Cyber Security
Severe Command Injection Flaw Discovered in SGLang
Serial-to-IP Converter Flaws in Lantronix and Silex Products Put Critical Systems at Risk
Scottish Man Pleads Guilty in $8 Million Cryptocurrency Heist
Cyberattacks Are Outpacing MSP and Corporate Defenses
Huntress Identifies Active Exploitation of Microsoft Defender Vulnerabilities
Lawmakers’ Concerns About AI Include Worries of Potential ‘Destruction’
Microsoft Edge Update Introduces Bug Affecting Microsoft Teams Chats
Attackers Exploit Three Zero-Day Flaws in Microsoft Defender to Gain Elevated Access
Vercel Suffers Security Breach as Threat Actors Attempt to Sell Stolen Data
AI Security Challenges: Vendors’ Dual Messaging Raises Questions
NIST Alters Approach to Vulnerability Assessments, Ceasing Severity Scores for Lower-Priority Issues
Hackers Target Trucking and Logistics Firms in Organized Crime-Linked Cyber Campaign
Critical Nginx-UI Vulnerability Lets Attackers Seize Full Server Control
Digitally Signed Adware Disables Antivirus Across Multiple Sectors
Cybercriminals Are Weaponizing n8n to Launch Phishing Attacks
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
ChipSoft's Website Goes Offline After Ransomware Attack While Email Stays Operational
Cybersecurity
ChipSoft’s Website Goes Offline After Ransomware Attack While Email Stays Operational
ChipSoft's website is down following a ransomware attack, though email communication remains functional.
Telehealth Company Hims & Hers Health Discloses Data Breach Involving Support Tickets
Cybersecurity
Telehealth Company Hims & Hers Health Discloses Data Breach Involving Support Tickets
Hims & Hers Health reports a data breach linked to a third-party customer service platform, impacting support tickets.
Data Theft Incidents Escalate as SaaS Integration Provider Suffers Major Breach
Cybersecurity
Data Theft Incidents Escalate as SaaS Integration Provider Suffers Major Breach
Authentication tokens were stolen during a breach, impacting numerous companies.
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
Cybersecurity
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
Discover how CrystalX RAT combines surveillance, data theft, and remote access capabilities in a sophisticated Malware-as-a-Service operation uncovere...
Chinese Threat Actors Exploit TrueConf Zero-Day to Breach Asian Governments
News
Chinese Threat Actors Exploit TrueConf Zero-Day to Breach Asian Governments
Chinese threat actors used TrueConf zero-day vulnerability to breach Asian government networks for reconnaissance and payload execution.
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
CVE Vulnerability Alerts
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
A new Docker Engine vulnerability allows attackers to bypass authorization plug-ins due to an incomplete fix.
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Cybersecurity
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Iranian hackers exploit U.S. critical infrastructure networks by targeting internet-exposed Rockwell/Allen-Bradley PLCs.
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Cybersecurity
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Russia-linked APT28 is harnessing vulnerable routers in a massive espionage campaign.
Anthropic's Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Cybersecurity
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Anthropic's new AI model, Claude Mythos, could protect critical software or potentially enhance cyberattacks.
Trent AI Emerges From Stealth With $13 Million in Funding
Cybersecurity
Trent AI Emerges From Stealth With $13 Million in Funding
Startup Trent AI unveils a comprehensive security framework to safeguard artificial intelligence (AI) agents, backed by significant funding.
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Cybersecurity
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Google's recent Android update fixes critical vulnerabilities in the operating system, including a severe StrongBox flaw and a DoS vulnerability in th...
Automated Pentesting Tools Fall Short Past the PoC Cliff
Cybersecurity
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Exploring the plateau in automated pentesting tools and the PoC cliff effect on security validation.
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
Cybersecurity
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
A critical vulnerability in Flowise lets attackers execute arbitrary code using improperly validated JavaScript.
Exchange Online Mailbox Access Issues Impact Outlook Users
Application Security
Exchange Online Mailbox Access Issues Impact Outlook Users
Exchange Online access issues have affected Outlook mobile and macOS users. Microsoft is actively working on a resolution.
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
Application Security
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
The expansion of Shadow AI within daily apps and outdated mobile devices increases exposure to unseen mobile vulnerabilities.
