Cyber Security
Chinese Hackers Exploit VMware vSphere with Brickstorm Malware: CISA’s Critical Alert
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Intellexa’s Predator Spyware Exploits Zero-click ‘Aladdin’ Mechanism in Targeted Attacks
Niobium Secures $23 Million to Advance Homomorphic Encryption
Russian Internet Authority Blocks Roblox Over Content Concerns
Leroy Merlin France Security Breach Exposes Customer Data
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
Freedom Mobile Data Breach: Protecting Consumer Information in the Telecom Sector
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
GlassWorm Supply Chain Attack Compromises Developer Tools
Shai-Hulud Strikes Again: Massive Data Exposure from NPM Attack
Microsoft Investigates Defender XDR Portal Access Disruptions
University of Pennsylvania Data Breach: Clop’s Zero-Day Exploit Targets Oracle’s E-Business Suite
Zafran Security Accelerates Global Expansion with $60 Million Series C Funding
Albiriox Banking Trojan Poses New Threat to Android Devices
Hackers Exploit Hiring Processes With Deepfakes and Fake Resumes
Young Cybercriminals: Rebels Without a Cause in the Digital World
$29 Million in Bitcoin Seized from Cryptomixer: Implications for Cybercrime
ShadyPanda Malware Exploits Browser Extensions for Mass Infiltration
SmartTube YouTube Client for Android TV Compromised in Malicious Update Incident
South Korea’s Coupang Faces Data Breach Impacting Millions: Implications for The Retail Giant
Seven-Year Browser Extension Campaign Poses Significant Threat to Users
India’s Telecommunications Ministry Mandates Preloaded Cybersecurity App
Microsoft Tackles Excel Attachment Issue in New Outlook Client
OpenAI’s Ad Experiment Sparks Debate on AI, Privacy, and Monetization
OBR Launches Investigation After Budget Forecast Leak
Accenture Acquires CyberCX in 650 Million Deal to Bolster Cybersecurity Services
Cybersecurity
Accenture Acquires CyberCX in $650 Million Deal to Bolster Cybersecurity Services
Accenture has acquired Australian cybersecurity firm CyberCX for $650 million, expanding its AI-driven defense capabilities across Asia-Pacific and addressing the region’s talent gap amid rising ...
Generative AI Cybersecurity Threats 2025 From Promptware to Deepfake Attacks
Application Security
Generative AI Cybersecurity Threats 2025: From Promptware to Deepfake Attacks
Generative AI is reshaping the cyber threat landscape in 2025, fueling attacks from deepfake websites to promptware exploits. Experts say only proactive, AI-augmented, and Zero ...
IoT Security in Crisis BadBox Botnet, AI Exploits, and CNI Risks
Cybersecurity
IoT Security in Crisis: BadBox Botnet, AI Exploits, and CNI Risks
In 2025, IoT security threats are accelerating, from massive botnets like BadBox 2.0 to targeted attacks on critical infrastructure. Legacy systems, insecure devices, and AI ...
Credential Theft Up 160 in 2025 1.8 Billion Logins Stolen in First Half of Year
Cybersecurity
Credential Theft Up 160% in 2025: 1.8 Billion Logins Stolen in First Half of Year
Credential theft has surged 160% in 2025, with 1.8 billion logins stolen from 5.8 million infected hosts. AI-driven malware, phishing, and unpatched vulnerabilities are fueling ...
DARPA's AI Cyber Challenge Advancements in Autonomous Bug Patching
Blog
DARPA’s AI Cyber Challenge: Advancements in Autonomous Bug Patching
DARPA’s AI Cyber Challenge showcased autonomous tools that detected 77% of vulnerabilities and patched 61% within minutes, signaling a breakthrough in AI-driven cybersecurity for protecting ...
Connex Data Breach Affects 172,000 Customers
News
Connex Data Breach Affects 172,000 Customers
Connex Credit Union says a June network intrusion exposed personal and financial data for 172,000 customers; notification began August 7, 2025, with CyberScout monitoring offered.
Hackers Leak Allianz Life Data Stolen in Salesforce Attacks
News
Hackers Leak Allianz Life Data Stolen in Salesforce Attacks
ShinyHunters leaked 2.8 million Allianz Life records from Salesforce after the insurer disclosed a July 16 CRM breach affecting the majority of 1.4 million customers. ...
