Cyber Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Endesa Cyberattack Results in Customer Data Exposure
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
Meta Addresses Security Vulnerability in Instagram Password Resets
AI and Security: Block’s CISO Discusses AI Agents’ Potential
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Target’s Source Code Allegedly Exposed in Cyber Breach
Drones Are Now Critical Infrastructure—and Their Networks are the New Attack Surface
California Privacy Protection Agency Takes Action Against Datamasters for Unauthorized Data Sales
Instagram Data Breach Affects 17.5 Million Users: Security Implications Explored
U.S. Immigration and Customs Enforcement’s Surveillance Tactics Scrutinized
UK Government Faces Rising Cybersecurity Concerns Amid Legal Aid and Foreign Office Attacks
Ireland Recalls Thousands of Passports Due to Software-Induced Printing Defect
BreachForums Re-emerges Only to Fall Victim to Data Breach
Anthropic Responds to Viral Allegations of Account Bans
CISA Streamlines Security Measures With Vulnerability Catalog Adoption
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Email Security’s True Challenge: Evaluating Post-access Threats
APT28 Intensifies Credential Harvesting on Nuclear and Energy Sectors
NSA Announces Tim Kosiba as New Deputy Director
Threat Actors Target Vulnerable Proxy Servers in the Hunt for LLM Services
Illinois Department’s Database Error Leads to Massive Data Exposure
Trend Micro Addresses Vulnerabilities in Apex Central, Mitigates Security Risks
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Vibe Hacking: How AI is Transforming Cybercrime’s Landscape
Logitech’s macOS Applications Disrupted by Expired Code-Signing Certificate
Ni8mare Vulnerability Threatens N8N Workflow Automation Platform
OwnCloud Urges Users to Implement Multi-factor Authentication for Enhanced Security
Navigating the Challenges of Fileless Malware in Cybersecurity
Microsoft Acknowledges Issues With Outlook Encryption Feature
IBM Discloses Critical Security Vulnerability in API Connect
CVE Vulnerability Alerts
IBM Discloses Critical Security Vulnerability in API Connect
IBM has identified a critical vulnerability in its API Connect software, CVE-2025-13915, which allows attackers to bypass authentication and gain remote access. With a CVSS ...
European Space Agency Confirms Breach Impacting Servers with Unclassified Engineering Data
Endpoint Security
European Space Agency Confirms Breach Impacting Servers with Unclassified Engineering Data
The European Space Agency disclosed a breach affecting external servers. These systems held unclassified engineering project data, raising concerns about data security in isolated networks.
BlackCat Ransomware Campaign Culminates in Guilty Pleas from Ex-Employees
News
BlackCat Ransomware Campaign Culminates in Guilty Pleas from Ex-Employees
Ex-Sygnia and DigitalMint employees confessed to deploying BlackCat ransomware against U.S. companies in 2023, using their insider knowledge for malicious aims.
'Zoom Stealer' Puts Millions at Risk via Web Extensions on Major Browsers
Application Security
‘Zoom Stealer’ Puts Millions at Risk via Web Extensions on Major Browsers
Over 2.2 million Chrome, Firefox, and Edge users are compromised by 'Zoom Stealer', a campaign targeting online meeting data via malicious extensions.
Critical Vulnerability in SmarterTools SmarterMail Poses Severe Cybersecurity Risk
Application Security
Critical Vulnerability in SmarterTools SmarterMail Poses Severe Cybersecurity Risk
The Cyber Security Agency of Singapore warns of a dangerous remote code execution vulnerability in SmarterTools SmarterMail, CVE-2025-52691, with a CVSS score of 10.0.
CISA Orders Federal Agencies to Patch Critical MongoDB Vulnerability Called MongoBleed
Application Security
CISA Orders Federal Agencies to Patch Critical MongoDB Vulnerability Called MongoBleed
A vulnerability in MongoDB, known as MongoBleed, is actively exploited, prompting CISA to direct U.S. federal agencies to patch this critical flaw. This vulnerability could ...
Silver Fox Exploits Tax Lures in India to Spread ValleyRAT
News
Silver Fox Exploits Tax Lures in India to Spread ValleyRAT
Silver Fox targets India, using tax-themed phishing to spread ValleyRAT, including DLL hijacking in attacks.
A Record Year Cybersecurity Acquisitions in 2025 Surpass $84 Billion
Cybersecurity
A Record Year: Cybersecurity Acquisitions in 2025 Surpass $84 Billion
A remarkable year in cybersecurity M&A, 2025 saw total disclosed deals exceeding $84 billion. Eight significant acquisitions surpassed the $1 billion mark, representing a notable ...
How Artificial Intelligence is Being Integrated into Security Operations
Cybersecurity
How Artificial Intelligence is Being Integrated into Security Operations
As AI becomes a fixture in Security Operations Centers (SOCs), aligning its role with operational processes remains a challenge, affecting its effective deployment and value ...
