Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Crunchbase Data Breach Raises Security Concerns After ShinyHunters Attack
Cybersecurity
Crunchbase Data Breach Raises Security Concerns After ShinyHunters Attack
Cybercriminal group ShinyHunters reportedly compromised Crunchbase, stealing over 2 million personal records. The breach involved a 402 MB data file being leaked, prompting concerns about ...
NPM Security Measures Post-'Shai-Hulud' Attacks Show Vulnerabilities
Cybersecurity
NPM Security Measures Post-‘Shai-Hulud’ Attacks Show Vulnerabilities
Despite enhanced defense mechanisms by NPM following the 'Shai-Hulud' supply-chain attacks, Git dependencies reveal key vulnerabilities that threat actors could exploit, casting doubt over the ...
Phishing Attacks Target Indian Users with a Multi-Stage Backdoor
Cybersecurity
Phishing Attacks Target Indian Users with a Multi-Stage Backdoor
Cybersecurity researchers from eSentire uncovered an ongoing campaign targeting Indian users using a multi-stage backdoor. Phishing emails mimic the Income Tax Department to deceive victims.
Upwind Secures $250 Million to Expand Its Cloud Security Solutions
Cybersecurity
Upwind Secures $250 Million to Expand Its Cloud Security Solutions
Upwind, a cloud-native application protection platform (CNAPP) provider, has attracted $250 million in fresh investment. This funding elevates the company’s valuation to $1.5 billion and ...
Microsoft Releases Emergency Patch to Mitigate Office Zero-Day Vulnerability
Cybersecurity
Microsoft Releases Emergency Patch to Mitigate Office Zero-Day Vulnerability
Microsoft has released urgent updates to address an actively exploited security flaw, CVE-2026-21509, impacting several Office versions. This vulnerability allows attackers to bypass security features, ...
Vulnerabilities in Dormakaba Systems Expose Security Flaws
Cybersecurity
Vulnerabilities in Dormakaba Systems Expose Security Flaws
Dormakaba's access control systems exhibited significant vulnerabilities, leading to security risks at major European firms. Over 20 flaws, including six critical ones, allowed unauthorized access ...
EU Investigates AI Risk Management Scrutiny Over Grok AI's Content Generation
Cybersecurity
EU Investigates AI Risk Management: Scrutiny Over Grok AI’s Content Generation
The European Commission launches an investigation into X's Grok AI, questioning the company's risk assessment process following its controversial use in generating explicit imagery. This ...
Cloudflare Analyzes the Impact of a Recent BGP Route Leak
Cybersecurity
Cloudflare Analyzes the Impact of a Recent BGP Route Leak
Cloudflare recently detailed a BGP route leak lasting 25 minutes. The incident resulted in noticeable network disruptions, with packet loss and roughly 12 Gbps of ...
Microsoft's Out-of-Band Updates Resolve Microsoft Outlook Issue With Cloud-Hosted PST Files
Application Security
Microsoft’s Out-of-Band Updates Resolve Microsoft Outlook Issue With Cloud-Hosted PST Files
Microsoft has issued crucial out-of-band updates for Windows 10, Windows 11, and Windows Server to address a specific problem affecting Microsoft Outlook. This issue resulted ...
The ShinyHunters and Their Voice Phishing Tactics Target Okta, Microsoft, and Google
News
The ShinyHunters and Their Voice Phishing Tactics Target Okta, Microsoft, and Google
ShinyHunters are deploying voice phishing to breach SSO accounts and access corporate data in platforms like Okta, Microsoft, and Google. This tactic aids in stealing ...
Windows 11 Boot Failures After Patch Tuesday Updates
Application Security
Windows 11 Boot Failures After Patch Tuesday Updates
Recent updates from January 2026 rendered some Windows 11 devices unusable, throwing an “UNMOUNTABLE_BOOT_VOLUME” error. Microsoft is actively examining these issues and working on a ...
US Cybersecurity Agency Opts Out of RSA Conference While Jen Easterly Plans Attendance
Cybersecurity
US Cybersecurity Agency Opts Out of RSA Conference While Jen Easterly Plans Attendance
The US Cybersecurity and Infrastructure Security Agency (CISA) confirmed it will not be attending the upcoming RSA Conference in March. However, new RSA CEO and ...
Osiris Ransomware Disables Security Tools in Novel Attack
News
Osiris Ransomware Disables Security Tools in Novel Attack
Researchers have uncovered the Osiris ransomware, deployed in a late 2025 cyberattack targeting a Southeast Asian food service franchise. Utilizing BYOVD tactics and exploiting the ...
UK Home Office Invests Heavily in Tech to Mitigate Channel Immigration Challenges
Cybersecurity
UK Home Office Invests Heavily in Tech to Mitigate Channel Immigration Challenges
The UK Home Office embarks on a £100 million investment in cutting-edge technology to address the complex challenges posed by the influx of small boats ...
CISA Identifies Critical Broadcom VMware vCenter Vulnerability CVE-2024-37079
CVE Vulnerability Alerts
CISA Identifies Critical Broadcom VMware vCenter Vulnerability CVE-2024-37079
CISA has added a significant vulnerability, CVE-2024-37079, found in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog. This move emphasizes the critical nature ...
Nike Investigates Breach as Hackers Threaten Data Disclosure
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Nike is investigating a possible security breach as the WorldLeaks cybercrime group claims to have accessed and stolen sensitive data. The hackers are threatening to ...
Multi-Stage Phishing Campaign Targets Russia With Ransomware and Amnesia RAT
News
Multi-Stage Phishing Campaign Targets Russia With Ransomware and Amnesia RAT
A sophisticated phishing operation has emerged in Russia, deploying ransomware and Amnesia RAT through business-themed documents. Attackers ingeniously disguise malware as routine files, posing a ...
