Cyber Security
Apple Releases iOS and iPadOS Updates to Patch Coruna Exploits
Veeam Software Fixes Critical RCE Vulnerabilities in Backup & Replication Solution
England Hockey Investigates Possible Data Breach by AiLock Ransomware Group
International Operation Dismantles the Dangerous SocksEscort Proxy Service
Apple Patches Older iPhones and iPads Against Coruna Exploit Kit Attacks
Cybercriminals Target Airline Loyalty Programs: A New Threat to Travelers
Global Arrests Made in a Social Media Scam Targeting Thousands
SQL Injection Flaw in Ally WordPress Plugin Puts 400,000 Sites at Risk
WhatsApp Introduces Parent-Controlled Accounts for Younger Users
Senate Confirms Joshua Rudd to Lead the NSA and US Cyber Command
Police Scotland Fined £66,000 for Mishandling Sensitive Victim Data
‘PhantomRaven’ Supply-Chain Campaign Floods npm Registry with Malicious Packages
Stryker Healthcare Faces Cybersecurity Breach Linked to Hacktivist Group
Critical Security Vulnerabilities Patched in n8n Workflow Automation Platform
Google Cloud Strengthens Its Position with the $32 Billion Acquisition of Wiz
Fake Starlink Android Apps Spread BeatBanker Malware
ELECQ Data Breach May Have Exposed EV Charger Users’ Private Information
Ericsson Inc. Faces Data Breach Through a Third-Party Service Provider
Malicious npm Package Disguises as OpenClaw Installer for Data Theft
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant’s Own Tool
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
Cybersecurity
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
News
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
Cybersecurity
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.
Fake OpenClaw Installers on GitHub Are Stealing User Data
Cybersecurity
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Cybersecurity
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Cybersecurity
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Cybersecurity
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Cybersecurity
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
Cybersecurity
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
UMMC restores IT systems and electronic medical records access after a ransomware attack caused nine days of operational interruptions.
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
News
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
LastPass alerts users of phishing emails posing as security warnings to obtain master passwords.
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
News
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
Europol disables Tycoon2FA, a PhaaS platform responsible for tens of millions of phishing messages monthly.
LexisNexis Data Breach Claimed by Fulcrumsec Group
Cybersecurity
LexisNexis Data Breach Claimed by Fulcrumsec Group
LexisNexis confirms a breach in its Legal & Professional division using React2Shell, claiming 2 GB of stolen data.
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Cybersecurity
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women's Accounts
Cybersecurity
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
A 22-year-old from Alabama pleaded guilty to cyberstalking, extortion, and computer fraud after hijacking the social media accounts of hundreds of you...
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
News
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
Cybercriminals deploy fake Google security pages to harvest one-time passcodes and cryptocurrency wallet addresses.
Chrome's Gemini Live Feature Left Users Exposed to Malicious Extensions
Cybersecurity
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Cybersecurity
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Cybersecurity
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Cybersecurity
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Cybersecurity
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
UMMC restores IT systems and electronic medical records access after a ransomware attack caused nine days of operational interruptions.
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
LastPass alerts users of phishing emails posing as security warnings to obtain master passwords.
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
Europol disables Tycoon2FA, a PhaaS platform responsible for tens of millions of phishing messages monthly.
LexisNexis Data Breach Claimed by Fulcrumsec Group
LexisNexis confirms a breach in its Legal & Professional division using React2Shell, claiming 2 GB of stolen data.
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
A 22-year-old from Alabama pleaded guilty to cyberstalking, extortion, and computer fraud after hijacking the social media accounts of hundreds of you...
Phishing Attack Masquerades as Google Security Page to Steal Sensitive Information
Cybercriminals deploy fake Google security pages to harvest one-time passcodes and cryptocurrency wallet addresses.
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Madison Square Garden Cyber Incident Revealed Months Later
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.