Cyber Security
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
MIT CSAIL’s 2025 AI Agent Index Puts System Transparency Under the Microscope
FBI Issues Warning on Escalating ATM Jackpotting Losses
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Human Error Remains One of the Biggest Threats to IT Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Figure Data Breach Exposes Nearly 1 Million User Records
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
DEF CON Bars Three Men Named in Epstein Documents
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Unveiling the Extent of Leaked API Keys in Front-End Applications
Microsoft Teams Service Outage Frustrates Users Worldwide
Millions of Eurail User Records at Stake as Hackers Threaten Sale
Rise in API Exploitation Driven by Weak Security and Enhanced AI Capabilities
Allegations of Data Violations by Lenovo: US Law Firm Raises Concerns
New Android Malware Identified in Device Firmware Raising Alarms
Italian University Struggles With Disruption After Cyberattack
Lema AI Secures $24 Million to Bolster Supply Chain Security
Cybersecurity
Lema AI Secures $24 Million to Bolster Supply Chain Security
Lema AI exits stealth mode, securing $24M in funding across Series A and seed rounds, aimed at advancing its supply chain security platform.
Warlock Ransomware Gang Breach at SmarterTools Email System Compromised
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
News
Ransomware Gangs Reconsider Strategies as Data Theft Returns Diminish
With diminishing returns from data theft alone, ransomware gangs are exploring the return to data encryption for extortion. Altered tactics reflect evolving criminal strategies to ...
Outtake's $40 Million Infusion to Battle AI-Powered Cyber Threats
Cybersecurity
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
Cybersecurity
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
7-Zip Targeted by Malicious Website Users Turned Into Unwitting Proxy Nodes
Application Security
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Cybersecurity
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...
Vega Expands with $120 Million Series B Funding
Cybersecurity
Vega Expands with $120 Million Series B Funding
Security analytics platform Vega has raised $120 million in a Series B funding round, bringing its total fundraising to $185 million. This latest investment highlights ...
Reco's Strategic Move $30 Million Boost to Bolster AI SaaS Security
Cybersecurity
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Reco, a cloud security innovator, has secured $30 million in new funding, less than 10 months after its previous round. This investment increases its total ...
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
Cybersecurity
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
Adobe has rolled out a new patch addressing 44 vulnerabilities across its suite of creative applications. These fixes aim to combat flaws in products like ...
European Commission Gives Nod to Google's Acquisition of Wiz
Cybersecurity
European Commission Gives Nod to Google’s Acquisition of Wiz
The European Commission has approved Google's $32 billion acquisition of cloud security firm Wiz. This decision followed extensive feedback from customers and rival vendors, signaling ...
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Application Security
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Microsoft is addressing access issues impacting administrators of Microsoft 365 business and enterprise subscriptions. Some admins report being unable to access the admin center, with ...
Dutch Police Arrest Suspect in JokerOTP Phishing Tool Operation
News
Dutch Police Arrest Suspect in JokerOTP Phishing Tool Operation
Authorities in the Netherlands have apprehended a suspect linked to the notorious JokerOTP, a phishing automation tool. This tool is notorious for hijacking accounts by ...
New Reynolds Ransomware Uses BYOVD Technique to Elude Detection
News
New Reynolds Ransomware Uses BYOVD Technique to Elude Detection
Cybersecurity experts have discovered Reynolds ransomware, a new threat employing the Bring Your Own Vulnerable Driver (BYOVD) technique. This approach allows the ransomware to disable ...
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Cybersecurity
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Nevada has developed a framework to classify data into "public," "sensitive," "confidential," and "restricted" categories, improving cybersecurity preparedness following a cyberattack.
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
Cybersecurity
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
Telecommunications companies may have had early alerts about the significant January Telnet vulnerability. An analysis reveals that unusual port filtering and traffic patterns might indicate ...
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
Cybersecurity
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
GitGuardian, a leader in secrets detection, has successfully raised $50 million in a funding round. Learn how this financial boost aims to enhance their offerings ...
Conduent Breach Expands in Scope, Affecting 25 Million Impact on Volvo Group
Cybersecurity
Conduent Breach Expands in Scope, Affecting 25 Million: Impact on Volvo Group
Recent revelations show the Conduent data breach affects around 25 million individuals, considerably more than the initially estimated 10 million. The breach involves sensitive data, ...
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
News
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
Leveraging artificial intelligence, Zast.AI aims to advance the field of code security by implementing AI agents to effectively identify and verify software vulnerabilities, ensuring accuracy ...