Financial Impact From Severe OT Events Could Top $300B
News
Financial Impact From Severe OT Events Could Top $300B
A Dragos and Marsh McLennan report warns severe OT disruptions could cost nearly $330 billion annually in a 1-in-250-year event, driven by business interruption.
Cybersecurity Trends 2025 AI, Digital Identity, and the Shift to Intelligent SecOps
Blog
Cybersecurity Trends 2025: AI, Digital Identity, and the Shift to Intelligent SecOps
In 2025, AI is both a weapon and a shield in cybersecurity, driving trends from intelligent SecOps to digital identity protection, zero-trust adoption, and predictive ...
Russia Said to Be Behind US Federal Court Systems Hack
News
Russia Said to Be Behind US Federal Court Systems Hack
Investigators say Russia is partly behind the US federal court hack, exposing sealed and sensitive records, as courts move files offline and tighten access controls. ...
New Zealand Government, Health, and Banking Credentials Found on Dark Web
Cybersecurity
Over 200,000 New Zealand Government, Health, and Banking Credentials Found on Dark Web
A dark web leak has exposed over 200,000 credentials linked to New Zealand’s government, healthcare, and banking sectors, highlighting systemic cybersecurity weaknesses and raising urgent ...
UK Proposes New Cybersecurity Law with Stricter Reporting and Governance Rules
Cybersecurity
UK Proposes New Cybersecurity Law with Stricter Reporting and Governance Rules
The UK’s proposed Cyber Security and Resilience Bill expands oversight to critical suppliers, MSPs, and digital services, introducing stricter governance, 24/72-hour incident reporting, and enhanced ...
North St. Paul Police Department Hit by Phishing Attack City Launches Forensic Investigation (1)
Cybersecurity
North St. Paul Municipal Data Breach Targets Police Department
A phishing email targeting a police department account triggered a cyber breach in North St. Paul. While contained quickly, the incident prompted a forensic investigation, ...
Qualys Unveils Agentic AI for Autonomous Cyber Risk Management
Cybersecurity
Qualys Unveils Agentic AI for Autonomous Cyber Risk Management
Qualys has unveiled Agentic AI, an autonomous security framework within its Enterprise TruRisk platform. Designed to automate risk analysis, threat prioritization, and remediation, it promises ...
Windows 11 August 2025 Security Update Introduces AI Features
Cybersecurity
Windows 11 August 2025 Security Update Introduces AI Features
The Windows 11 August 2025 update blends security patches with bold AI features, from Recall’s controversial memory function to upcoming “agentic companions,” signaling Microsoft’s long-term ...
Deepfake Vishing Incidents Surge by 170 in Q2 2025
News
Deepfake Vishing Incidents Surge by 170% in Q2 2025
Deepfake-enabled vishing attacks are skyrocketing, with criminals using AI-cloned voices to impersonate executives, officials, and loved ones. These scams bypass defenses, exploit trust, and are ...
August Infosec Releases Elastic EASE & Black Kite ASI Streamline Threat Response
News
August Infosec Spotlight: Elastic EASE & Black Kite ASI Advance AI Threat Detection
Two new AI-driven tools—Elastic’s AI SOC Engine and Black Kite’s Adversary Susceptibility Index—are setting a new standard in cybersecurity by automating detection, enhancing context, and ...
Cybersecurity Complexity Due to Tool Sprawl and Multi-Vendor Ecosystems
Blog
Cybersecurity Complexity Due to Tool Sprawl and Multi-Vendor Ecosystems
Cybersecurity teams are drowning in complexity, not threats. Multi-vendor tool sprawl inflates costs, weakens visibility, and burns out staff—proving that smarter integration, not more tools, ...
Bitdefender Launches Cybersecurity Advisory Services to Address Security Gaps
Cybersecurity
Bitdefender Launches Cybersecurity Advisory Services to Address Security Gaps
Bitdefender has launched its Cybersecurity Advisory Services to help enterprises close skills gaps, strengthen compliance, and boost resilience. The program offers tailored strategy, risk management, ...
Palo Alto Networks Acquires CyberArk in 25 Billion Deal
Cybersecurity
Palo Alto Networks Acquires CyberArk in $25 Billion Deal
Palo Alto Networks is acquiring CyberArk for $25B, marking one of cybersecurity’s largest deals. The move signals a strategic pivot to identity security, addressing human ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Brokewell Android Malware Spread Through Fake TradingView Ads
Cybercriminals are exploiting Meta’s ad network to push fake TradingView Premium apps that secretly install Brokewell malware on Android devices, stealing data and hijacking user ...
