Cyber Security
Cybersecurity
Apple Addresses Critical Zero-Day Exploit in Latest iOS Patch
Andrew Doyle
February 17, 2026
Apple has identified and patched a zero-day vulnerability present in all iOS versions since 1.0. This serious flaw has been reportedly exploited in "extremely sophisticated ...
Cybersecurity
Infostealer Malware Targets macOS Users Through Deceptive ClickFix Campaigns
Andrew Doyle
February 17, 2026
Cybercriminals employ sophisticated techniques by leveraging Claude artifacts and Google Ads in ClickFix campaigns, aiming at macOS users. They exploit specific search queries to deliver ...
Cybersecurity
CISA Mandates Immediate Patch for Critical Vulnerability in Microsoft Configuration Manager
Mitchell Langley
February 17, 2026
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address a critical Microsoft Configuration Manager vulnerability, reminding them of ...
Application Security
Microsoft Configuration Manager SQL Injection Alert
Andrew Doyle
February 17, 2026
A SQL injection flaw in Microsoft Configuration Manager patched in October 2024 is currently exploited, posing a significant risk to unpatched systems, including businesses and ...
CVE Vulnerability Alerts
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
Mitchell Langley
February 17, 2026
BeyondTrust Remote Support's CVE-2026-1731, a critical vulnerability, witnessed exploitation attempts within 24 hours of the public release of a Proof of Concept (PoC), highlighting attackers' ...
Cybersecurity
Major Breach at Dutch Mobile Network Operator Exposes Sensitive Customer Data
Gabby Lee
February 17, 2026
A significant breach at a leading Dutch mobile network operator exposed sensitive customer information, affecting around 6.2 million individuals. Names, addresses, and bank details were ...
Application Security
Integration of Criminal IP with IBM QRadar: Enhancing IP Threat Intelligence
Mitchell Langley
February 17, 2026
Security operations centers (SOC) can enhance their threat detection capabilities with the integration of IP-based intelligence from Criminal IP into IBM's QRadar. This integration offers ...
CVE Vulnerability Alerts
CISA Catalog Includes BeyondTrust Flaw Vulnerability
Andrew Doyle
February 17, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a vulnerability in BeyondTrust RS and PRA, identified as CVE-2026-1731, to its Known Exploited ...
Cybersecurity
CANFAIL Malware Unveiled Amidst Russian Cyber Influence Allegations
Andrew Doyle
February 17, 2026
A previously undocumented threat actor, possibly linked to Russian intelligence services, has been identified targeting Ukrainian defense, government, and energy sectors using CANFAIL malware, raising ...
Cybersecurity
Social Engineering Attack Compromises Fintech Company Figure’s Security
Gabby Lee
February 17, 2026
Fintech firm Figure confirmed a data breach following a social engineering attack that deceived an employee. The incident enabled hackers to gain access and steal ...
Application Security
Ivanti Endpoint Manager Mobile Critical Vulnerabilities Exploited by a Single Threat Actor
Andrew Doyle
February 17, 2026
Cybersecurity experts have identified a single threat actor responsible for exploiting critical vulnerabilities in Ivanti Endpoint Manager Mobile. These vulnerabilities, CVE-2026-21962 and CVE-2026-24061, are actively ...
News
UAT-9921 Emerges with VoidLink to Challenge Technology and Financial Entities
Mitchell Langley
February 17, 2026
The newly identified threat actor UAT-9921 is utilizing VoidLink, a sophisticated modular attack framework, to compromise technology and financial sectors, according to Cisco Talos.
Application Security
Dangerous Chrome Extensions Leak Personal Data and Track Users
Gabby Lee
February 16, 2026
A recent investigation revealed that over 300 Chrome extensions, collectively downloaded more than 37 million times, are involved in leaking or stealing user data. These ...
Cybersecurity
Trezor and Ledger Crypto Wallets Targeted by Mail Scam
Andrew Doyle
February 16, 2026
Threat actors are exploiting trust in security hardware brands by sending fake letters impersonating Trezor and Ledger, targeting cryptocurrency users. This deception aims to collect ...
Application Security
Google Groups Exploited in Lumma Stealer Malware Campaign
Mitchell Langley
February 16, 2026
Attackers are using Google Groups to distribute Lumma Stealer malware, targeting credentials across Windows and Linux platforms. They exploit Google services, deploying trojanized "Ninja Browser" ...
Cybersecurity
Malicious JavaScript Targets Cryptocurrency Users Via Pastebin
Andrew Doyle
February 16, 2026
Cybercriminals employ a new strategy using Pastebin to execute ClickFix-style attacks, targeting cryptocurrency users’ Bitcoin transactions. The attackers use malicious JavaScript to hijack swaps, leading ...
Cybersecurity
Social Engineering Resurfaces: The ClickFix Attack Using DNS Lookups
Mitchell Langley
February 16, 2026
Microsoft's research reveals a new iteration of the ClickFix tactic, exploiting DNS lookups for payload retrieval. This tactic employs the "nslookup" command in Windows to ...
Application Security
Texas-Based Financial Services Provider Marquis Cites SonicWall Breach for Ransomware Incident
Mitchell Langley
February 16, 2026
Marquis Software Solutions suffered a ransomware attack in August 2025, impacting multiple banks. Rolling out explanations, the company attributes this compromise to a security flaw ...
CVE Vulnerability Alerts
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
Andrew Doyle
February 4, 2026
Following the identification of a critical vulnerability in SolarWinds Web Help Desk, CISA has instructed federal agencies to patch their systems within three days. This ...
News
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
Mitchell Langley
February 4, 2026
Iron Mountain, a reputed data storage provider, has confirmed a breach by the Everest extortion group, affecting primarily marketing data. The company reassures clients of ...
