Cyber Security
Anthropic’s Claude Desktop Unauthorized Installations Raise EU Law Compliance Concerns
Severe Command Injection Flaw Discovered in SGLang
Serial-to-IP Converter Flaws in Lantronix and Silex Products Put Critical Systems at Risk
Scottish Man Pleads Guilty in $8 Million Cryptocurrency Heist
Cyberattacks Are Outpacing MSP and Corporate Defenses
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Lawmakers’ Concerns About AI Include Worries of Potential ‘Destruction’
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Chinese Hackers Exploit VMware vSphere with Brickstorm Malware CISA's Critical Alert
Application Security
Chinese Hackers Exploit VMware vSphere with Brickstorm Malware: CISA’s Critical Alert
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to network defenders concerning Chinese threat actors using Brickstorm malware to compromise VMware vSphere ...
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Cybersecurity
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Silver Fox orchestrates deceptive tactics by emulating a Russian hacking group in an SEO poisoning campaign, targeting Chinese organizations. Utilizing Microsoft Teams lures, the campaign ...
Intellexa's Predator Spyware Exploits Zero-click 'Aladdin' Mechanism in Targeted Attacks
Cybersecurity
Intellexa’s Predator Spyware Exploits Zero-click ‘Aladdin’ Mechanism in Targeted Attacks
Intellexa's Predator spyware employs a zero-click infection method named 'Aladdin,' allowing malware to spread via malicious ads. The sophistication of this method underscores the evolving ...
DragonForce Ransomware A New Collaboration in Cybercrime
News
DragonForce Ransomware: A New Collaboration in Cybercrime
The combined force of DragonForce and English-speaking hackers brings sophisticated social engineering to ransomware attacks. Discover the advancement and implication of this collaboration in the ...
Niobium Secures $23 Million to Advance Homomorphic Encryption
Cybersecurity
Niobium Secures $23 Million to Advance Homomorphic Encryption
Niobium, a cybersecurity startup, secures $23 million to enhance its homomorphic encryption technologies. The investment aims to accelerate the development of second-generation platforms, ensuring sophisticated ...
Aisuru Botnet New DDoS Attack Record Set at 29.7 Tbps
News
Aisuru Botnet: New DDoS Attack Record Set at 29.7 Tbps
Over the past three months, the formidable Aisuru botnet has executed more than 1,300 DDoS attacks, one of which reached a staggering peak of 29.7 ...
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
News
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
The Water Saci threat actor has evolved its tactics, utilizing an advanced infection chain with HTML Application files and PDFs. These methods are used to ...
Russian Internet Authority Blocks Roblox Over Content Concerns
Cybersecurity
Russian Internet Authority Blocks Roblox Over Content Concerns
Russia's Roskomnadzor has blocked the online gaming platform Roblox citing concerns over the distribution of LGBT content and extremist materials. The move underscores the regulatory ...
Leroy Merlin France Security Breach Exposes Customer Data
Data Security
Leroy Merlin France Security Breach Exposes Customer Data
Leroy Merlin faces a significant security breach impacting customer data in France. Personal information, including names, addresses, and emails, was accessed by unauthorized entities.
Google Expands Support for Android's In-Call Scam Protection to More Financial Institutions
Cybersecurity
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
In a significant move to bolster in-call scam protection, Google is expanding its Android feature to include multiple financial institutions in the United States. This ...
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
CVE Vulnerability Alerts
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
A severe flaw in the WordPress plugin, King Addons for Elementor, is being actively exploited. This CVE-2025-8489 vulnerability allows privilege escalation, giving attackers administrative access. ...
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Application Security
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Microsoft discretely resolves CVE-2025-9491, a critical Windows Shortcut vulnerability exploited by hackers for years. November 2025 Patch Tuesday delivers the fix.
React Server Components' Security Flaw Risks Unauthenticated Remote Code Execution
CVE Vulnerability Alerts
React Server Components’ Security Flaw Risks Unauthenticated Remote Code Execution
React Server Components are impacted by a critical vulnerability, CVE-2025-55182, offering a CVSS score of 10.0 for unauthenticated remote code execution.
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
Cybersecurity
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
The University of Pennsylvania and the University of Phoenix recently disclosed that they were attacked in a broader cyber campaign. This campaign targets organizations utilizing ...
Freedom Mobile Data Breach Protecting Consumer Information in the Telecom Sector
Data Security
Freedom Mobile Data Breach: Protecting Consumer Information in the Telecom Sector
Freedom Mobile, Canada's fourth-largest wireless carrier, announced a significant data breach involving its customer account management platform, exposing consumer information. This development puts a spotlight ...
North Korea's Covert IT Workforce Exposed Unmasking the Chollima Scheme
Cybersecurity
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
A joint investigation by BCA LTD, NorthScan, and ANY.RUN reveals North Korea's persistent infiltration scheme. The study exposes remote IT workers linked to the Lazarus ...
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
Cybersecurity
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
The Federal Trade Commission proposed significant actions against Illuminate Education following a 2021 incident that compromised data of 10 million students. The firm's measures raise ...
Cybersecurity Incident at Three-Council Data Breach Adds Complexity
Cybersecurity
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
Kensington and Chelsea Council acknowledges a data breach as their IT system experiences disruption during a cyber incident. Historical data was accessed and copied, escalating ...
