Cyber Security
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Trent AI Emerges From Stealth With $13 Million in Funding
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Exchange Online Mailbox Access Issues Impact Outlook Users
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Free Android VPNs Are Quietly Working Against You
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Cybersecurity
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Silver Fox orchestrates deceptive tactics by emulating a Russian hacking group in an SEO poisoning campaign, targeting Chinese organizations. Utilizing Microsoft Teams lures, the campaign ...
Intellexa's Predator Spyware Exploits Zero-click 'Aladdin' Mechanism in Targeted Attacks
Cybersecurity
Intellexa’s Predator Spyware Exploits Zero-click ‘Aladdin’ Mechanism in Targeted Attacks
Intellexa's Predator spyware employs a zero-click infection method named 'Aladdin,' allowing malware to spread via malicious ads. The sophistication of this method underscores the evolving ...
DragonForce Ransomware A New Collaboration in Cybercrime
News
DragonForce Ransomware: A New Collaboration in Cybercrime
The combined force of DragonForce and English-speaking hackers brings sophisticated social engineering to ransomware attacks. Discover the advancement and implication of this collaboration in the ...
Niobium Secures $23 Million to Advance Homomorphic Encryption
Cybersecurity
Niobium Secures $23 Million to Advance Homomorphic Encryption
Niobium, a cybersecurity startup, secures $23 million to enhance its homomorphic encryption technologies. The investment aims to accelerate the development of second-generation platforms, ensuring sophisticated ...
Aisuru Botnet New DDoS Attack Record Set at 29.7 Tbps
News
Aisuru Botnet: New DDoS Attack Record Set at 29.7 Tbps
Over the past three months, the formidable Aisuru botnet has executed more than 1,300 DDoS attacks, one of which reached a staggering peak of 29.7 ...
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
News
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
The Water Saci threat actor has evolved its tactics, utilizing an advanced infection chain with HTML Application files and PDFs. These methods are used to ...
Russian Internet Authority Blocks Roblox Over Content Concerns
Cybersecurity
Russian Internet Authority Blocks Roblox Over Content Concerns
Russia's Roskomnadzor has blocked the online gaming platform Roblox citing concerns over the distribution of LGBT content and extremist materials. The move underscores the regulatory ...
Leroy Merlin France Security Breach Exposes Customer Data
Data Security
Leroy Merlin France Security Breach Exposes Customer Data
Leroy Merlin faces a significant security breach impacting customer data in France. Personal information, including names, addresses, and emails, was accessed by unauthorized entities.
Google Expands Support for Android's In-Call Scam Protection to More Financial Institutions
Cybersecurity
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
In a significant move to bolster in-call scam protection, Google is expanding its Android feature to include multiple financial institutions in the United States. This ...
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
CVE Vulnerability Alerts
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
A severe flaw in the WordPress plugin, King Addons for Elementor, is being actively exploited. This CVE-2025-8489 vulnerability allows privilege escalation, giving attackers administrative access. ...
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Application Security
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Microsoft discretely resolves CVE-2025-9491, a critical Windows Shortcut vulnerability exploited by hackers for years. November 2025 Patch Tuesday delivers the fix.
React Server Components' Security Flaw Risks Unauthenticated Remote Code Execution
CVE Vulnerability Alerts
React Server Components’ Security Flaw Risks Unauthenticated Remote Code Execution
React Server Components are impacted by a critical vulnerability, CVE-2025-55182, offering a CVSS score of 10.0 for unauthenticated remote code execution.
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
Cybersecurity
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
The University of Pennsylvania and the University of Phoenix recently disclosed that they were attacked in a broader cyber campaign. This campaign targets organizations utilizing ...
Freedom Mobile Data Breach Protecting Consumer Information in the Telecom Sector
Data Security
Freedom Mobile Data Breach: Protecting Consumer Information in the Telecom Sector
Freedom Mobile, Canada's fourth-largest wireless carrier, announced a significant data breach involving its customer account management platform, exposing consumer information. This development puts a spotlight ...
North Korea's Covert IT Workforce Exposed Unmasking the Chollima Scheme
Cybersecurity
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
A joint investigation by BCA LTD, NorthScan, and ANY.RUN reveals North Korea's persistent infiltration scheme. The study exposes remote IT workers linked to the Lazarus ...
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
Cybersecurity
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
The Federal Trade Commission proposed significant actions against Illuminate Education following a 2021 incident that compromised data of 10 million students. The firm's measures raise ...
Cybersecurity Incident at Three-Council Data Breach Adds Complexity
Cybersecurity
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
Kensington and Chelsea Council acknowledges a data breach as their IT system experiences disruption during a cyber incident. Historical data was accessed and copied, escalating ...
