Cyber Security
Severe Command Injection Flaw Discovered in SGLang
Serial-to-IP Converter Flaws in Lantronix and Silex Products Put Critical Systems at Risk
Scottish Man Pleads Guilty in $8 Million Cryptocurrency Heist
Cyberattacks Are Outpacing MSP and Corporate Defenses
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Lawmakers’ Concerns About AI Include Worries of Potential ‘Destruction’
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
CPUID Website Was Briefly Compromised to Spread Remote Access Trojan
Application Security
CPUID Website Was Briefly Compromised to Spread Remote Access Trojan
Threat actors compromised the CPUID site for less than 24 hours, deploying a remote access trojan.
Atomic Stealer Exploits Script Editor in a New Attack Targeting macOS Users
Cybersecurity
Atomic Stealer Exploits Script Editor in a New Attack Targeting macOS Users
Atomic Stealer malware targets macOS users, using Script Editor in campaigns exploiting ClickFix attack variations.
Chaos Malware Expands Its Reach to Cloud Deployments
Cybersecurity
Chaos Malware Expands Its Reach to Cloud Deployments
Chaos malware is now targeting misconfigured cloud systems, moving beyond just routers and edge gear.
APT28 Deploys PRISMEX Malware Against Ukraine and Its Allies
News
APT28 Deploys PRISMEX Malware Against Ukraine and Its Allies
Russian APT28 exploits spear-phishing in Ukraine with a novel malware, PRISMEX, harnessing advanced steganography and COM hijacking.
Seven Vulnerabilities Patched in OpenSSL, Several Enabling DoS Attacks
Cybersecurity
Seven Vulnerabilities Patched in OpenSSL, Several Enabling DoS Attacks
OpenSSL patches seven vulnerabilities, with several posing serious Denial of Service attack risks alongside a notable data leakage flaw.
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
Application Security
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
CISA mandates U.S. agencies to patch critical Ivanti EPMM vulnerability within four days as active exploitation continues.
Critical RCE Flaw in Apache ActiveMQ Classic Went Undetected for 13 Years
Cybersecurity
Critical RCE Flaw in Apache ActiveMQ Classic Went Undetected for 13 Years
A serious RCE flaw in Apache ActiveMQ Classic hid for 13 years, posing new risks.
A $30,000 AI GPU Still Loses to Consumer Hardware in Password Cracking
Cybersecurity
A $30,000 AI GPU Still Loses to Consumer Hardware in Password Cracking
Investigating why consumer GPUs outperform a $30,000 AI GPU in password cracking.
Massachusetts Hospital Faces Service Interruptions Amid Cyberattack
Cybersecurity
Massachusetts Hospital Faces Service Interruptions Amid Cyberattack
Signature Healthcare hospital in Massachusetts was forced to cancel some services after a cyberattack disrupted operations.
FleetWave Users Left Without Service After Chevin Takes Platform Offline
Cybersecurity
FleetWave Users Left Without Service After Chevin Takes Platform Offline
A security incident results in major FleetWave outages across UK and US as Chevin takes affected platforms offline.
Authorities Crack a $45 Million Global Cryptocurrency Scam and Recover $12 Million
Cybersecurity
Authorities Crack a $45 Million Global Cryptocurrency Scam and Recover $12 Million
Global authorities dismantled a $45M crypto scam, rescuing $12M from fraudsters and aiding 20K affected wallets.
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Application Security
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Vulnerability in EngageLab SDK put Android cryptocurrency wallets at risk, bypassing security sandbox protections.
Newly Discovered UAT-10362 Threat Cluster Aims at Taiwanese NGOs
Cybersecurity
Newly Discovered UAT-10362 Threat Cluster Aims at Taiwanese NGOs
UAT-10362 threatens Taiwanese NGOs with new LucidRook malware.
New Extortion Crew Uses Phishing to Breach High-Value Corporations
News
New Extortion Crew Uses Phishing to Breach High-Value Corporations
Emerging extortion crew targets corporations through sophisticated phishing schemes.
Smart Slider 3 Pro Plugin Update System Was Hijacked to Push Backdoored Versions
Application Security
Smart Slider 3 Pro Plugin Update System Was Hijacked to Push Backdoored Versions
Cybercriminals hijacked the Smart Slider 3 Pro plugin update system, pushing malicious versions loaded with multiple backdoors to WordPress and Joomla...
Covert PDF Exploitation Hackers Use Adobe Acrobat Reader for Targeted Payload Delivery
Cybersecurity
Covert PDF Exploitation: Hackers Use Adobe Acrobat Reader for Targeted Payload Delivery
Cybercriminals exploit Adobe Acrobat Reader to assess targets and selectively deploy further payloads.