GlassWorm Supply Chain Attack Compromises Developer Tools
Cybersecurity
GlassWorm Supply Chain Attack Compromises Developer Tools
The GlassWorm supply chain attack returns, infiltrating Microsoft Visual Studio Marketplace and Open VSX with 24 extensions that impersonate popular developer frameworks such as Flutter, ...
Shai-Hulud Strikes Again Massive Data Exposure from NPM Attack
Cybersecurity
Shai-Hulud Strikes Again: Massive Data Exposure from NPM Attack
Shai-Hulud's second attack compromised NPM packages, exposing 400,000 secrets. The breach affected thousands of GitHub repositories and underlines vulnerabilities inherent in open-source software supply chains.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Intellexa’s Predator Spyware Exploits Zero-click ‘Aladdin’ Mechanism in Targeted Attacks
Intellexa's Predator spyware employs a zero-click infection method named 'Aladdin,' allowing malware to spread via malicious ads. The sophistication of this method underscores the evolving ...
DragonForce Ransomware: A New Collaboration in Cybercrime
The combined force of DragonForce and English-speaking hackers brings sophisticated social engineering to ransomware attacks. Discover the advancement and implication of this collaboration in the ...
Niobium Secures $23 Million to Advance Homomorphic Encryption
Niobium, a cybersecurity startup, secures $23 million to enhance its homomorphic encryption technologies. The investment aims to accelerate the development of second-generation platforms, ensuring sophisticated ...
Aisuru Botnet: New DDoS Attack Record Set at 29.7 Tbps
Over the past three months, the formidable Aisuru botnet has executed more than 1,300 DDoS attacks, one of which reached a staggering peak of 29.7 ...
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
The Water Saci threat actor has evolved its tactics, utilizing an advanced infection chain with HTML Application files and PDFs. These methods are used to ...
Russian Internet Authority Blocks Roblox Over Content Concerns
Russia's Roskomnadzor has blocked the online gaming platform Roblox citing concerns over the distribution of LGBT content and extremist materials. The move underscores the regulatory ...
Leroy Merlin France Security Breach Exposes Customer Data
Leroy Merlin faces a significant security breach impacting customer data in France. Personal information, including names, addresses, and emails, was accessed by unauthorized entities.
Google Expands Support for Android’s In-Call Scam Protection to More Financial Institutions
In a significant move to bolster in-call scam protection, Google is expanding its Android feature to include multiple financial institutions in the United States. This ...
Critical Elementor Addons Flaw CVE-2025-8489 Actively Exploited on WordPress Sites
A severe flaw in the WordPress plugin, King Addons for Elementor, is being actively exploited. This CVE-2025-8489 vulnerability allows privilege escalation, giving attackers administrative access. ...
Microsoft Silently Patches Long-Exploited Windows Vulnerability
Microsoft discretely resolves CVE-2025-9491, a critical Windows Shortcut vulnerability exploited by hackers for years. November 2025 Patch Tuesday delivers the fix.
React Server Components’ Security Flaw Risks Unauthenticated Remote Code Execution
React Server Components are impacted by a critical vulnerability, CVE-2025-55182, offering a CVSS score of 10.0 for unauthenticated remote code execution.
Major Universities Affected in Oracle E-Business Suite Hacking Campaign
The University of Pennsylvania and the University of Phoenix recently disclosed that they were attacked in a broader cyber campaign. This campaign targets organizations utilizing ...
Freedom Mobile Data Breach: Protecting Consumer Information in the Telecom Sector
Freedom Mobile, Canada's fourth-largest wireless carrier, announced a significant data breach involving its customer account management platform, exposing consumer information. This development puts a spotlight ...
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
A joint investigation by BCA LTD, NorthScan, and ANY.RUN reveals North Korea's persistent infiltration scheme. The study exposes remote IT workers linked to the Lazarus ...
FTC Targets EdTech Giant Illuminate After Data Breach Exposes 10 Million Students
The Federal Trade Commission proposed significant actions against Illuminate Education following a 2021 incident that compromised data of 10 million students. The firm's measures raise ...
Cybersecurity Incident at Three-Council: Data Breach Adds Complexity
Kensington and Chelsea Council acknowledges a data breach as their IT system experiences disruption during a cyber incident. Historical data was accessed and copied, escalating ...
GlassWorm Supply Chain Attack Compromises Developer Tools
The GlassWorm supply chain attack returns, infiltrating Microsoft Visual Studio Marketplace and Open VSX with 24 extensions that impersonate popular developer frameworks such as Flutter, ...
Shai-Hulud Strikes Again: Massive Data Exposure from NPM Attack
Shai-Hulud's second attack compromised NPM packages, exposing 400,000 secrets. The breach affected thousands of GitHub repositories and underlines vulnerabilities inherent in open-source software supply chains.
Microsoft Investigates Defender XDR Portal Access Disruptions
Microsoft faces a challenge as users report limited access to the Defender XDR portal. For over 10 hours, customers have experienced obstacles accessing key features, ...
University of Pennsylvania Data Breach: Clop’s Zero-Day Exploit Targets Oracle’s E-Business Suite
The University of Pennsylvania recently disclosed a data breach affecting over 1,400 individuals. Attackers exploited a zero-day vulnerability in Oracle’s E-Business Suite, linked to the ...