Cyber Security
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Trent AI Emerges From Stealth With $13 Million in Funding
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Exchange Online Mailbox Access Issues Impact Outlook Users
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Free Android VPNs Are Quietly Working Against You
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
FTC Demands Accountability in Illusory Systems Cybersecurity Breach Case
Cybersecurity
FTC Demands Accountability in Illusory Systems Cybersecurity Breach Case
The FTC has proposed a settlement agreement requiring Illusory Systems to repay users for funds lost in a 2022 cyberattack. This regulatory action highlights increased ...
Clop Ransomware Gang Targets Gladinet CentreStack in Data Extortion Attack
News
Clop Ransomware Gang Targets Gladinet CentreStack in Data Extortion Attack
The Clop ransomware group is targeting Gladinet CentreStack file servers, focusing on systems vulnerable due to internet exposure. This campaign jeopardizes data security, emphasizing the ...
French Prosecutors Investigate Cyberattack on GNV Ferry Fantastic
Cybersecurity
French Prosecutors Investigate Cyberattack on GNV Ferry “Fantastic”
French prosecutors are probing a potential cyberattack on the GNV ferry Fantastic, which raises the alarm for remote hijacking threats. The ferry, which operates between ...
Cisco Identifies Exploited Zero-Day Vulnerability in Email Gateway Systems
Cybersecurity
Cisco Identifies Exploited Zero-Day Vulnerability in Email Gateway Systems
Cisco issued a warning regarding an unpatched zero-day vulnerability, identified as CVE-2023-20198, in its AsyncOS system, impacting Secure Email Gateway (SEG) and Secure Email and ...
Windows 11 Security Updates Interrupt Enterprise VPN Connectivity
Network Security
Windows 11 Security Updates Interrupt Enterprise VPN Connectivity
Businesses using Windows Subsystem for Linux (WSL) on Windows 11 face VPN issues after Microsoft’s latest security updates. Learn about potential workarounds.
Echo Secures $35 Million Series A Funding to Advance Cybersecurity Tools
Cybersecurity
Echo Secures $35 Million Series A Funding to Advance Cybersecurity Tools
In a strategic move to enhance its cybersecurity platform, Echo has successfully raised $35 million in Series A funding. This milestone comes shortly after its ...
Verisoul Secures $8.8 Million to Enhance Fraud Prevention Technology
Cybersecurity
Verisoul Secures $8.8 Million to Enhance Fraud Prevention Technology
Verisoul has successfully raised $8.8 million in a bid to strengthen its fraud prevention technology. The funding will help enhance product development, boost go-to-market strategies, ...
Askul Ransomware Attack Leads to Compromise of 700,000 Records
News
Askul Ransomware Attack Leads to Compromise of 700,000 Records
The e-commerce and logistics firm Askul was targeted by RansomHouse in October, resulting in a data breach impacting 700,000 records, raising cybersecurity concerns.
Understanding Ransomware Attacks on Hypervisors A Growing Threat
Endpoint Security
Understanding Ransomware Attacks on Hypervisors: A Growing Threat
Ransomware groups target hypervisors to encrypt many virtual machines simultaneously, exploiting vulnerabilities in virtualized environments. Organizations must understand this evolving threat to protect their digital ...
Russian Hackers Shift Focus Toward Exploiting Misconfigurations
News
Russian Hackers Shift Focus Toward Exploiting Misconfigurations
State-sponsored Russian threat actors are now targeting misconfigurations in critical infrastructure, moving away from zero-day vulnerabilities. This shift represents a significant change in their strategies ...
CISO Communities Provide a Tactical Edge for Cybersecurity Challenges
Cybersecurity
CISO Communities Provide a Tactical Edge for Cybersecurity Challenges
Closed CISO (Chief Information Security Officer) communities serve as pivotal platforms for secure information exchange, guidance, and support, providing a pressure-free environment away from critical ...
