Cyber Security
Anthropic Introduces Claude Code Security for Vulnerability Detection
PayPal Data Breach Exposed User Data for Six Months Due to Software Bug
Critical Grandstream Phone Vulnerability Allows for Eavesdropping Opportunities
Ukrainian National Sentenced in US Federal Court for Aiding North Korean IT Fraud
Deutsche Bahn Hit by a Large-Scale DDoS Attack Disrupting Rail Services
Snyk CEO Steps Down to Make Way for AI-Focused Leadership
Advantest Cyberattack Sparks Fears of Employee and Client Data Exposure
PromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
Former Google Engineers Indicted for Alleged Trade Secret Theft Linked to Iran
Operation Red Card 2.0 Dismantles Online Scam Networks Across Africa
MIT CSAIL’s 2025 AI Agent Index Puts System Transparency Under the Microscope
FBI Issues Warning on Escalating ATM Jackpotting Losses
Microsoft Addresses High-Severity Flaw in Windows Admin Center
Android Malware Uses Generative AI to Boost Its Post-Installation Capabilities
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
African Operation Leads to 651 Fraud Arrests and $4.3M Recovery
Human Error Remains One of the Biggest Threats to IT Security
Newly Identified Massiv Android Trojan Exploits IPTV App Disguise in Southern Europe
The UK Classifies Non-Consensual Intimate Images Alongside Serious Offenses
Venice Security Raises $33M to Strengthen Its Privileged Access Management Platform
Figure Data Breach Exposes Nearly 1 Million User Records
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
DEF CON Bars Three Men Named in Epstein Documents
Ivanti Zero-Day Exploitation Peaks as Cyber Threats Surge
Nigerian Hacker Gets Eight-Year Prison Sentence for Tax Fraud
Chinese Cyber Espionage Group Exploits Dell Security Vulnerability
Cybercriminals Create Impersonated Oura MCP Server to Deploy StealC Info-Stealer
VulnCheck Secures $25 Million to Enhance Vulnerability Intelligence
Notepad++ Bolsters Security With New Double-lock Update System
AI Assistants as Covert C2 Tools: Implications for Enterprise Security
Apple Addresses Critical Zero-Day Exploit in Latest iOS Patch
Cybersecurity
Apple Addresses Critical Zero-Day Exploit in Latest iOS Patch
Apple has identified and patched a zero-day vulnerability present in all iOS versions since 1.0. This serious flaw has been reportedly exploited in "extremely sophisticated ...
Infostealer Malware Targets macOS Users Through Deceptive ClickFix Campaigns
Cybersecurity
Infostealer Malware Targets macOS Users Through Deceptive ClickFix Campaigns
Cybercriminals employ sophisticated techniques by leveraging Claude artifacts and Google Ads in ClickFix campaigns, aiming at macOS users. They exploit specific search queries to deliver ...
CISA Mandates Immediate Patch for Critical Vulnerability in Microsoft Configuration Manager
Cybersecurity
CISA Mandates Immediate Patch for Critical Vulnerability in Microsoft Configuration Manager
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for federal agencies to address a critical Microsoft Configuration Manager vulnerability, reminding them of ...
Microsoft Configuration Manager SQL Injection Alert
Application Security
Microsoft Configuration Manager SQL Injection Alert
A SQL injection flaw in Microsoft Configuration Manager patched in October 2024 is currently exploited, posing a significant risk to unpatched systems, including businesses and ...
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
CVE Vulnerability Alerts
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
BeyondTrust Remote Support's CVE-2026-1731, a critical vulnerability, witnessed exploitation attempts within 24 hours of the public release of a Proof of Concept (PoC), highlighting attackers' ...
Major Breach at Dutch Mobile Network Operator Exposes Sensitive Customer Data
Cybersecurity
Major Breach at Dutch Mobile Network Operator Exposes Sensitive Customer Data
A significant breach at a leading Dutch mobile network operator exposed sensitive customer information, affecting around 6.2 million individuals. Names, addresses, and bank details were ...
Integration of Criminal IP with IBM QRadar Enhancing IP Threat Intelligence
Application Security
Integration of Criminal IP with IBM QRadar: Enhancing IP Threat Intelligence
Security operations centers (SOC) can enhance their threat detection capabilities with the integration of IP-based intelligence from Criminal IP into IBM's QRadar. This integration offers ...
