Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
Vietnam Airlines Confirms Customer Data Breach Linked to Third-Party Support Platform
Cybersecurity
Vietnam Airlines Confirms Customer Data Breach Linked to Third-Party Support Platform
Vietnam Airlines says a third-party customer-service platform was breached, possibly exposing customer contact data; payments, passwords and passports were not affected, investigation and notifications are ...
Oracle Quietly Patches Zero-Day Vulnerability Revealed by ShinyHunters Leak
Cybersecurity
Oracle Quietly Patches Zero-Day Vulnerability Revealed by ShinyHunters Leak
Oracle quietly patched a zero-day exploit leaked by ShinyHunters, enabling remote command execution in enterprise applications. Customers are urged to deploy updates immediately and audit ...
CoinbaseCartel Threatens to Publish SK Telecom Source Code unless Ransom Talks Start
Cybersecurity
CoinbaseCartel Threatens to Publish SK Telecom Source Code unless Ransom Talks Start
Ransom group CoinbaseCartel claims to have stolen SK Telecom source code, build files and cloud keys via a repository compromise and threatens public disclosure this ...
Russia Suspected in Jaguar Land Rover Cyberattack That Halted Production for Weeks
Cybersecurity
Russia Suspected in Jaguar Land Rover Cyberattack That Halted Production for Weeks
UK investigators probe Russian involvement after a September cyberattack at Jaguar Land Rover disabled 800 systems and halted production; government underwrites a £1.5bn loan guarantee.
Northern Rivers Resilient Homes Program Breach Exposes Personal Data of 2,031 Residents
Cybersecurity
Northern Rivers Resilient Homes Program Breach Exposes Personal Data of 2,031 Residents
An internal AI upload exposed the personal and health data of 2,031 Northern Rivers Resilient Homes participants. The NSW Reconstruction Authority opened investigations and issued ...
Qantas Customer Data Leaked on Dark Web After July Cyberattack
Cybersecurity
Qantas Customer Data Leaked on Dark Web After July Cyberattack
Hackers have leaked data of nearly six million Qantas customers on the dark web after a Salesforce-linked breach, exposing names, contact details, and frequent flyer ...
Discord Breach Exposes 70,000 ID Photos and Raises Questions about Third-Party Age Verification
Cybersecurity
Discord Breach Exposes 70,000 ID Photos and Raises Questions about Third-Party Age Verification
Discord has confirmed that government-issued identification photos belonging to roughly 70,000 users may have been exposed in a third-party breach ...
SimonMed Confirms Data Breach Exposed 1.2 Million Patients in January
Cybersecurity
SimonMed Confirms Data Breach Exposed 1.2 Million Patients in January
SimonMed Imaging says a January 2025 breach exposed data for 1.2 million patients. Medusa claimed theft of 212 GB including scanned IDs, medical records, and ...
Fake “Inflation Refund” Texts Target New Yorkers in Sophisticated Phishing Scam
Cybersecurity
Fake “Inflation Refund” Texts Target New Yorkers in Sophisticated Phishing Scam
Fraudulent “inflation refund” texts are scamming New Yorkers into surrendering personal data. Attackers steal IDs and financial information through fake government portals posing as refund ...
Zero-Day in Gladinet CentreStack and Triofox Actively Exploited
Cybersecurity
Zero-Day in Gladinet CentreStack and Triofox Actively Exploited
CVE-2025-11371, an unauthenticated LFI in Gladinet CentreStack and Triofox, is being exploited to retrieve machine keys and enable remote code execution; admins must apply Web.config ...
LockBit, Qilin, DragonForce Form Ransomware Cartel to Coordinate Attacks
Cybersecurity
LockBit, Qilin, DragonForce Form Ransomware Cartel to Coordinate Attacks
A fresh ransomware cartel reportedly unites LockBit, Qilin and DragonForce to share infrastructure, coordinate attacks and pool revenue, raising defense complexity for incident responders.
Spain Dismantles “GXC Team” Crime-as-a-Service Network and Arrests 25-Year-Old Leader
Cybersecurity
Spain Dismantles “GXC Team” Crime-as-a-Service Network and Arrests 25-Year-Old Leader
Spanish authorities dismantled GXC Team, arresting “GoogleXcoder.” The CaaS network supplied phishing kits, Android malware, and voice-scam tools across countries; tools seized, funds recovered.