PDVSA's Recent Cyberattack Reveals Vulnerabilities in Export Operations
Cybersecurity
PDVSA’s Recent Cyberattack Reveals Vulnerabilities in Export Operations
PDVSA, Venezuela's state-owned oil giant, faced a severe cyberattack disrupting export operations over the weekend. The attack highlights vulnerabilities in the company's cybersecurity infrastructure, casting ...
Cryptocurrency Wallet Stealer Found in Malicious NuGet Package Typo
News
Cryptocurrency Wallet Stealer Found in Malicious NuGet Package Typo
Researchers revealed a NuGet package, "Tracer.Fody.NLog," disguising as a popular .NET library, which concealed a cryptocurrency wallet stealer. Initially published in 2020, it remained undetected ...
Amazon's Operation Disrupts GRU Hackers Targeting Cloud Infrastructure
Cybersecurity
Amazon’s Operation Disrupts GRU Hackers Targeting Cloud Infrastructure
Amazon's Threat Intelligence team successfully disabled operations related to Russian GRU hackers, focusing on customer cloud infrastructure security and thwarting espionage attempts.
From Open Source to OpenAI Navigating the Evolution of Third-Party Risks
Blog
From Open Source to OpenAI: Navigating the Evolution of Third-Party Risks
Explore how speed-driven development introduces new third-party risks. Understand how threat actors exploit vulnerabilities in open source libraries and AI-driven tools.
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
Identity and Access Management
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
A cryptocurrency mining campaign targets AWS customers by exploiting stolen Identity and Access Management credentials. Detected by Amazon's GuardDuty, the attack uses novel persistence techniques ...
All I Want for Christmas is All of Your Data SantaStealer Malware Spreads for the Holidays
Cybersecurity
All I Want for Christmas is All of Your Data: SantaStealer Malware Spreads for the Holidays
A cybercriminal's holiday dream, SantaStealer, a new information-stealing malware, promises undetected operation on systems of high-profile targets, advertised on Telegram for $175 monthly.
Texas Attorney General Sues Television Giants Over Data Privacy Concerns
Data Security
Texas Attorney General Sues Television Giants Over Data Privacy Concerns
The Texas Attorney General has taken legal action against five major television manufacturers, alleging violation of data privacy. The lawsuit accuses these companies of using ...
ECB Decision Causes Costly Delays for Bank of England's Payment System Overhaul
Cybersecurity
ECB Decision Causes Costly Delays for Bank of England’s Payment System Overhaul
The European Central Bank's (ECB) 2022 postponement of a new messaging standard forced the Bank of England to delay its payment system launch, incurring £23 ...
Cyber Raid on Jaguar Land Rover August Attack Leads to Theft of Sensitive Information
Information Security
Cyber Raid on Jaguar Land Rover: August Attack Leads to Theft of Sensitive Information
The August cyber raid on Jaguar Land Rover (JLR) had a dual impact, crippling factory operations and resulting in the theft of sensitive employee payroll ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Cisco Identifies Exploited Zero-Day Vulnerability in Email Gateway Systems
Cisco issued a warning regarding an unpatched zero-day vulnerability, identified as CVE-2023-20198, in its AsyncOS system, impacting Secure Email Gateway (SEG) and Secure Email and ...
Windows 11 Security Updates Interrupt Enterprise VPN Connectivity
Businesses using Windows Subsystem for Linux (WSL) on Windows 11 face VPN issues after Microsoft’s latest security updates. Learn about potential workarounds.
Echo Secures $35 Million Series A Funding to Advance Cybersecurity Tools
In a strategic move to enhance its cybersecurity platform, Echo has successfully raised $35 million in Series A funding. This milestone comes shortly after its ...
Verisoul Secures $8.8 Million to Enhance Fraud Prevention Technology
Verisoul has successfully raised $8.8 million in a bid to strengthen its fraud prevention technology. The funding will help enhance product development, boost go-to-market strategies, ...
