Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
ShinyHunters Claims 1.5 Billion Salesforce Records
Cybersecurity
ShinyHunters Claims 1.5 Billion Salesforce Records
ShinyHunters claims 1.5 billion Salesforce records stolen from 760 companies after attackers harvested Salesloft Drift OAuth tokens, exposing CRM, case data, and secrets.
UK Arrests Scattered Spider Teens Linked to TfL Cyberattack
Cybersecurity
UK Arrests Scattered Spider Teens Linked to TfL Cyberattack
UK police arrest two teens tied to Scattered Spider and the 2024 TfL cyberattack, linking them to global breaches, U.S. healthcare attacks, and $115M in ...
Lotte Card Confirms Data Breach Exposing 2.97 Million Customers
Cybersecurity
Lotte Card Confirms Data Breach Exposing 2.97 Million Customers
Lotte Card confirmed a breach exposing 2.97 million customers; 280,000 had full card data leaked. Company pledges compensation and steps to reissue cards.
Panama’s Finance Ministry Confirms Cyberattack as INC Ransom Claims Massive Data Theft
Cybersecurity
Panama’s Finance Ministry Confirms Cyberattack as INC Ransom Claims Massive Data Theft
Panama’s MEF confirms a cyberattack but says systems remain safe. INC Ransom claims stealing financial data, emails, and documents, posting samples on its dark web ...
Hackers Use SEO Poisoning to Deliver Malware through Fake Apps
Cybersecurity
Hackers Use SEO Poisoning to Deliver Malware through Fake Apps
Researchers warn SEO-poisoning campaigns push trojanized Signal, WhatsApp and Chrome installers that bundle legitimate apps with Hiddengh0st and Winos malware for long-term surveillance.
HybridPetya Ransomware Bypasses UEFI Secure Boot
Cybersecurity
HybridPetya Ransomware Bypasses UEFI Secure Boot
ESET found HybridPetya, a Petya-style ransomware that exploits CVE-2024-7344 to bypass UEFI Secure Boot, install a bootkit, encrypt MFT clusters, and demand Bitcoin.
Microsoft Fairwater Center: Hyperscale AI Hub Coming To Wisconsin
Cybersecurity
Microsoft Fairwater Center: Hyperscale AI Hub Coming to Wisconsin
Microsoft is building Fairwater, a hyperscale AI data center in Wisconsin with clustered NVIDIA GPUs, closed-loop liquid cooling, and a Datacenter Academy for local workforce ...
SystemBC Turns Infected VPS Hosts Into Global Proxy Highway
Cybersecurity
SystemBC Turns Infected VPS Hosts Into Global Proxy Highway
SystemBC leverages vulnerable commercial VPS hosts to run a 1,500-node proxy botnet that serves scraping, proxy resale, and high-volume criminal traffic globally.
Clarins Listed by Everest Ransomware Gang on Dark Web Post
Cybersecurity
Clarins Listed by Everest Ransomware Gang on Dark Web Post
Paris-headquartered luxury skincare maker Clarins has been named on a dark web leak page run by the Everest ransomware gang, ...
Hundreds of NPM Packages Compromised in Self-Replicating Supply Chain Attack
Cybersecurity
Hundreds of NPM Packages Compromised in Self-Replicating Supply Chain Attack
A worm-style supply chain attack has compromised hundreds of NPM packages, harvesting npm tokens and secrets while propagating across popular JavaScript libraries and developer scopes.
New Kid Warlock Steps Up Ransomware Attacks With SharePoint Exploits
Cybersecurity
New Kid Warlock Steps Up Ransomware Attacks with SharePoint Exploits
Warlock — tracked as Storm 2603 and GOLD SALEM — has surged since March 2025, exploiting SharePoint and other enterprise flaws and listing dozens of ...
Hackers Claim Breach of Italian Post, Researchers Disagree
Cybersecurity
Hackers Claim Breach of Italian Post, Researchers Disagree
Hackers claim to have breached Poste Italiane, but researchers say the data is recycled from older leaks with fabricated fields, meaning no new compromise actually ...
Baltimore Medical System Claimed by Brain Cipher Ransomware
Cybersecurity
Baltimore Medical System Claimed by Brain Cipher Ransomware
Brain Cipher claims several terabytes stolen from Baltimore Medical System, posting large server and database samples; impact could include medical identity theft for thousands of ...
Hackers Now Going Straight to the Source — Company Data Backups
Cybersecurity
Hackers Now Going Straight to the Source — Company Data Backups
Hackers are increasingly targeting company backups, with 18% of breaches linked to backup attacks — crippling recovery efforts and highlighting the urgent need for secure, ...
Hackers Claim Attack on the US's Biggest Sushi Supplier — Again?
Cybersecurity
Hackers Claim Attack on the US’s Biggest Sushi Supplier — Again?
Ransomware gang Lynx claims to have stolen True World Group data, posting invoices and employee records—raising fears of a new breach and business, identity risks.
Security Flaw in Yellow.ai Chatbot Allowed Cookie Theft and Account Hijacking
Cybersecurity
Security Flaw in Yellow.ai Chatbot Allowed Cookie Theft and Account Hijacking
A critical flaw in Yellow.ai’s chatbot allowed malicious code injection and cookie theft, putting support agent accounts at risk. The vulnerability has been patched.
Russian Gang Claims Breach of U.S. Broadcaster; Executive Passport Exposed
Cybersecurity
Russian Gang Claims Breach of U.S. Broadcaster; Executive Passport Exposed
Termite claims to have exfiltrated News-Press & Gazette data, posting screenshots that show a U.S. passport and employee contact records, heightening identity-theft concerns.