Cybersecurity
Romanian Hacker Admits to Selling Oregon State Network Access in Court
Mitchell Langley
February 23, 2026
Cybersecurity
Privacy Groups Demand Compliance From Generative AI Image Creators
Gabby Lee
February 23, 2026
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
Gabby Lee
February 17, 2026
TOP CYBERSECURITY HEADLINES
Application Security
Anthropic Introduces Claude Code Security for Vulnerability Detection
CVE Vulnerability Alerts
Critical Grandstream Phone Vulnerability Allows for Eavesdropping Opportunities
This Week’s Security Spotlight
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Andrew Doyle
February 19, 2026
Cybersecurity
CISA Faces Challenges With Limited Resources Amid DHS Shutdown
Andrew Doyle
February 17, 2026
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Microsoft Configuration Manager SQL Injection Alert
February 17, 2026
A SQL injection flaw in Microsoft Configuration Manager patched in October 2024 is currently exploited, posing a significant risk to unpatched systems, including businesses and ...
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
February 17, 2026
BeyondTrust Remote Support's CVE-2026-1731, a critical vulnerability, witnessed exploitation attempts within 24 hours of the public release of a Proof of Concept (PoC), highlighting attackers' ...
Major Breach at Dutch Mobile Network Operator Exposes Sensitive Customer Data
February 17, 2026
A significant breach at a leading Dutch mobile network operator exposed sensitive customer information, affecting around 6.2 million individuals. Names, addresses, and bank details were ...
Integration of Criminal IP with IBM QRadar: Enhancing IP Threat Intelligence
February 17, 2026
Security operations centers (SOC) can enhance their threat detection capabilities with the integration of IP-based intelligence from Criminal IP into IBM's QRadar. This integration offers ...
CISA Catalog Includes BeyondTrust Flaw Vulnerability
February 17, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a vulnerability in BeyondTrust RS and PRA, identified as CVE-2026-1731, to its Known Exploited ...
CANFAIL Malware Unveiled Amidst Russian Cyber Influence Allegations
February 17, 2026
A previously undocumented threat actor, possibly linked to Russian intelligence services, has been identified targeting Ukrainian defense, government, and energy sectors using CANFAIL malware, raising ...
Social Engineering Attack Compromises Fintech Company Figure’s Security
February 17, 2026
Fintech firm Figure confirmed a data breach following a social engineering attack that deceived an employee. The incident enabled hackers to gain access and steal ...
Ivanti Endpoint Manager Mobile Critical Vulnerabilities Exploited by a Single Threat Actor
February 17, 2026
Cybersecurity experts have identified a single threat actor responsible for exploiting critical vulnerabilities in Ivanti Endpoint Manager Mobile. These vulnerabilities, CVE-2026-21962 and CVE-2026-24061, are actively ...
UAT-9921 Emerges with VoidLink to Challenge Technology and Financial Entities
February 17, 2026
The newly identified threat actor UAT-9921 is utilizing VoidLink, a sophisticated modular attack framework, to compromise technology and financial sectors, according to Cisco Talos.
Dangerous Chrome Extensions Leak Personal Data and Track Users
February 16, 2026
A recent investigation revealed that over 300 Chrome extensions, collectively downloaded more than 37 million times, are involved in leaking or stealing user data. These ...
Trezor and Ledger Crypto Wallets Targeted by Mail Scam
February 16, 2026
Threat actors are exploiting trust in security hardware brands by sending fake letters impersonating Trezor and Ledger, targeting cryptocurrency users. This deception aims to collect ...
Google Groups Exploited in Lumma Stealer Malware Campaign
February 16, 2026
Attackers are using Google Groups to distribute Lumma Stealer malware, targeting credentials across Windows and Linux platforms. They exploit Google services, deploying trojanized "Ninja Browser" ...
Malicious JavaScript Targets Cryptocurrency Users Via Pastebin
February 16, 2026
Cybercriminals employ a new strategy using Pastebin to execute ClickFix-style attacks, targeting cryptocurrency users’ Bitcoin transactions. The attackers use malicious JavaScript to hijack swaps, leading ...
Social Engineering Resurfaces: The ClickFix Attack Using DNS Lookups
February 16, 2026
Microsoft's research reveals a new iteration of the ClickFix tactic, exploiting DNS lookups for payload retrieval. This tactic employs the "nslookup" command in Windows to ...
Texas-Based Financial Services Provider Marquis Cites SonicWall Breach for Ransomware Incident
February 16, 2026
Marquis Software Solutions suffered a ransomware attack in August 2025, impacting multiple banks. Rolling out explanations, the company attributes this compromise to a security flaw ...
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
February 4, 2026
Following the identification of a critical vulnerability in SolarWinds Web Help Desk, CISA has instructed federal agencies to patch their systems within three days. This ...
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
February 4, 2026
Iron Mountain, a reputed data storage provider, has confirmed a breach by the Everest extortion group, affecting primarily marketing data. The company reassures clients of ...
RADICL Secures $31 Million to Boost Development of Autonomous vSOC
February 4, 2026
RADICL raises $31 million to enhance its virtual security operations center, aiming to revolutionize cybersecurity with autonomous threat detection features.
RapidFort Secures $42 Million to Enhance Software Security Automation
February 4, 2026
RapidFort has successfully raised $42 million in funding to further automate software supply chain security. This financial boost will aid the company in boosting its ...
UK Data Protection Authority Probes X’s Grok AI for Generating Inappropriate Images
February 4, 2026
The UK's data protection authority targets X's AI assistant, Grok, in a probe following claims of generating non-consensual sexual images. This investigation highlights data privacy ...






































