Cyber Security
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
Russian Ransomware Operator Admits Guilt in U.S. Court
Meta’s Smart Glasses Face Privacy Investigation in Britain
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
HungerRush POS Platform Targeted in Data Extortion Scheme
Fake OpenClaw Installers on GitHub Are Stealing User Data
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
LexisNexis Data Breach Claimed by Fulcrumsec Group
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Alabama Man Pleads Guilty to Cyberstalking and Extortion After Hijacking Hundreds of Women’s Accounts
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Madison Square Garden Cyber Incident Revealed Months Later
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
ShinyHunters Leak Exposes Millions of CarGurus User Records
South Korea's Financial Sector Confronts a Sophisticated Supply Chain Attack
Cybersecurity
South Korea’s Financial Sector Confronts a Sophisticated Supply Chain Attack
South Korea's financial sector has recently been hit by a sophisticated supply chain attack involving the deployment of Qilin ransomware. The attack showcases a combination ...
CodeRED Emergency Alert System Cyberattack Leaves US Regions Vulnerable
Cybersecurity
CodeRED Emergency Alert System Cyberattack Leaves US Regions Vulnerable
CodeRED's emergency alert system in several US towns faces a severe interruption following a cyberattack on its provider. Authorities grapple with communication difficulties amidst a ...
Microsoft Alerts Users About FIDO2 Security Keys PIN Issue After Recent Windows Updates
Identity and Access Management
Microsoft Alerts Users About FIDO2 Security Keys PIN Issue After Recent Windows Updates
Recent Windows updates have led to unexpected PIN prompts for users utilizing FIDO2 security keys. Microsoft identifies the issue affecting user sign-in and provides a ...
London Councils Face Cyberattack Resident Data Potentially Compromised
Cybersecurity
London Councils Face Cyberattack: Resident Data Potentially Compromised
Multiple London councils, including Kensington & Chelsea and Westminster, are grappling with a cyberattack that potentially compromised resident data. Authorities have launched an investigation, notifying ...
GSMA Warns of Rising Cybersecurity Costs Amid Fragmented Regulations
Cybersecurity
GSMA Warns of Rising Cybersecurity Costs Amid Fragmented Regulations
As mobile operators face evolving cyber threats, the GSMA emphasizes that fragmented and poorly designed laws increase compliance costs without effectively enhancing network security. By ...
Gainsight Data Breach Company Downplays Impact
Cybersecurity
Gainsight Data Breach: Company Downplays Impact
Gainsight CEO Chuck Ganapathi addressed a recent security breach involving their app integration with Salesforce, emphasizing that only a limited number of customers were impacted. ...
HashJack Attack Unveils a New Cybersecurity Vulnerability
Cybersecurity
HashJack Attack Unveils a New Cybersecurity Vulnerability
HashJack is a newly discovered threat exploiting AI browser assistants by concealing harmful prompts in URLs, bypassing usual defenses. Cato Networks has labeled this method ...
AI Agent Security Firm Vijil Secures $17 Million to Enhance Platform
Cybersecurity
AI Agent Security Firm Vijil Secures $17 Million to Enhance Platform
Vijil has announced securing $17 million to advance its AI-based cybersecurity platform. This funding aims to bolster the resilience and accelerate the deployment of its ...
Tor Introduces Counter Galois Onion Encryption for Improved Security
Cybersecurity
Tor Introduces Counter Galois Onion Encryption for Improved Security
Tor has replaced its existing Tor1 relay encryption algorithm with the new Counter Galois Onion encryption design, offering enhanced security for circuit traffic. The update ...
Microsoft Exchange Online Outage Customer Access Disrupted
Cybersecurity
Microsoft Exchange Online Outage: Customer Access Disrupted
Customers using Outlook desktop client face access issues as Microsoft investigates Exchange Online service outage. The disruption affects user experience, specifically for those relying on ...