CISA Catalog Includes BeyondTrust Flaw Vulnerability
CVE Vulnerability Alerts
CISA Catalog Includes BeyondTrust Flaw Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a vulnerability in BeyondTrust RS and PRA, identified as CVE-2026-1731, to its Known Exploited ...
CANFAIL Malware Unveiled Amidst Russian Cyber Influence Allegations
Cybersecurity
CANFAIL Malware Unveiled Amidst Russian Cyber Influence Allegations
A previously undocumented threat actor, possibly linked to Russian intelligence services, has been identified targeting Ukrainian defense, government, and energy sectors using CANFAIL malware, raising ...
Social Engineering Attack Compromises Fintech Company Figure's Security
Cybersecurity
Social Engineering Attack Compromises Fintech Company Figure’s Security
Fintech firm Figure confirmed a data breach following a social engineering attack that deceived an employee. The incident enabled hackers to gain access and steal ...
Ivanti Endpoint Manager Mobile Critical Vulnerabilities Exploited by a Single Threat Actor
Application Security
Ivanti Endpoint Manager Mobile Critical Vulnerabilities Exploited by a Single Threat Actor
Cybersecurity experts have identified a single threat actor responsible for exploiting critical vulnerabilities in Ivanti Endpoint Manager Mobile. These vulnerabilities, CVE-2026-21962 and CVE-2026-24061, are actively ...
UAT-9921 Emerges with VoidLink to Challenge Technology and Financial Entities
News
UAT-9921 Emerges with VoidLink to Challenge Technology and Financial Entities
The newly identified threat actor UAT-9921 is utilizing VoidLink, a sophisticated modular attack framework, to compromise technology and financial sectors, according to Cisco Talos.
Dangerous Chrome Extensions Leak Personal Data and Track Users
Application Security
Dangerous Chrome Extensions Leak Personal Data and Track Users
A recent investigation revealed that over 300 Chrome extensions, collectively downloaded more than 37 million times, are involved in leaking or stealing user data. These ...
Trezor and Ledger Crypto Wallets Targeted by Mail Scam
Cybersecurity
Trezor and Ledger Crypto Wallets Targeted by Mail Scam
Threat actors are exploiting trust in security hardware brands by sending fake letters impersonating Trezor and Ledger, targeting cryptocurrency users. This deception aims to collect ...
Google Groups Exploited in Lumma Stealer Malware Campaign
Application Security
Google Groups Exploited in Lumma Stealer Malware Campaign
Attackers are using Google Groups to distribute Lumma Stealer malware, targeting credentials across Windows and Linux platforms. They exploit Google services, deploying trojanized "Ninja Browser" ...
Malicious JavaScript Targets Cryptocurrency Users Via Pastebin
Cybersecurity
Malicious JavaScript Targets Cryptocurrency Users Via Pastebin
Cybercriminals employ a new strategy using Pastebin to execute ClickFix-style attacks, targeting cryptocurrency users’ Bitcoin transactions. The attackers use malicious JavaScript to hijack swaps, leading ...
Social Engineering Resurfaces The ClickFix Attack Using DNS Lookups
Cybersecurity
Social Engineering Resurfaces: The ClickFix Attack Using DNS Lookups
Microsoft's research reveals a new iteration of the ClickFix tactic, exploiting DNS lookups for payload retrieval. This tactic employs the "nslookup" command in Windows to ...
Texas-Based Financial Services Provider Marquis Cites SonicWall Breach for Ransomware Incident
Application Security
Texas-Based Financial Services Provider Marquis Cites SonicWall Breach for Ransomware Incident
Marquis Software Solutions suffered a ransomware attack in August 2025, impacting multiple banks. Rolling out explanations, the company attributes this compromise to a security flaw ...
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
CVE Vulnerability Alerts
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
Following the identification of a critical vulnerability in SolarWinds Web Help Desk, CISA has instructed federal agencies to patch their systems within three days. This ...
Everest Extortion Group and Iron Mountain Data Incident Key Insights
News
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
Iron Mountain, a reputed data storage provider, has confirmed a breach by the Everest extortion group, affecting primarily marketing data. The company reassures clients of ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Microsoft Configuration Manager SQL Injection Alert
A SQL injection flaw in Microsoft Configuration Manager patched in October 2024 is currently exploited, posing a significant risk to unpatched systems, including businesses and ...