SentinelOne Q3 Revenue Jumps 22% Amid Cybersecurity Surge
SentinelOne has raised its annual revenue forecast amid surging demand for AI-driven cybersecurity. With its Singularity platform and growing ARR surpassing $1 billion, the company ...
U.S. and Allies Expose Salt Typhoon Cyber Espionage Network
A sweeping international advisory accuses Chinese tech firms of fueling cyber espionage campaigns tied to Salt Typhoon and related groups. The attacks span telecom networks, ...
Senator Wyden Demands Independent Cybersecurity Review of Federal Courts
A wave of breaches exposing sealed court records and confidential informant data has drawn sharp criticism of the judiciary’s outdated IT. Senator Ron Wyden is ...
FEMA Fires 24 Staff After DHS Cybersecurity Audit Uncovers Major Failures
A DHS audit prompted FEMA to fire 24 staff, including top IT leaders, over cybersecurity failures such as weak authentication and outdated protocols, highlighting federal ...
Maryland’s Paratransit Ransomware Strike: Cyberattack Disrupts Disabled Transit Services
A ransomware attack on Maryland’s Mobility paratransit system has disrupted critical transportation for disabled residents, blocking new reservations and rebookings. While core transit services remain ...
Critical SharePoint Zero-Day Exploited: Immediate Steps Against CVE-2025-53770 Vulnerability
A critical zero-day in Microsoft SharePoint, tracked as CVE-2025-53770, is being widely exploited in espionage and ransomware campaigns. Dubbed “ToolShell,” the flaw enables unauthenticated remote ...
Chained Zero-Days: WhatsApp and Apple Exploits Used in Sophisticated Spyware Attacks
A pair of newly discovered zero-day vulnerabilities—CVE-2025-43300 in Apple’s ImageIO framework and CVE-2025-55177 in WhatsApp—have been confirmed as part of a sophisticated spyware campaign targeting ...
Miljödata Cyberattack: 80% of Swedish Municipalities Hit in Extortion Strike
Sweden is reeling from one of the largest public sector cyber incidents in its history. A ransomware attack on Miljödata, an IT services provider supporting ...
PromptLock Ransomware: How AI is Lowering the Bar for Cybercrime
The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting ...
Hybrid AD at Risk: Storm-0501 Exploits Entra ID for Cloud-Native Ransomware
The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ...
AI-Powered Polymorphic Phishing: The New Era of Social Engineering
Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. ...
Storm-0501 Shifts From On-Premises Ransomware to Cloud-Based Extortion
Microsoft warns Storm-0501 now focuses on cloud-native extortion: exfiltrating data, destroying backups, and encrypting cloud storage rather than encrypting on-premises endpoints.
CPAP Data Breach Exposes 90k Records of Military-Linked Customers
CPAP’s systems were breached in December 2024, exposing names, SSNs, and protected health information for over 90,000 individuals including military beneficiaries.
Healthcare Services Group Data Breach Impacts 624,000 Individuals After 2024 Network Intrusion
Healthcare Services Group reports a late-2024 intrusion that exposed personal data for 624,000 people; company offers identity protection and continues forensic investigations.
PromptLock Ransomware Uses AI to Encrypt and Steal Data
Researchers uncovered PromptLock, the first AI-powered ransomware generating malicious Lua scripts via LLM prompts. Though only a proof-of-concept, it highlights risks of weaponized AI in ...
FreePBX Administrator Control Panels Under Active Zero-Day Exploit
Microsoft warns Storm-0501 now focuses on cloud-native extortion: exfiltrating data, destroying backups, and encrypting cloud storage rather than encrypting on-premises endpoints.
Miljödata Cyberattack Disrupts Services for More Than 200 Swedish Municipalities
A cyberattack on Miljödata disrupted services across 200+ Swedish municipalities and may have exposed sensitive personal data; a ransom demand of 1.5 BTC was reported.
Salesforce Breach: How OAuth Token Theft Exposed Hundreds of Organizations
The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August ...
Image-Scaling Prompt Injection Exposes Hidden Risks in AI Systems
Researchers show image-scaling prompt injection can hide executable instructions that surface only after downscaling, enabling LLM-driven data exfiltration across multiple AI platforms.