FBI Warns of UNC6040 and UNC6395 Threat Actors Targeting Salesforce
Cybersecurity
FBI Warns of UNC6040 and UNC6395 Threat Actors Targeting Salesforce
FBI warns that UNC6040 and UNC6395 are exploiting Salesforce through OAuth abuse and stolen tokens to steal corporate data, extort victims, and pivot into cloud ...
Vietnam Credit Bureau Leak Claims Expose 160 Million Financial Records
Cybersecurity
Vietnam Credit Bureau Leak Claims Expose 160 Million Financial Records
ShinyHunters claims to sell 160 million CIC credit records from Vietnam. Researchers verified samples; authorities confirm a breach and opened an investigation.
Retina Group of Florida and Hampton Regional Medical Center Report Patient Data Breaches
Cybersecurity
Retina Group of Florida and Hampton Regional Medical Center Report Patient Data Breaches
Retina Group of Florida and Hampton Regional Medical Center disclosed breaches exposing protected health information for approximately 153,000 patients; investigations, notifications, and monitoring are underway ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
A new cybersecurity startup with an infamous name attached is making headlines. SafeHill—formerly known as Tacticly—has secured $2.6 million in pre-seed funding to accelerate the ...
How to Enable Kernel-mode Hardware-Enforced Stack Protection in Windows 11
Enable Kernel-mode Hardware-enforced Stack Protection in Windows 11
Medusa Ransomware Claims Comcast Data Haul; $1.2M Extortion Demand Posted
Medusa claims 834.4GB exfiltration from Comcast and demands $1.2M; companies should preserve evidence, hunt IOCs, validate backups, and coordinate with CISA/FBI guidance.
Spacecom Breach Claims Questioned Amid Hacktivist Group’s Bold Assertions
Hacktivist group Handala claimed a major Spacecom breach, but researchers found limited evidence. Analysts warn of social engineering risks and rising hacktivist campaigns targeting critical ...
Asahi Group Suspends Operations After Cyberattack Disrupts Japanese Headquarters
Asahi has suspended orders, shipments and customer services in Japan after a cyberattack; investigation continues into whether systems were encrypted or sensitive data were exfiltrated.
WestJet Notifies U.S. Travelers After June Data Breach
WestJet warns some passenger and loyalty data were accessed in a June intrusion; travelers should monitor accounts, enable MFA, and watch for phishing or identity-fraud ...
Microsoft Warns of New XCSSET macOS Malware Variant Targeting Xcode Devs
Microsoft detects a new XCSSET variant targeting Xcode projects with clipboard hijacking, Firefox data theft, and LaunchDaemon persistence—inspect builds, patch systems, and harden CI pipelines.
Maryland Department of Transportation Confirms Data Loss in Rhysida Ransomware Attack
Rhysida claims to have stolen MDOT employee IDs and background checks and demands 30 BTC; MDOT confirms data loss while investigators and responders work to ...
Co-Op Reports $107 Million Loss After Scattered Spider Cyberattack
The Co-operative Group has disclosed over $100 million in profit losses from the April 2025 Scattered Spider cyberattack. The breach caused £206 million in lost ...
Texas Compliance Vendor Exposes 40K+ Sensitive DOT Records in S3 Leak
Misconfigured S3 storage exposed 18,000 Social Security cards and 23,000 driver licenses tied to AJT Compliance’s DOT SHIELD, putting Texas truckers at high risk of ...
Jaguar Land Rover Cyberattack Fallout: £1.5B UK Bailout Sparks Fears of More Attacks
Jaguar Land Rover (JLR), one of the UK’s largest exporters and a key anchor of the nation’s automotive supply chain, has been brought to the ...
ICO Fines U.K. Energy Firms £550K for Unlawful Robo Marketing Calls
The ICO fined two U.K. energy companies £550K for unlawful robo-calls that targeted vulnerable individuals. Consumers are urged to register with TPS and report suspicious ...
UK Arrests Suspect in Ransomware Attack That Disrupted European Airports
UK police arrested a suspect in the Collins Aerospace MUSE ransomware attack that disrupted major European airports; investigators continue forensic work while airports rely on ...
Dark Web Monitoring Guide for CISOs: Turning Shadows into Signals
Dark web monitoring gives CISOs early warning of breaches, ransomware, and credential leaks. Turning intelligence into action helps enterprises anticipate attacks instead of merely reacting.
CISA’s Sunset Clause: What Happens if America’s Cyber Threat Shield Expires?
The Cybersecurity Information Sharing Act (CISA), first enacted in 2015, is facing a critical expiration deadline in September 2025. Without reauthorization, the law that shields ...
GhostSec – From Hacktivist to Ransomware Warlord
GhostSec evolved from hacktivist roots into a hybrid ransomware threat, using GhostLocker to target global sectors with encryption, extortion, and high-impact double-extortion campaigns.
How to Remove a Hacker’s Access From a Hacked Device
Hacked phones can expose sensitive data to fraud, identity theft, and financial loss. This guide explains how to spot signs of compromise, regain control through ...
5 Cybersecurity Blind Spots Most Companies Ignore
Cyberattacks often exploit overlooked weaknesses, not just firewalls or antivirus gaps. This article highlights five common cybersecurity blind spots—shadow IT, poor access controls, unpatched systems, ...
Crypto Theft on macOS: XCSSET Malware Swaps Wallet Addresses in Real Time
A new and more dangerous variant of the XCSSET macOS malware has been uncovered by Microsoft, revealing an expanded arsenal of capabilities aimed at financial ...
Nine High-Severity Vulnerabilities Expose Cognex Legacy Cameras to Cyber Threats
Cybersecurity researchers at Nozomi Networks have uncovered nine high-severity vulnerabilities in several older models of Cognex industrial cameras, including the widely deployed In-Sight 2000, 7000, ...