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
BeyondTrust Remote Support's CVE-2026-1731, a critical vulnerability, witnessed exploitation attempts within 24 hours of the public release of a Proof of Concept (PoC), highlighting attackers' ...
Major Breach at Dutch Mobile Network Operator Exposes Sensitive Customer Data
A significant breach at a leading Dutch mobile network operator exposed sensitive customer information, affecting around 6.2 million individuals. Names, addresses, and bank details were ...
Integration of Criminal IP with IBM QRadar: Enhancing IP Threat Intelligence
Security operations centers (SOC) can enhance their threat detection capabilities with the integration of IP-based intelligence from Criminal IP into IBM's QRadar. This integration offers ...
CISA Catalog Includes BeyondTrust Flaw Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a vulnerability in BeyondTrust RS and PRA, identified as CVE-2026-1731, to its Known Exploited ...
CANFAIL Malware Unveiled Amidst Russian Cyber Influence Allegations
A previously undocumented threat actor, possibly linked to Russian intelligence services, has been identified targeting Ukrainian defense, government, and energy sectors using CANFAIL malware, raising ...
Social Engineering Attack Compromises Fintech Company Figure’s Security
Fintech firm Figure confirmed a data breach following a social engineering attack that deceived an employee. The incident enabled hackers to gain access and steal ...
Ivanti Endpoint Manager Mobile Critical Vulnerabilities Exploited by a Single Threat Actor
Cybersecurity experts have identified a single threat actor responsible for exploiting critical vulnerabilities in Ivanti Endpoint Manager Mobile. These vulnerabilities, CVE-2026-21962 and CVE-2026-24061, are actively ...
UAT-9921 Emerges with VoidLink to Challenge Technology and Financial Entities
The newly identified threat actor UAT-9921 is utilizing VoidLink, a sophisticated modular attack framework, to compromise technology and financial sectors, according to Cisco Talos.
Dangerous Chrome Extensions Leak Personal Data and Track Users
A recent investigation revealed that over 300 Chrome extensions, collectively downloaded more than 37 million times, are involved in leaking or stealing user data. These ...
Trezor and Ledger Crypto Wallets Targeted by Mail Scam
Threat actors are exploiting trust in security hardware brands by sending fake letters impersonating Trezor and Ledger, targeting cryptocurrency users. This deception aims to collect ...
Google Groups Exploited in Lumma Stealer Malware Campaign
Attackers are using Google Groups to distribute Lumma Stealer malware, targeting credentials across Windows and Linux platforms. They exploit Google services, deploying trojanized "Ninja Browser" ...
Malicious JavaScript Targets Cryptocurrency Users Via Pastebin
Cybercriminals employ a new strategy using Pastebin to execute ClickFix-style attacks, targeting cryptocurrency users’ Bitcoin transactions. The attackers use malicious JavaScript to hijack swaps, leading ...
Social Engineering Resurfaces: The ClickFix Attack Using DNS Lookups
Microsoft's research reveals a new iteration of the ClickFix tactic, exploiting DNS lookups for payload retrieval. This tactic employs the "nslookup" command in Windows to ...
Texas-Based Financial Services Provider Marquis Cites SonicWall Breach for Ransomware Incident
Marquis Software Solutions suffered a ransomware attack in August 2025, impacting multiple banks. Rolling out explanations, the company attributes this compromise to a security flaw ...
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
Following the identification of a critical vulnerability in SolarWinds Web Help Desk, CISA has instructed federal agencies to patch their systems within three days. This ...
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
Iron Mountain, a reputed data storage provider, has confirmed a breach by the Everest extortion group, affecting primarily marketing data. The company reassures clients of ...
RADICL Secures $31 Million to Boost Development of Autonomous vSOC
RADICL raises $31 million to enhance its virtual security operations center, aiming to revolutionize cybersecurity with autonomous threat detection features.
RapidFort Secures $42 Million to Enhance Software Security Automation
RapidFort has successfully raised $42 million in funding to further automate software supply chain security. This financial boost will aid the company in boosting its ...
UK Data Protection Authority Probes X’s Grok AI for Generating Inappropriate Images
The UK's data protection authority targets X's AI assistant, Grok, in a probe following claims of generating non-consensual sexual images. This investigation highlights data privacy ...