Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
ICO Fines U.K. Energy Firms £550K for Unlawful Robo Marketing Calls
Cybersecurity
ICO Fines U.K. Energy Firms £550K for Unlawful Robo Marketing Calls
The ICO fined two U.K. energy companies £550K for unlawful robo-calls that targeted vulnerable individuals. Consumers are urged to register with TPS and report suspicious ...
UK Arrests Suspect in Ransomware Attack That Disrupted European Airports
Cybersecurity
UK Arrests Suspect in Ransomware Attack That Disrupted European Airports
UK police arrested a suspect in the Collins Aerospace MUSE ransomware attack that disrupted major European airports; investigators continue forensic work while airports rely on ...
Dark Web Monitoring Guide for CISOs Turning Shadows into Signals
Application Security
Dark Web Monitoring Guide for CISOs: Turning Shadows into Signals
Dark web monitoring gives CISOs early warning of breaches, ransomware, and credential leaks. Turning intelligence into action helps enterprises anticipate attacks instead of merely reacting.
GhostSec – From Hacktivist to Ransomware Warlord
Threat Actors
GhostSec – From Hacktivist to Ransomware Warlord
GhostSec evolved from hacktivist roots into a hybrid ransomware threat, using GhostLocker to target global sectors with encryption, extortion, and high-impact double-extortion campaigns.
How to Remove a Hacker's Access From a Hacked Device
Blog
How to Remove a Hacker’s Access From a Hacked Device
Hacked phones can expose sensitive data to fraud, identity theft, and financial loss. This guide explains how to spot signs of compromise, regain control through ...
5 Cybersecurity Blind Spots Most Companies Ignore
Blog
5 Cybersecurity Blind Spots Most Companies Ignore
Cyberattacks often exploit overlooked weaknesses, not just firewalls or antivirus gaps. This article highlights five common cybersecurity blind spots—shadow IT, poor access controls, unpatched systems, ...
Legislative Shifts in Cybersecurity Analyzing the Impact of EU and UK Cyber Laws
Cybersecurity
Legislative Shifts in Cybersecurity: Analyzing the Impact of EU and UK Cyber Laws
How will Europe’s new cyber laws change operational risk? This analysis explains the impact of the EU Cyber Solidarity Act and the UK CSRB on ...
Cisco ASA 5500-X Devices Under Attack U.S. CISA Issues Emergency Directive
Cybersecurity
Cisco ASA 5500-X Devices Under Attack: U.S. CISA Issues Emergency Directive
CISA has issued an emergency directive following active exploitation of Cisco ASA 5500-X firewalls. Federal agencies must audit and patch devices immediately, as vulnerabilities allow ...
Teen Suspect in Scattered Spider Casino Hacks Allegedly Holds $1.8M Bitcoin
Cybersecurity
Teen Suspect in Scattered Spider Casino Hacks Allegedly Holds $1.8M Bitcoin
A 17-year-old accused of aiding the 2023 MGM and Caesars cyberattacks faces six felony charges. Linked to Scattered Spider, prosecutors allege he holds $1.8M in ...
Cybersecurity
AI-Driven Zero-Day Attacks: Preparing for the Autonomous Cyber Threat Era
Autonomous AI agents are fueling a new wave of cyber threats, creating adaptive zero-day exploits and deepening risks for enterprises. Emerging defenses like AI Detection ...
Black Arrow Cyber Threat Intelligence Briefing Analyzing Emerging Attack Vectors
Cybersecurity
Black Arrow Cyber Threat Intelligence Briefing: Analyzing Emerging Attack Vectors
Black Arrow’s 2025 Cyber Threat Intelligence Briefing highlights rising cyber threats, including AI-driven phishing, deepfake social engineering, ransomware, and nation-state exploits. CFOs, executives, and critical ...
