Cyber Security
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Trent AI Emerges From Stealth With $13 Million in Funding
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Exchange Online Mailbox Access Issues Impact Outlook Users
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Free Android VPNs Are Quietly Working Against You
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Apple Rolls Out DarkSword Exploit Protection to More Devices
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Cybercriminals Exploit Empty Properties for Postal Fraud
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Cybersecurity
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Microsoft addresses issues affecting Gmail and Yahoo email synchronization for classic Outlook users.
Gartner Publishes Its First Market Guide for Guardian Agents
Cybersecurity
Gartner Publishes Its First Market Guide for Guardian Agents
Gartner's first Market Guide for Guardian Agents, released on February 25, 2026, outlines expectations for this nascent field.
TeamPCP Strikes Again, This Time Targeting the Python Package litellm
News
TeamPCP Strikes Again, This Time Targeting the Python Package litellm
Malicious versions of Python package litellm contain a credential harvester and persistent backdoor planted by the threat actor TeamPCP.
Software Supply Chains Are the New Frontline for Cyber Risk
Cybersecurity
Software Supply Chains Are the New Frontline for Cyber Risk
Explore how perimeter security isn't enough to protect against threats in software supply chains.
Sam Altman's Eyeball-Scanning Orb Takes on a New Role in AI Integration
Cybersecurity
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Sam Altman integrates agentic AI with his eyeball-scanning orb, enhancing its applications in cryptography and bot identification.
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
Cybersecurity
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
UK Companies House vulnerability exposed millions of firm details, potentially allowing unauthorized access and record alteration.
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
Cybersecurity
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
Researchers expose a method leveraging DNS queries for data exfiltration from AI code execution environments.
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
Cybersecurity
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
The EU Council has sanctioned three entities and two individuals involved in cyberattacks on critical infrastructure within the region.
Identity-Based Access Control for AI Agents Is Now a Security Necessity
Cybersecurity
Identity-Based Access Control for AI Agents Is Now a Security Necessity
How identity-based access control for AI agents helps safeguard against misuse and data exposure.
Hidden Commands in Font Rendering Are Being Used to Manipulate AI Assistants Through Webpages
Application Security
Hidden Commands in Font Rendering Are Being Used to Manipulate AI Assistants Through Webpages
A font-rendering vulnerability manipulates AI assistants by concealing malicious web commands in innocent HTML.
Surf AI Raises $57 Million for Its Agentic Security Operations Platform
Cybersecurity
Surf AI Raises $57 Million for Its Agentic Security Operations Platform
Surf AI secures $57M in funding for its security operations platform.
LeakNet Ransomware Adopts ClickFix to Trick Users Into Compromising Themselves
News
LeakNet Ransomware Adopts ClickFix to Trick Users Into Compromising Themselves
LeakNet ransomware integrates ClickFix for access, shifting from traditional entry strategies.
RondoDox Botnet Ramps Up Attacks, Hitting 15,000 Daily Exploitation Attempts
Cybersecurity
RondoDox Botnet Ramps Up Attacks, Hitting 15,000 Daily Exploitation Attempts
The RondoDox botnet targets 174 vulnerabilities, increasing activity to 15,000 exploitation attempts daily.
Tech and Retail Giants Sign Global Pact to Combat Online Scams and Fraud
Cybersecurity
Tech and Retail Giants Sign Global Pact to Combat Online Scams and Fraud
Major tech and retail organizations have banded together to address online scams and fraud, establishing a first-of-its-kind industry accord designed ...
Tech Giants Invest $12.5 Million in Open Source Software Security
Cybersecurity
Tech Giants Invest $12.5 Million in Open Source Software Security
Major tech firms contribute $12.5 million to enhance open source software security.
Ongoing Python Package Attack Uses Stolen GitHub Tokens
Application Security
Ongoing Python Package Attack Uses Stolen GitHub Tokens
Attack leverages stolen GitHub tokens to introduce malware into numerous Python repositories.