Hackers Claim Massive Salesforce Breach Allegedly Exposing 1 Billion Records from Global Customers
Cybersecurity
Hackers Claim Massive Salesforce Breach Allegedly Exposing 1 Billion Records from Global Customers
Hackers claim to have stolen over one billion Salesforce customer records in an alleged breach tied to misconfigured integrations, prompting an active investigation by Salesforce.
Quebec HopHop App Leak Exposes Children’s Data Across Hundreds of Schools and Daycares
Cybersecurity
Quebec HopHop App Leak Exposes Children’s Data Across Hundreds of Schools and Daycares
A vulnerability in the HopHop school pickup app exposed photos, names and pickup controls for children and parents across Quebec, prompting government action and parental ...
Threat Actors Abuse Velociraptor DFIR Tool to Deploy Ransomware and Evade Detection
Cybersecurity
Threat Actors Abuse Velociraptor DFIR Tool to Deploy Ransomware and Evade Detection
Attackers are installing Velociraptor as a covert C2 channel, downloading VS Code with tunneling, staging ransomware payloads—all under the guise of legitimate forensic activity.
SonicWall Confirms Theft of All Firewall Cloud Backups, Urges Immediate Action
Cybersecurity
SonicWall Confirms Theft of All Firewall Cloud Backups, Urges Immediate Action
SonicWall confirmed all customers using cloud backups had firewall configs stolen. Encrypted credentials exposed. Admins must reset credentials, review device lists, and harden firewall access.
FBI Seizes BreachForums Infrastructure Used in Salesforce Extortion Scheme
Cybersecurity
FBI Seizes BreachForums Infrastructure Used in Salesforce Extortion Scheme
The FBI and French authorities seized BreachForums’ domain infrastructure, disrupting ShinyHunters’ Salesforce extortion campaign and signaling a major shift in international cybercrime disruption strategies.
ClayRat Spyware Tricks Android Users by Masquerading as WhatsApp, TikTok and YouTube
Cybersecurity
ClayRat Spyware Tricks Android Users by Masquerading as WhatsApp, TikTok and YouTube
ClayRat Android spyware poses as WhatsApp, TikTok, and YouTube apps, stealing data, intercepting messages, and spreading automatically via SMS links sent to user contacts.
Microsoft Warns of “Payroll Pirate” Attacks Diverting University Salaries
Cybersecurity
Microsoft Warns of “Payroll Pirate” Attacks Diverting University Salaries
Microsoft says threat actor Storm-2657 targeted university employees with phishing and MFA bypasses, enabling compromise of HR systems like Workday and redirection of salaries.
Discord Confirms Potential Age-Verification Vendor Breach Impacting About 70,000 Users
Cybersecurity
Discord Confirms Potential Age-Verification Vendor Breach Impacting About 70,000 Users
Discord has disclosed a potential data breach tied to a third-party age-verification provider that may have exposed official identification photos ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
F5 Releases Urgent BIG-IP Patches After Stolen Vulnerability Breach
A newly disclosed breach of F5 Networks has triggered an unprecedented federal response after state-linked attackers stole BIG-IP source code and internal vulnerability data. Fearing ...
Microsoft Patches Highest-Severity ASP.NET Core Flaw Enabling Remote Code Execution
Microsoft has released an emergency patch for CVE-2025-55315, a critical ASP.NET Core vulnerability in the Kestrel web server with a record-high CVSS score of 9.9. ...
Europol Cracks SIM-Cartel: €4.5M Fraud Losses Mitigated in Cybercrime Campaign
European authorities have dismantled SIMCARTEL, a massive cybercrime-as-a-service network that used 1,200 SIM boxes and 40,000 active SIM cards to power large-scale smishing, fraud, and ...
Europe Endures 300 Daily Cyberattacks: Geopolitical Tensions Fuel Digital Risk
Cyberattacks in Europe have surged due to rising geopolitical tensions, particularly the Russia-Ukraine conflict, making the region one of the world’s most targeted. Critical infrastructure, ...
US Power Grid at Risk: Unified Cybersecurity Framework Urged to Combat Industrial Vulnerabilities
Cyberattacks on U.S. utilities surged 70% in 2024 as legacy systems, poor cyber hygiene, and fragmented regulations leave the power grid dangerously exposed. Experts warn ...