Congress Struggles to Renew Cyber Threat Sharing Act Amid Rising Cybersecurity Concerns
Cybersecurity
Congress Struggles to Renew Cyber Threat Sharing Act Amid Rising Cybersecurity Concerns
The Cybersecurity Information Sharing Act (CISA) of 2015 is set to expire on September 30, 2025, with Congress divided on renewal. Political gridlock threatens critical ...
Brickstorm Backdoor Used Espionage Campaign Against U.S. Tech
Cybersecurity
Brickstorm Backdoor Used Espionage Campaign Against U.S. Tech
Google reports Chinese hackers used Brickstorm malware to infiltrate U.S. tech and legal sectors for over a year, exfiltrating data while bypassing traditional security defenses.
GitHub Notifications Abused to Impersonate Y Combinator for Crypto Theft
Cybersecurity
GitHub Notifications Abused to Impersonate Y Combinator for Crypto Theft
Attackers abused GitHub issue notifications to impersonate YC, trick developers into EIP-712 signatures and drain wallets—inspect signed JSON, revoke approvals, and move assets now.
Interpol Operation HAECHI VI Recovers $439 Million From Global Cybercrime Networks
Cybersecurity
Interpol Operation HAECHI VI Recovers $439 Million From Global Cybercrime Networks
Operation HAECHI VI recovered $439 million, froze 68,000 bank accounts and seized 400 crypto wallets across 40 countries—demonstrating effective, coordinated disruption of global fraud networks.
China Mandates 1-Hour Cybersecurity Incident Reporting Under New CAC Rules
Cybersecurity
China Mandates 1-Hour Cybersecurity Incident Reporting Under New CAC Rules
China’s Cyberspace Administration (CAC) now requires serious cybersecurity incidents to be reported within one hour, starting November 1, 2025. The regulation introduces strict severity tiers, ...
Kali Linux 2025.3 Released With 10 New Tools and Advanced Wi-Fi Features
Cybersecurity
Kali Linux 2025.3 Released With 10 New Tools and Advanced Wi-Fi Features
Kali Linux 2025.3 adds 10 powerful tools, Nexmon Wi-Fi support, and NetHunter upgrades — offering red teams deeper attack capabilities and defenders new detection opportunities.
Warlock Group / GOLD SALEM (aka Storm-2603) — Threat Profile
Threat Actors
Warlock Group / GOLD SALEM (aka Storm-2603) — Threat Profile
This threat actor profile examines the Warlock ransomware group, tracked as Storm-2603 and GOLD SALEM. Active since March 2025, Warlock exploits Microsoft SharePoint vulnerabilities to ...
65% of IT Leaders Admit Cyber Defenses are Outdated
Cybersecurity
65% of IT Leaders Admit Cyber Defenses are Outdated
Artificial intelligence is fueling a new wave of cyber threats, from polymorphic malware to deepfake-driven phishing. Lenovo’s latest “Work Reborn” report shows 65% of IT ...
Boyd Gaming Discloses Data Breach Following Cyberattack
Cybersecurity
Boyd Gaming Discloses Data Breach Following Cyberattack
Boyd Gaming confirmed a cyberattack that stole employee and individual data. Operations remain unaffected as the company investigates, notifies regulators, and works with law enforcement ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Salesforce Refuses to Pay Ransom After Widespread CRM Data-Theft Campaigns
Salesforce refused extortion demands after attackers stole large CRM datasets via OAuth social engineering and stolen SalesLoft tokens; companies are revoking tokens and investigating scope.
Avnet Confirms EMEA Data Breach, Says Stolen Information Is Mostly Unreadable Without Internal Tools
Avnet confirmed a cyberattack on an EMEA cloud storage system. The company said stolen data was largely unreadable without its proprietary tools and global operations ...
Doctors Imaging Group Data Breach Exposes 171,000 Patients’ Medical and Financial Records
A November 2024 breach at Doctors Imaging Group exposed PHI and PII for 171,000 patients; forensics concluded in August 2025 and patient notifications followed.