New Malicious Packages in npm and PyPI Tied to Lazarus Group
Cybersecurity
New Malicious Packages in npm and PyPI Tied to Lazarus Group
Cybersecurity experts have uncovered malicious packages in the npm and PyPI registries, part of a recruitment-themed phishing campaign linked to the North Korean Lazarus Group.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Outtake’s $40 Million Infusion to Battle AI-Powered Cyber Threats
The cybersecurity startup Outtake secures $40 million in Series B funding, bringing its total funding to $60 million. This financing round aims to enhance Outtake's ...
Exploitation of SolarWinds Web Help Desk Instances Raises Serious Security Concerns
Microsoft defender team recently uncovered a sophisticated multi-stage intrusion exploiting SolarWinds Web Help Desk instances, endangering network security by leveraging exposed web help interfaces for ...
7-Zip Targeted by Malicious Website: Users Turned Into Unwitting Proxy Nodes
Cybercriminals have crafted a counterfeit 7-Zip website, installing a trojanized version of the archiving tool that hijacks user computers as residential proxy nodes. This tactic ...
Data Exposure Risks with Zero-Click Prompt Injection in AI Chat Apps
Zero-click prompt injection can expose sensitive data when AI agents interact with messaging apps. Attackers manipulate chat prompts to generate data-leaking URLs, leading to inadvertent ...
Vega Expands with $120 Million Series B Funding
Security analytics platform Vega has raised $120 million in a Series B funding round, bringing its total fundraising to $185 million. This latest investment highlights ...
Reco’s Strategic Move: $30 Million Boost to Bolster AI SaaS Security
Reco, a cloud security innovator, has secured $30 million in new funding, less than 10 months after its previous round. This investment increases its total ...
Adobe Patch Release Targets Critical Vulnerabilities in Creative Software
Adobe has rolled out a new patch addressing 44 vulnerabilities across its suite of creative applications. These fixes aim to combat flaws in products like ...
European Commission Gives Nod to Google’s Acquisition of Wiz
The European Commission has approved Google's $32 billion acquisition of cloud security firm Wiz. This decision followed extensive feedback from customers and rival vendors, signaling ...
Microsoft Investigates Admin Center Access Issues in Microsoft 365
Microsoft is addressing access issues impacting administrators of Microsoft 365 business and enterprise subscriptions. Some admins report being unable to access the admin center, with ...
Dutch Police Arrest Suspect in JokerOTP Phishing Tool Operation
Authorities in the Netherlands have apprehended a suspect linked to the notorious JokerOTP, a phishing automation tool. This tool is notorious for hijacking accounts by ...
New Reynolds Ransomware Uses BYOVD Technique to Elude Detection
Cybersecurity experts have discovered Reynolds ransomware, a new threat employing the Bring Your Own Vulnerable Driver (BYOVD) technique. This approach allows the ransomware to disable ...
Nevada Introduces Comprehensive Data Classification Framework Post-Cyberattack
Nevada has developed a framework to classify data into "public," "sensitive," "confidential," and "restricted" categories, improving cybersecurity preparedness following a cyberattack.
Suspected Premature Alerts Among Telecommunications on Telnet Vulnerability
Telecommunications companies may have had early alerts about the significant January Telnet vulnerability. An analysis reveals that unusual port filtering and traffic patterns might indicate ...
GitGuardian Secures $50 Million to Advance Secrets Detection and Identity Management
GitGuardian, a leader in secrets detection, has successfully raised $50 million in a funding round. Learn how this financial boost aims to enhance their offerings ...
Conduent Breach Expands in Scope, Affecting 25 Million: Impact on Volvo Group
Recent revelations show the Conduent data breach affects around 25 million individuals, considerably more than the initially estimated 10 million. The breach involves sensitive data, ...
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
Leveraging artificial intelligence, Zast.AI aims to advance the field of code security by implementing AI agents to effectively identify and verify software vulnerabilities, ensuring accuracy ...
New Malicious Packages in npm and PyPI Tied to Lazarus Group
Cybersecurity experts have uncovered malicious packages in the npm and PyPI registries, part of a recruitment-themed phishing campaign linked to the North Korean Lazarus Group.
DavaIndia Security Breach Exposed Critical System Control
DavaIndia Pharmacy's systems were compromised, revealing critical security vulnerabilities. Customer data was exposed, and control was accessed by outsiders, reflective of pressing concerns within India's ...
Cloud-Based Password Managers Face New Security Vulnerabilities
A recent study uncovers vulnerabilities in popular cloud-based password managers like Bitwarden, Dashlane, and LastPass. Researchers warn these weaknesses could lead to integrity issues or ...
South Korean Fine Imposed on Dior, Louis Vuitton, and Tiffany Following Salesforce Breach
The South Korean government imposed a $25 million fine on Dior, Louis Vuitton, and Tiffany after data breaches affected their Salesforce systems. The incident compromised ...