GlassWorm Supply Chain Attack Compromises Developer Tools
Cybersecurity
GlassWorm Supply Chain Attack Compromises Developer Tools
The GlassWorm supply chain attack returns, infiltrating Microsoft Visual Studio Marketplace and Open VSX with 24 extensions that impersonate popular developer frameworks such as Flutter, ...
Shai-Hulud Strikes Again Massive Data Exposure from NPM Attack
Cybersecurity
Shai-Hulud Strikes Again: Massive Data Exposure from NPM Attack
Shai-Hulud's second attack compromised NPM packages, exposing 400,000 secrets. The breach affected thousands of GitHub repositories and underlines vulnerabilities inherent in open-source software supply chains.
Application Security
Microsoft Investigates Defender XDR Portal Access Disruptions
Microsoft faces a challenge as users report limited access to the Defender XDR portal. For over 10 hours, customers have experienced obstacles accessing key features, ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
DragonForce Ransomware: A New Collaboration in Cybercrime
The combined force of DragonForce and English-speaking hackers brings sophisticated social engineering to ransomware attacks. Discover the advancement and implication of this collaboration in the ...
Niobium Secures $23 Million to Advance Homomorphic Encryption
Niobium, a cybersecurity startup, secures $23 million to enhance its homomorphic encryption technologies. The investment aims to accelerate the development of second-generation platforms, ensuring sophisticated ...
Aisuru Botnet: New DDoS Attack Record Set at 29.7 Tbps
Over the past three months, the formidable Aisuru botnet has executed more than 1,300 DDoS attacks, one of which reached a staggering peak of 29.7 ...
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
The Water Saci threat actor has evolved its tactics, utilizing an advanced infection chain with HTML Application files and PDFs. These methods are used to ...
Russian Internet Authority Blocks Roblox Over Content Concerns
Russia's Roskomnadzor has blocked the online gaming platform Roblox citing concerns over the distribution of LGBT content and extremist materials. The move underscores the regulatory ...
Leroy Merlin France Security Breach Exposes Customer Data
Leroy Merlin faces a significant security breach impacting customer data in France. Personal information, including names, addresses, and emails, was accessed by unauthorized entities.
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
In a significant move to bolster in-call scam protection, Google is expanding its Android feature to include multiple financial institutions in the United States. This ...
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
A severe flaw in the WordPress plugin, King Addons for Elementor, is being actively exploited. This CVE-2025-8489 vulnerability allows privilege escalation, giving attackers administrative access. ...
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Microsoft discretely resolves CVE-2025-9491, a critical Windows Shortcut vulnerability exploited by hackers for years. November 2025 Patch Tuesday delivers the fix.
React Server Components’ Security Flaw Risks Unauthenticated Remote Code Execution
React Server Components are impacted by a critical vulnerability, CVE-2025-55182, offering a CVSS score of 10.0 for unauthenticated remote code execution.
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
The University of Pennsylvania and the University of Phoenix recently disclosed that they were attacked in a broader cyber campaign. This campaign targets organizations utilizing ...
Freedom Mobile Data Breach: Protecting Consumer Information in the Telecom Sector
Freedom Mobile, Canada's fourth-largest wireless carrier, announced a significant data breach involving its customer account management platform, exposing consumer information. This development puts a spotlight ...
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
A joint investigation by BCA LTD, NorthScan, and ANY.RUN reveals North Korea's persistent infiltration scheme. The study exposes remote IT workers linked to the Lazarus ...
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
The Federal Trade Commission proposed significant actions against Illuminate Education following a 2021 incident that compromised data of 10 million students. The firm's measures raise ...
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
Kensington and Chelsea Council acknowledges a data breach as their IT system experiences disruption during a cyber incident. Historical data was accessed and copied, escalating ...
GlassWorm Supply Chain Attack Compromises Developer Tools
The GlassWorm supply chain attack returns, infiltrating Microsoft Visual Studio Marketplace and Open VSX with 24 extensions that impersonate popular developer frameworks such as Flutter, ...
Shai-Hulud Strikes Again: Massive Data Exposure from NPM Attack
Shai-Hulud's second attack compromised NPM packages, exposing 400,000 secrets. The breach affected thousands of GitHub repositories and underlines vulnerabilities inherent in open-source software supply chains.
Microsoft Investigates Defender XDR Portal Access Disruptions
Microsoft faces a challenge as users report limited access to the Defender XDR portal. For over 10 hours, customers have experienced obstacles accessing key features, ...
University of Pennsylvania Data Breach: Clop’s Zero-Day Exploit Targets Oracle’s E-Business Suite
The University of Pennsylvania recently disclosed a data breach affecting over 1,400 individuals. Attackers exploited a zero-day vulnerability in Oracle’s E-Business Suite, linked to the ...
Zafran Security Accelerates Global Expansion with $60 Million Series C Funding
Zafran Security, a cybersecurity startup, has raised $60 million in Series C funding to enhance product innovation and global reach. This development marks a significant ...