DraftKings Says Credential Reuse Behind Targeted Account Intrusions, Not Internal Breach
DraftKings confirmed credential stuffing attacks targeting customer accounts, exposing limited personal data. The company ordered password resets, mandated multifactor authentication, and confirmed no internal breach ...
BK Technologies Cyberattack Contained as Employee Data Accessed by Threat Actors
BK Technologies confirmed a late-September cyberattack compromising internal systems and employee data, but swift containment and forensic analysis prevented further escalation or operational disruption.
Oracle E-Business Suite Zero-Day Exploited, Authorities Urge Immediate Patching
Oracle E-Business Suite zero-day CVE-2025-61882 is under active exploitation; emergency patches are available and organizations must patch and investigate potential compromise immediately.
RediShell Zero-Day in Redis Permits Remote Code Execution on Exposed Instances
Critical RediShell zero-day (CVE-2025-49844) enables Lua-based remote code execution on Redis; administrators must patch, disable Lua where possible and secure exposed instances immediately.
Red Hat Data Breach Escalates as ShinyHunters Joins Extortion
Red Hat faces escalated extortion as ShinyHunters lists sampled Customer Engagement Reports from the breach; samples name major clients and set an October 10 ransom ...
NIST Flags DeepSeek Adoption Over Security, Censorship and Cost Concerns
NIST analysis finds DeepSeek models lag U.S. counterparts, cost more, are easier to hijack, and exhibit CCP-aligned censorship, prompting security and policy warnings for adopters.
Unity Engine Flaw Permits Code Execution on Android and Escalation on Windows
A Unity runtime flaw (CVE-2025-59489) allows malicious apps or inputs to load attacker libraries, enabling code execution on Android and privilege escalation on Windows; developers ...
Discord Confirms Data Breach Linked to Third-Party Support Vendor
Discord has confirmed a significant data breach affecting users who interacted with its customer support teams, after hackers compromised a third-party service provider on September ...
ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
The final chapter in the ParkMobile data breach saga has arrived—nearly four years after the 2021 cyberattack that compromised the personal information of 22 million ...
Oneleet Secures $33M Series A to Revolutionize Integrated Cybersecurity
Amsterdam-based cybersecurity startup Oneleet has raised $33 million in Series A funding, bringing its total capital to $35 million and positioning itself as one of ...
Weather Station Gateway Exploited: CISA Adds Meteobridge Bug to KEV List
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning following confirmation that a command injection vulnerability in Meteobridge weather station devices is ...
DrayTek Issues Critical Patch for Router RCE Flaw (CVE-2025-10547)
A serious unauthenticated remote code execution (RCE) flaw, identified as CVE-2025-10547, has been uncovered in DrayTek’s DrayOS routers. This vulnerability allows attackers to send crafted ...
Salesforce Faces Extortion Threat After Salesloft OAuth Token Exploits
A hacking consortium claims Salesloft OAuth tokens were abused to extract CRM records from 700+ companies; Salesforce says claims relate to past or unverified incidents ...
Discord Discloses Support Ticket Breach After Unauthorized Access to Third-Party System
Discord confirmed attackers accessed a third-party support system, stealing support tickets, IDs, IPs, messages and partial billing data; investigation and user notifications are ongoing.
VMware Virtual Machines Targeted in Zero-Day Exploitation by China-Linked Hackers
Broadcom warns of zero-day flaws in VMware software exploited by China-linked hackers, allowing privilege escalation for months, raising concerns over virtualization security and global enterprise ...
Boeing Supplier Dimensional Control Systems Targeted in Ransomware Attack
J Group ransomware gang claims to have stolen 11GB of sensitive internal documents from Boeing supplier Dimensional Control Systems, raising cybersecurity concerns across global manufacturing ...
Lynx Claims Ransomware Intrusion at TriMed Subsidiary of Henry Schein
Lynx claims a ransomware intrusion at TriMed, posting alleged executive, legal, employee and proprietary files; Henry Schein is investigating with law enforcement and forensic partners.