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Cybersecurity
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Organizations face growing cybersecurity risks from trusted vendors, SaaS tools, and subcontractors that bypass traditional security measures.
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Application Security
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Analysis reveals critical ShareFile flaws allowing server access and arbitrary file uploads.
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Application Security
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Researchers found 36 harmful npm packages posing as Strapi CMS plugins to exploit Redis, PostgreSQL, and execute further cyber attacks.
Bogus Traffic Violation Text Scam Targeting Americans
News
Bogus Traffic Violation Text Scam Targeting Americans
Fraudulent "Notice of Default" text scams impersonate U.S. state courts, leading victims to phishing sites.
Qilin Ransomware Group Targets German Political Party Die Linke
News
Qilin Ransomware Group Targets German Political Party Die Linke
Qilin ransomware group claims responsibility for a cyberattack on German political party Die Linke.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
CrystalX RAT Emerges as a Sophisticated Malware-as-a-Service Threat
Discover how CrystalX RAT combines surveillance, data theft, and remote access capabilities in a sophisticated Malware-as-a-Service operation uncovere...
Chinese Threat Actors Exploit TrueConf Zero-Day to Breach Asian Governments
Chinese threat actors used TrueConf zero-day vulnerability to breach Asian government networks for reconnaissance and payload execution.
Docker Engine Vulnerability CVE-2026-34040 Allows Attackers to Bypass Authorization
A new Docker Engine vulnerability allows attackers to bypass authorization plug-ins due to an incomplete fix.
Iranian Hackers Target U.S. Critical Infrastructure via Rockwell PLCs
Iranian hackers exploit U.S. critical infrastructure networks by targeting internet-exposed Rockwell/Allen-Bradley PLCs.
Russia-linked APT28 Exploits Routers in Wide-ranging Espionage Campaign
Russia-linked APT28 is harnessing vulnerable routers in a massive espionage campaign.
Anthropic’s Claude Mythos Could Protect Critical Software — or Power the Next Wave of Cyberattacks
Anthropic's new AI model, Claude Mythos, could protect critical software or potentially enhance cyberattacks.
Trent AI Emerges From Stealth With $13 Million in Funding
Startup Trent AI unveils a comprehensive security framework to safeguard artificial intelligence (AI) agents, backed by significant funding.
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Google's recent Android update fixes critical vulnerabilities in the operating system, including a severe StrongBox flaw and a DoS vulnerability in th...
Automated Pentesting Tools Fall Short Past the “PoC Cliff”
Exploring the plateau in automated pentesting tools and the PoC cliff effect on security validation.
Critical Flowise Vulnerability Puts Systems at Risk of Code Execution
A critical vulnerability in Flowise lets attackers execute arbitrary code using improperly validated JavaScript.
Exchange Online Mailbox Access Issues Impact Outlook Users
Exchange Online access issues have affected Outlook mobile and macOS users. Microsoft is actively working on a resolution.
Shadow AI and Zero-Click Exploits Are Reshaping Mobile Security Threats
The expansion of Shadow AI within daily apps and outdated mobile devices increases exposure to unseen mobile vulnerabilities.
Third-Party Vendors Are the New Breach Vector Organizations Should Fear
Organizations face growing cybersecurity risks from trusted vendors, SaaS tools, and subcontractors that bypass traditional security measures.
Critical ShareFile Flaws Open the Door to Unauthenticated RCE
Analysis reveals critical ShareFile flaws allowing server access and arbitrary file uploads.
Strapi CMS Plugins Face Exploitation by Malicious npm Packages
Researchers found 36 harmful npm packages posing as Strapi CMS plugins to exploit Redis, PostgreSQL, and execute further cyber attacks.
Bogus Traffic Violation Text Scam Targeting Americans
Fraudulent "Notice of Default" text scams impersonate U.S. state courts, leading victims to phishing sites.
Qilin Ransomware Group Targets German Political Party Die Linke
Qilin ransomware group claims responsibility for a cyberattack on German political party Die Linke.
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Detailed analysis of a .cmd malware found in an email, escalating privileges and bypassing antivirus.
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
Fortinet issues emergency patches for a critical vulnerability (CVE-2026-35616) in FortiClient EMS, already exploited in the wild.
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
A North Korean orchestrated cyber attack stole $285 million from Drift, a Solana-based exchange, on April 1, 2026.