Delta Dental of Virginia Incident Exposes Personal and Health Information
Data Security
Delta Dental of Virginia Incident Exposes Personal and Health Information
Delta Dental of Virginia experienced a major data breach impacting 146,000 customers. Personal and health data, including Social Security numbers and ID numbers, were compromised ...
Vulnerabilities in Fluent Bit Cloud Logging Tool Pose Significant Security Risks
Cybersecurity
Vulnerabilities in Fluent Bit Cloud Logging Tool Pose Significant Security Risks
A series of vulnerabilities in Fluent Bit, a widely used open-source log collection tool, has raised significant security concerns. The vulnerabilities have left open doors ...
SitusAMC Admits to Data Breach Impacting Client Information
Data Security
SitusAMC Admits to Data Breach Impacting Client Information
SitusAMC revealed a data breach incident affecting customer data. The company provides services to top banks and lenders, making the event noteworthy for the financial ...
Amazon Web Services Confronts Service Failures What Went Wrong and Lessons Learned
Cybersecurity
Amazon Web Services Confronts Service Failures: What Went Wrong and Lessons Learned
Amazon Web Services (AWS) recently made a groundbreaking move by admitting their mistakes and discontinuing services that failed to meet expectations. Delving into this decision ...
Defensive Strategies Against New ClickFix Ransomware Tactics
Data Security
Defensive Strategies Against New ClickFix Ransomware Tactics
ClickFix ransomware now employs deceptive Windows Update animations to mislead users. This article explores the ClickFix attack evolution, detection innovations, and proactive user protection strategies ...
ClickFix Attacks Use Poisoned PNG Files to Deliver Malicious Code
Cybersecurity
ClickFix Attacks Use Poisoned PNG Files to Deliver Malicious Code
A novel ClickFix attack method leverages fake Windows update prompts and malformed PNG files to deploy infostealer malware. This campaign seeks to exploit user trust ...
Harvard Experiences Data Breach via Vishing Attack
Data Security
Harvard Experiences Data Breach via Vishing Attack
Harvard's Alumni Affairs systems fell victim to a sophisticated vishing attack, compromising sensitive data such as emails, phone numbers, and biographical details. This breach highlights ...
Russian-linked Campaign Distributes StealC V2 Malware via Sketchy Blender Files
Data Security
Russian-linked Campaign Distributes StealC V2 Malware via Sketchy Blender Files
Russian cyber perpetrators craftily embed StealC V2 malware within Blender files. These files, hosted on popular 3D model marketplaces, pose a sophisticated threat to digital ...
SonicWall Urges Immediate Update for High-Severity Vulnerability in SonicOS SSLVPN
CVE Vulnerability Alerts
SonicWall Urges Immediate Update for High-Severity Vulnerability in SonicOS SSLVPN
SonicWall warns users about a critical buffer overflow vulnerability in SonicOS SSLVPN, urging immediate updates. This could crash Gen7 and Gen8 firewalls, impacting cybersecurity.
Security Alert Remote Code Execution Vulnerability in Glob Pattern Matching Library
Cybersecurity
Security Alert: Remote Code Execution Vulnerability in Glob Pattern Matching Library
A remote code execution vulnerability has been identified in the glob file pattern matching library. Researchers urge swift updates to installations.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Microsoft Alerts Users About FIDO2 Security Keys PIN Issue After Recent Windows Updates
Recent Windows updates have led to unexpected PIN prompts for users utilizing FIDO2 security keys. Microsoft identifies the issue affecting user sign-in and provides a ...
London Councils Face Cyberattack: Resident Data Potentially Compromised
Multiple London councils, including Kensington & Chelsea and Westminster, are grappling with a cyberattack that potentially compromised resident data. Authorities have launched an investigation, notifying ...
GSMA Warns of Rising Cybersecurity Costs Amid Fragmented Regulations
As mobile operators face evolving cyber threats, the GSMA emphasizes that fragmented and poorly designed laws increase compliance costs without effectively enhancing network security. By ...