WhatsApp Wins Landmark Case Against NSO Group Over Spyware Attacks
After six years of intense litigation, WhatsApp has secured a decisive legal victory against the NSO Group, the controversial spyware maker accused of exploiting a ...
Google Project Zero Exposes Dolby Decoder Flaw Enabling Zero-Click Android Exploits
A newly discovered vulnerability in Dolby’s Unified Decoder has sent shockwaves through the cybersecurity world. Tracked as CVE-2025-54957, the flaw — uncovered by Google Project ...
AISLE Launches AI Cyber Reasoning System to Shrink Patch Times from Weeks to Minute
AISLE has entered the cybersecurity arena with an AI-native Cyber Reasoning System (CRS) built to do what most tools don’t: fix vulnerabilities—fast. While attackers increasingly ...
AI-Powered Villager Pen Test Tool Hits 11K Downloads, Sparks Abuse Concerns
Villager, an AI-driven penetration testing tool released on PyPI, has surged past 11,000 downloads by automating network scanning, exploitation, and privilege escalation via natural language ...
Oracle E-Business Suite Hit by Cl0p Ransomware Using CVE-2025-61882
Cl0p ransomware is actively exploiting a zero-day in Oracle E-Business Suite (CVE-2025-61882), allowing unauthenticated remote code execution via the BI Publisher component. The attacks have ...
Microsoft Revokes 200+ Fraudulent Certificates: Thwarts Rhysida Ransomware Campaign
Microsoft has revoked over 200 compromised digital certificates to disrupt a ransomware campaign abusing fake Microsoft Teams installers. Threat actor Vanilla Tempest used SEO poisoning ...
WatchGuard Fireware OS Vulnerability: CVE-2025-9242 Enables Remote Code Execution
A critical flaw in WatchGuard Fireware OS (CVE-2025-9242) allows remote, unauthenticated code execution through vulnerable VPN configurations and is already being actively exploited. Even devices ...
SonicWall VPN Breach: Over 100 Accounts Compromised in Security Incident
Attackers have compromised over 100 SonicWall VPN accounts by exploiting stolen credentials, unpatched vulnerabilities, and OTP seed theft to bypass MFA. Threat groups like UNC6148 ...
Stealit Malware Exploits Node.js: Sneaky Infection via Game and VPN Installers
Cybersecurity researchers have uncovered a stealthy malware campaign abusing Node.js’s Single Executable Application feature to package Stealit malware as fake game and VPN installers. Distributed ...
Linux Rootkit Conceals Itself with eBPF & Magic Packets: Exploiting CVE-2024-23897
A sophisticated Linux rootkit dubbed LinkPro uses eBPF modules and magic TCP packets to stay hidden and activate on demand. Discovered after attackers exploited a ...
GPT-4-Powered MalTerminal Malware Automates Ransomware Creation: Reverse Shells at Scale
MalTerminal, a next-generation malware, embeds GPT-4 to autonomously generate ransomware or reverse shells at runtime, producing unique payloads that bypass signature-based defenses. Researchers say it ...
Wondershare RepairIt Vulnerabilities Exposed: CVE-2025-10643 & 10644 Threaten Data & AI Models
Two critical vulnerabilities in Wondershare RepairIt (CVE-2025-10643 and CVE-2025-10644) allow unauthenticated remote code execution through misconfigured storage tokens. With CVSS scores up to 9.4 and ...
Microsoft Blunts “Vanilla Tempest”: 200 Malicious Certificates Revoked
In early October 2025, Microsoft executed a targeted disruption against Vanilla Tempest—the threat actor also tracked as Vice Society—after uncovering a streamlined, high-impact campaign that ...
Mango Retailer Confirms Marketing Vendor Breach Exposing Customer Contact Details
MANGO says a marketing vendor compromise exposed customer first names, countries, postal codes, email and phone data. Core accounts, financials, and credentials were not impacted.
NPM Supply Chain Attack: 175 Malicious Packages Target Industrial Firms
A wave of coordinated supply chain attacks is targeting the NPM ecosystem, with over 400 malicious packages used to deploy malware, steal credentials, and compromise ...