity Incident
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
FBI Cautions on Security Threats from Chinese Mobile Applications
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
UK Government Allocates £630,000 for Digital Identity Card Discussion
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
The “Doctor No” Problem Is Changing the Face of Enterprise Security
Passwd Offers Secure Credential Management for Google Workspace Users
Application Security
Passwd Offers Secure Credential Management for Google Workspace Users
Passwd provides a secure credential management platform designed exclusively for businesses using Google Workspace, emphasizing integration, controlled sharing, and practicality.
Operation Sentinel INTERPOL's Comprehensive Cybercrime Crackdown Across Africa
Cybersecurity
Operation Sentinel: INTERPOL’s Comprehensive Cybercrime Crackdown Across Africa
INTERPOL's Operation Sentinel culminated in the arrest of 574 suspects and the recovery of $3 million. The operation involved collaboration with 19 countries to target ...
Feds Seize Database Targeting $28 Million Bank Account Theft
News
Feds Seize Database Targeting $28 Million Bank Account Theft
Authorities took significant action by seizing a password database used in a phishing attack that attempted a $28 million bank heist. This article delves into ...
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Cybersecurity
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
WebRAT Malware Utilizing GitHub for Malicious Distribution
Cybersecurity
WebRAT Malware Utilizing GitHub for Malicious Distribution
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
n8n Automation Platform Faces Severe Security Issue
Application Security
n8n Automation Platform Faces Severe Security Issue
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Dangerous Chrome Extensions Phantom Shuttle Targets Sensitive Data
Application Security
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
French National Postal Service Disruption Affects Millions of Users
Cybersecurity
French National Postal Service Disruption Affects Millions of Users
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Nissan Cyberattack Hackers Compromise Red Hat GitLab Instances
Data Security
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Cybersecurity
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Anna’s Archive Takes a Stand on Music Preservation
Data Security
Anna’s Archive Takes a Stand on Music Preservation
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Cybersecurity
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Cybersecurity
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
Cybersecurity
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
News
MacSync Malware Distributed via Signed Swift Application
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
Information Security
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
News
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
Cybersecurity
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
News
Clop Ransomware Breach Compromises University of Phoenix Data
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Exchange Online Mailbox Access Issues Impact Outlook Users
Application Security
Exchange Online Mailbox Access Issues Impact Outlook Users

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
WebRAT Malware Utilizing GitHub for Malicious Distribution
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
n8n Automation Platform Faces Severe Security Issue
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
French National Postal Service Disruption Affects Millions of Users
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Anna’s Archive Takes a Stand on Music Preservation
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...
PwC Promotes Responsible Innovation in the Era of AI
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...