Gainsight Data Breach: Company Downplays Impact
Gainsight CEO Chuck Ganapathi addressed a recent security breach involving their app integration with Salesforce, emphasizing that only a limited number of customers were impacted. ...
HashJack Attack Unveils a New Cybersecurity Vulnerability
HashJack is a newly discovered threat exploiting AI browser assistants by concealing harmful prompts in URLs, bypassing usual defenses. Cato Networks has labeled this method ...
AI Agent Security Firm Vijil Secures $17 Million to Enhance Platform
Vijil has announced securing $17 million to advance its AI-based cybersecurity platform. This funding aims to bolster the resilience and accelerate the deployment of its ...
Tor Introduces Counter Galois Onion Encryption for Improved Security
Tor has replaced its existing Tor1 relay encryption algorithm with the new Counter Galois Onion encryption design, offering enhanced security for circuit traffic. The update ...
Microsoft Exchange Online Outage: Customer Access Disrupted
Customers using Outlook desktop client face access issues as Microsoft investigates Exchange Online service outage. The disruption affects user experience, specifically for those relying on ...
Delta Dental of Virginia Incident Exposes Personal and Health Information
Delta Dental of Virginia experienced a major data breach impacting 146,000 customers. Personal and health data, including Social Security numbers and ID numbers, were compromised ...
Vulnerabilities in Fluent Bit Cloud Logging Tool Pose Significant Security Risks
A series of vulnerabilities in Fluent Bit, a widely used open-source log collection tool, has raised significant security concerns. The vulnerabilities have left open doors ...
SitusAMC Admits to Data Breach Impacting Client Information
SitusAMC revealed a data breach incident affecting customer data. The company provides services to top banks and lenders, making the event noteworthy for the financial ...
Amazon Web Services Confronts Service Failures: What Went Wrong and Lessons Learned
Amazon Web Services (AWS) recently made a groundbreaking move by admitting their mistakes and discontinuing services that failed to meet expectations. Delving into this decision ...
Defensive Strategies Against New ClickFix Ransomware Tactics
ClickFix ransomware now employs deceptive Windows Update animations to mislead users. This article explores the ClickFix attack evolution, detection innovations, and proactive user protection strategies ...
ClickFix Attacks Use Poisoned PNG Files to Deliver Malicious Code
A novel ClickFix attack method leverages fake Windows update prompts and malformed PNG files to deploy infostealer malware. This campaign seeks to exploit user trust ...
Harvard Experiences Data Breach via Vishing Attack
Harvard's Alumni Affairs systems fell victim to a sophisticated vishing attack, compromising sensitive data such as emails, phone numbers, and biographical details. This breach highlights ...
Russian-linked Campaign Distributes StealC V2 Malware via Sketchy Blender Files
Russian cyber perpetrators craftily embed StealC V2 malware within Blender files. These files, hosted on popular 3D model marketplaces, pose a sophisticated threat to digital ...
SonicWall Urges Immediate Update for High-Severity Vulnerability in SonicOS SSLVPN
SonicWall warns users about a critical buffer overflow vulnerability in SonicOS SSLVPN, urging immediate updates. This could crash Gen7 and Gen8 firewalls, impacting cybersecurity.
Security Alert: Remote Code Execution Vulnerability in Glob Pattern Matching Library
A remote code execution vulnerability has been identified in the glob file pattern matching library. Researchers urge swift updates to installations.
Iberia Airlines Warns Customers of Data Breach Linked to Supplier Compromise
Iberia Airlines has disclosed a data breach affecting its customers, traced back to a compromised supplier. This announcement follows claims by threat actors on hacker ...
Deconstructing a Qilin Ransomware Attack: How Analysts Overcame Limited Visibility
Huntress analysts deconstruct a Qilin ransomware attack using a single endpoint and limited logs, uncovering rogue access, failed infostealer attempts, and the ransomware path. Learn ...