Stryker's Internal Microsoft Environment Was Breached Last Week
Cybersecurity
Stryker’s Internal Microsoft Environment Was Breached Last Week
Stryker's internal Microsoft environment breach led to the remote wiping of tens of thousands of employee devices last week.
Payload Ransomware Group Claims Breach of Royal Bahrain Hospital
News
Payload Ransomware Group Claims Breach of Royal Bahrain Hospital
Royal Bahrain Hospital reportedly targeted by Payload ransomware, with 110 GB of sensitive data allegedly stolen.
DRILLAPP Backdoor Campaign Targets Ukrainian Organizations With Edge Debugging Abuse
Cybersecurity
DRILLAPP Backdoor Campaign Targets Ukrainian Organizations With Edge Debugging Abuse
Russian-linked threat actors deploy DRILLAPP backdoor campaign in Ukraine.
Phishing Attack Hits Intuitive's Internal IT Business Systems
News
Phishing Attack Hits Intuitive’s Internal IT Business Systems
Intuitive's internal systems hit by phishing attack; patient operations remain unaffected.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Software Supply Chains Are the New Frontline for Cyber Risk
Explore how perimeter security isn't enough to protect against threats in software supply chains.
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Sam Altman integrates agentic AI with his eyeball-scanning orb, enhancing its applications in cryptography and bot identification.
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
UK Companies House vulnerability exposed millions of firm details, potentially allowing unauthorized access and record alteration.
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
Researchers expose a method leveraging DNS queries for data exfiltration from AI code execution environments.
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
The EU Council has sanctioned three entities and two individuals involved in cyberattacks on critical infrastructure within the region.
Identity-Based Access Control for AI Agents Is Now a Security Necessity
How identity-based access control for AI agents helps safeguard against misuse and data exposure.
Hidden Commands in Font Rendering Are Being Used to Manipulate AI Assistants Through Webpages
A font-rendering vulnerability manipulates AI assistants by concealing malicious web commands in innocent HTML.
Surf AI Raises $57 Million for Its Agentic Security Operations Platform
Surf AI secures $57M in funding for its security operations platform.
LeakNet Ransomware Adopts ClickFix to Trick Users Into Compromising Themselves
LeakNet ransomware integrates ClickFix for access, shifting from traditional entry strategies.
RondoDox Botnet Ramps Up Attacks, Hitting 15,000 Daily Exploitation Attempts
The RondoDox botnet targets 174 vulnerabilities, increasing activity to 15,000 exploitation attempts daily.
Tech and Retail Giants Sign Global Pact to Combat Online Scams and Fraud
Major tech and retail organizations have banded together to address online scams and fraud, establishing a first-of-its-kind industry accord designed ...
Tech Giants Invest $12.5 Million in Open Source Software Security
Major tech firms contribute $12.5 million to enhance open source software security.
Ongoing Python Package Attack Uses Stolen GitHub Tokens
Attack leverages stolen GitHub tokens to introduce malware into numerous Python repositories.
Stryker’s Internal Microsoft Environment Was Breached Last Week
Stryker's internal Microsoft environment breach led to the remote wiping of tens of thousands of employee devices last week.
Payload Ransomware Group Claims Breach of Royal Bahrain Hospital
Royal Bahrain Hospital reportedly targeted by Payload ransomware, with 110 GB of sensitive data allegedly stolen.
Phishing Attack Hits Intuitive’s Internal IT Business Systems
Intuitive's internal systems hit by phishing attack; patient operations remain unaffected.
DRILLAPP Backdoor Campaign Targets Ukrainian Organizations With Edge Debugging Abuse
Russian-linked threat actors deploy DRILLAPP backdoor campaign in Ukraine.
New Malware Tactics Take Aim at Windows, iOS, and Linux Users
Explore how new malware strains are targeting users with advanced methods and reverse engineering insights.
Companies House Restores WebFiling Service After Security Flaw Exposed Corporate Data
Companies House fixes a security flaw in WebFiling, protecting UK companies' data.
How AI Is Making Financial Fraud 4.5 Times More Profitable
Financial fraud schemes using AI boost profitability by 4.5 times, Interpol reports.