North Korean Hacker Group Deploys AI-Powered Malware Targeting Blockchain Developers
News
North Korean Hacker Group Deploys AI-Powered Malware Targeting Blockchain Developers
The North Korean APT group known as Konni has refined its strategies by employing AI-driven malware to specifically target developers in the blockchain industry. This ...
Major Cyber Assault by Sandworm Against Poland's Grid Averted
Cybersecurity
Major Cyber Assault by Sandworm Against Poland’s Grid Averted
In a significant report, Poland's energy minister disclosed an attempted cyber attack by Sandworm on the nation's power infrastructure. The offensive, deemed the most extensive ...
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Microsoft has confirmed a coding error in the Outlook mobile app that may cause it to crash on iPad devices. The bug significantly impacts users ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Upwind Secures $250 Million to Expand Its Cloud Security Solutions
Upwind, a cloud-native application protection platform (CNAPP) provider, has attracted $250 million in fresh investment. This funding elevates the company’s valuation to $1.5 billion and ...
Microsoft Releases Emergency Patch to Mitigate Office Zero-Day Vulnerability
Microsoft has released urgent updates to address an actively exploited security flaw, CVE-2026-21509, impacting several Office versions. This vulnerability allows attackers to bypass security features, ...
Vulnerabilities in Dormakaba Systems Expose Security Flaws
Dormakaba's access control systems exhibited significant vulnerabilities, leading to security risks at major European firms. Over 20 flaws, including six critical ones, allowed unauthorized access ...
EU Investigates AI Risk Management: Scrutiny Over Grok AI’s Content Generation
The European Commission launches an investigation into X's Grok AI, questioning the company's risk assessment process following its controversial use in generating explicit imagery. This ...
Cloudflare Analyzes the Impact of a Recent BGP Route Leak
Cloudflare recently detailed a BGP route leak lasting 25 minutes. The incident resulted in noticeable network disruptions, with packet loss and roughly 12 Gbps of ...
Microsoft’s Out-of-Band Updates Resolve Microsoft Outlook Issue With Cloud-Hosted PST Files
Microsoft has issued crucial out-of-band updates for Windows 10, Windows 11, and Windows Server to address a specific problem affecting Microsoft Outlook. This issue resulted ...
The ShinyHunters and Their Voice Phishing Tactics Target Okta, Microsoft, and Google
ShinyHunters are deploying voice phishing to breach SSO accounts and access corporate data in platforms like Okta, Microsoft, and Google. This tactic aids in stealing ...
Windows 11 Boot Failures After Patch Tuesday Updates
Recent updates from January 2026 rendered some Windows 11 devices unusable, throwing an “UNMOUNTABLE_BOOT_VOLUME” error. Microsoft is actively examining these issues and working on a ...
US Cybersecurity Agency Opts Out of RSA Conference While Jen Easterly Plans Attendance
The US Cybersecurity and Infrastructure Security Agency (CISA) confirmed it will not be attending the upcoming RSA Conference in March. However, new RSA CEO and ...
Osiris Ransomware Disables Security Tools in Novel Attack
Researchers have uncovered the Osiris ransomware, deployed in a late 2025 cyberattack targeting a Southeast Asian food service franchise. Utilizing BYOVD tactics and exploiting the ...
UK Home Office Invests Heavily in Tech to Mitigate Channel Immigration Challenges
The UK Home Office embarks on a £100 million investment in cutting-edge technology to address the complex challenges posed by the influx of small boats ...
CISA Identifies Critical Broadcom VMware vCenter Vulnerability CVE-2024-37079
CISA has added a significant vulnerability, CVE-2024-37079, found in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog. This move emphasizes the critical nature ...
Nike Investigates Breach as Hackers Threaten Data Disclosure
Nike is investigating a possible security breach as the WorldLeaks cybercrime group claims to have accessed and stolen sensitive data. The hackers are threatening to ...
Multi-Stage Phishing Campaign Targets Russia With Ransomware and Amnesia RAT
A sophisticated phishing operation has emerged in Russia, deploying ransomware and Amnesia RAT through business-themed documents. Attackers ingeniously disguise malware as routine files, posing a ...
North Korean Hacker Group Deploys AI-Powered Malware Targeting Blockchain Developers
The North Korean APT group known as Konni has refined its strategies by employing AI-driven malware to specifically target developers in the blockchain industry. This ...
Major Cyber Assault by Sandworm Against Poland’s Grid Averted
In a significant report, Poland's energy minister disclosed an attempted cyber attack by Sandworm on the nation's power infrastructure. The offensive, deemed the most extensive ...
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Microsoft has confirmed a coding error in the Outlook mobile app that may cause it to crash on iPad devices. The bug significantly impacts users ...
Emerging Threats: Cloudflare WAF Bypass and Snap Store Malware
Recent developments in cybersecurity reveal a Cloudflare WAF bypass, Cannonical's Snap Store malware, and the termination of Curl's bug bounty program. Explore how these issues ...
Fortinet’s FortiCloud SSO Exploitation Raises Concerns Despite Patches
Concerns have arisen following the recent identification of exploitation attempts targeting Fortinet's FortiCloud single sign-on (SSO) capabilities. Even though patches were released, attackers have leveraged ...
Automation in Cyberattacks: A New Era for CISOs to Prepare For
Cybercriminals are on the brink of automating their attack workflows end-to-end. CISOs need to anticipate and prepare for these changes to effectively defend against increasingly ...