Askul Ransomware Attack Leads to Compromise of 700,000 Records
The e-commerce and logistics firm Askul was targeted by RansomHouse in October, resulting in a data breach impacting 700,000 records, raising cybersecurity concerns.
Understanding Ransomware Attacks on Hypervisors: A Growing Threat
Ransomware groups target hypervisors to encrypt many virtual machines simultaneously, exploiting vulnerabilities in virtualized environments. Organizations must understand this evolving threat to protect their digital ...
Russian Hackers Shift Focus Toward Exploiting Misconfigurations
State-sponsored Russian threat actors are now targeting misconfigurations in critical infrastructure, moving away from zero-day vulnerabilities. This shift represents a significant change in their strategies ...
CISO Communities Provide a Tactical Edge for Cybersecurity Challenges
Closed CISO (Chief Information Security Officer) communities serve as pivotal platforms for secure information exchange, guidance, and support, providing a pressure-free environment away from critical ...
PDVSA’s Recent Cyberattack Reveals Vulnerabilities in Export Operations
PDVSA, Venezuela's state-owned oil giant, faced a severe cyberattack disrupting export operations over the weekend. The attack highlights vulnerabilities in the company's cybersecurity infrastructure, casting ...
Cryptocurrency Wallet Stealer Found in Malicious NuGet Package Typo
Researchers revealed a NuGet package, "Tracer.Fody.NLog," disguising as a popular .NET library, which concealed a cryptocurrency wallet stealer. Initially published in 2020, it remained undetected ...
Amazon’s Operation Disrupts GRU Hackers Targeting Cloud Infrastructure
Amazon's Threat Intelligence team successfully disabled operations related to Russian GRU hackers, focusing on customer cloud infrastructure security and thwarting espionage attempts.
From Open Source to OpenAI: Navigating the Evolution of Third-Party Risks
Explore how speed-driven development introduces new third-party risks. Understand how threat actors exploit vulnerabilities in open source libraries and AI-driven tools.
AWS Customers Targeted in Cryptocurrency Mining Campaign Using Stolen IAM Credentials
A cryptocurrency mining campaign targets AWS customers by exploiting stolen Identity and Access Management credentials. Detected by Amazon's GuardDuty, the attack uses novel persistence techniques ...
All I Want for Christmas is All of Your Data: SantaStealer Malware Spreads for the Holidays
A cybercriminal's holiday dream, SantaStealer, a new information-stealing malware, promises undetected operation on systems of high-profile targets, advertised on Telegram for $175 monthly.
Texas Attorney General Sues Television Giants Over Data Privacy Concerns
The Texas Attorney General has taken legal action against five major television manufacturers, alleging violation of data privacy. The lawsuit accuses these companies of using ...
ECB Decision Causes Costly Delays for Bank of England’s Payment System Overhaul
The European Central Bank's (ECB) 2022 postponement of a new messaging standard forced the Bank of England to delay its payment system launch, incurring £23 ...
Cyber Raid on Jaguar Land Rover: August Attack Leads to Theft of Sensitive Information
The August cyber raid on Jaguar Land Rover (JLR) had a dual impact, crippling factory operations and resulting in the theft of sensitive employee payroll ...
Google Finds China and Iran Actors Exploiting React2Shell Flaws
Google has reported exploitation of the React2Shell vulnerability by five Chinese threat actor groups and Iranian operatives, aiming to deliver malware. This vulnerability, is becoming ...
Atlassian Publishes Security Patches for Critical Vulnerabilities in Multiple Products
Atlassian has released security updates targeting multiple vulnerabilities, including critical-severity issues in products like Apache Tika. One major flaw is an XML External Entity (XXE) ...
FreePBX Critical Vulnerability Enables Potential Authentication Bypass
FreePBX, an open-source private branch exchange (PBX) platform, has multiple security vulnerabilities. A critical flaw (CVE-2025-61675) allows authentication bypass under certain configurations.