Stolen Credentials Are Turning Authentication Systems Into Attack Surfaces
Cybersecurity
Stolen Credentials Are Turning Authentication Systems Into Attack Surfaces
Discover how wearable biometric authentication is reshaping identity verification by focusing on the user, rather than the session.
Microsoft's Communication Breakdown Leaves Developers Locked Out Without Warning
Cybersecurity
Microsoft’s Communication Breakdown Leaves Developers Locked Out Without Warning
Microsoft's handling of developer account lockouts reveals serious communication gaps that are disrupting open source workflows.
Google Enhances Chrome Security with Device Bound Session Credentials
Application Security
Google Enhances Chrome Security with Device Bound Session Credentials
Google unveils Device Bound Session Credentials in Chrome 146 for Windows to thwart information-stealing malware.
New Bypass Technique Bypasses Apple's AI Safeguards
Application Security
New Bypass Technique Bypasses Apple’s AI Safeguards
Researchers bypass Apple Intelligence guardrails using Neural Exect and Unicode manipulation.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
APT28 Deploys PRISMEX Malware Against Ukraine and Its Allies
Russian APT28 exploits spear-phishing in Ukraine with a novel malware, PRISMEX, harnessing advanced steganography and COM hijacking.
Seven Vulnerabilities Patched in OpenSSL, Several Enabling DoS Attacks
OpenSSL patches seven vulnerabilities, with several posing serious Denial of Service attack risks alongside a notable data leakage flaw.
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
CISA mandates U.S. agencies to patch critical Ivanti EPMM vulnerability within four days as active exploitation continues.
Critical RCE Flaw in Apache ActiveMQ Classic Went Undetected for 13 Years
A serious RCE flaw in Apache ActiveMQ Classic hid for 13 years, posing new risks.
A $30,000 AI GPU Still Loses to Consumer Hardware in Password Cracking
Investigating why consumer GPUs outperform a $30,000 AI GPU in password cracking.
Massachusetts Hospital Faces Service Interruptions Amid Cyberattack
Signature Healthcare hospital in Massachusetts was forced to cancel some services after a cyberattack disrupted operations.
FleetWave Users Left Without Service After Chevin Takes Platform Offline
A security incident results in major FleetWave outages across UK and US as Chevin takes affected platforms offline.
Authorities Crack a $45 Million Global Cryptocurrency Scam and Recover $12 Million
Global authorities dismantled a $45M crypto scam, rescuing $12M from fraudsters and aiding 20K affected wallets.
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Vulnerability in EngageLab SDK put Android cryptocurrency wallets at risk, bypassing security sandbox protections.
Newly Discovered UAT-10362 Threat Cluster Aims at Taiwanese NGOs
UAT-10362 threatens Taiwanese NGOs with new LucidRook malware.
New Extortion Crew Uses Phishing to Breach High-Value Corporations
Emerging extortion crew targets corporations through sophisticated phishing schemes.
Smart Slider 3 Pro Plugin Update System Was Hijacked to Push Backdoored Versions
Cybercriminals hijacked the Smart Slider 3 Pro plugin update system, pushing malicious versions loaded with multiple backdoors to WordPress and Joomla...
Covert PDF Exploitation: Hackers Use Adobe Acrobat Reader for Targeted Payload Delivery
Cybercriminals exploit Adobe Acrobat Reader to assess targets and selectively deploy further payloads.
Stolen Credentials Are Turning Authentication Systems Into Attack Surfaces
Discover how wearable biometric authentication is reshaping identity verification by focusing on the user, rather than the session.
Microsoft’s Communication Breakdown Leaves Developers Locked Out Without Warning
Microsoft's handling of developer account lockouts reveals serious communication gaps that are disrupting open source workflows.
Google Enhances Chrome Security with Device Bound Session Credentials
Google unveils Device Bound Session Credentials in Chrome 146 for Windows to thwart information-stealing malware.
New Bypass Technique Bypasses Apple’s AI Safeguards
Researchers bypass Apple Intelligence guardrails using Neural Exect and Unicode manipulation.
ChipSoft’s Website Goes Offline After Ransomware Attack While Email Stays Operational
ChipSoft's website is down following a ransomware attack, though email communication remains functional.
Telehealth Company Hims & Hers Health Discloses Data Breach Involving Support Tickets
Hims & Hers Health reports a data breach linked to a third-party customer service platform, impacting support tickets.
Data Theft Incidents Escalate as SaaS Integration Provider Suffers Major Breach
Authentication tokens were stolen during a breach, impacting numerous companies.