Mustang Panda’s Novel Kernel-Mode Rootkit Used in Mid-2025 Cyber Attack Analysis
Application Security
Mustang Panda’s Novel Kernel-Mode Rootkit Used in Mid-2025 Cyber Attack Analysis
Mustang Panda leverages a kernel-mode rootkit and a new TONESHELL backdoor variant in a mid-2025 cyber attack on an Asian entity, as reported by Kaspersky.
Coupang to Distribute $1.17 Billion in Vouchers Following Data Breach
Cybersecurity
Coupang to Distribute $1.17 Billion in Vouchers Following Data Breach
Coupang addresses a data breach affecting 33.7 million users by issuing $1.17 billion in vouchers, aiming to restore trust and mitigate the breach impacts.
Renewed Exploitation of FortiOS Two-Factor Authentication Bypass
CVE Vulnerability Alerts
Renewed Exploitation of FortiOS Two-Factor Authentication Bypass
Fortinet has flagged a resurgence in the exploitation of CVE-2020-12812, a vulnerability in FortiOS that allows attackers to bypass two-factor authentication. This poses significant risks ...
Lovely Extortion Group Claims Massive Data Breach at Conde Nast
News
Lovely Extortion Group Claims Massive Data Breach at Conde Nast
The extortion threat to Conde Nast by the criminal group, Lovely, emphasizes the vulnerability of major publishers to cyberattacks. Lovely claims to have unauthorized access ...
Ransomware Attack Disrupts Operations at Romania's Oltenia Energy Complex During Christmas
Cybersecurity
Ransomware Attack Disrupts Operations at Romania’s Oltenia Energy Complex During Christmas
Oltenia Energy Complex, Romania's primary coal-based energy producer, faced a ransomware attack on the second day of Christmas, severely impacting its IT infrastructure and highlighting ...
OWASP’s Agentic AI Top 10 Highlights Emerging Security Threats
Cybersecurity
OWASP’s Agentic AI Top 10 Highlights Emerging Security Threats
OWASP introduces vulnerabilities impacting AI systems, emphasizing agent tool attacks. Koi Security's assessments illustrate real incidents linked to this list.
Korean Air Data Breach Exposes Thousands of Employee Records via KC&D Hack
Data Security
Korean Air Data Breach Exposes Thousands of Employee Records via KC&D Hack
Korean Air encountered a significant data security breach affecting thousands of employees following an attack on its supplier, Korean Air Catering & Duty-Free, leading to ...
Why Cybersecurity Is Critical to Vendor Risk Management
Blog
Why Cybersecurity is Critical to Vendor Risk Management
As organizations rely more on third-party vendors, cybersecurity has become central to vendor risk management. Understanding evolving supply-chain threats, assessing vendor security posture, and implementing ...
Sax Accounting Firm's Year-long Investigation Exposes Data Breach Affecting 220,000
Information Security
Sax Accounting Firm’s Year-long Investigation Exposes Data Breach Affecting 220,000
Sax, a major US accounting firm, has disclosed a data breach affecting over 220,000 clients, revealing vulnerabilities in their data security systems after a protracted ...
Arrest Linked to KMSAuto Malware Campaign That Hit 2.8 Million Systems
Cybersecurity
Arrest Linked to KMSAuto Malware Campaign That Hit 2.8 Million Systems
Authorities arrest a Lithuanian individual suspected of deploying clipboard-stealer malware through KMSAuto, impacting 2.8 million computers. The tool, camouflaged as a utility for unauthorized Windows ...
Trust Wallet Compromise Results in $7 Million Loss from Crypto Accounts
Data Security
Trust Wallet Compromise Results in $7 Million Loss from Crypto Accounts
Trust Wallet users suffer a $7M loss after a targeted attack on the browser extension impacts 3,000 crypto addresses just before Christmas.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Telegram's Proxy Link Vulnerability Exposes IP Addresses
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Application Security
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
BreachForums Re-emerges Only to Fall Victim to Data Breach
Application Security
BreachForums Re-emerges Only to Fall Victim to Data Breach
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Application Security
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
‘Zoom Stealer’ Puts Millions at Risk via Web Extensions on Major Browsers
Over 2.2 million Chrome, Firefox, and Edge users are compromised by 'Zoom Stealer', a campaign targeting online meeting data via malicious extensions.
Critical Vulnerability in SmarterTools SmarterMail Poses Severe Cybersecurity Risk
The Cyber Security Agency of Singapore warns of a dangerous remote code execution vulnerability in SmarterTools SmarterMail, CVE-2025-52691, with a CVSS score of 10.0.
CISA Orders Federal Agencies to Patch Critical MongoDB Vulnerability Called MongoBleed
A vulnerability in MongoDB, known as MongoBleed, is actively exploited, prompting CISA to direct U.S. federal agencies to patch this critical flaw. This vulnerability could ...
Silver Fox Exploits Tax Lures in India to Spread ValleyRAT
Silver Fox targets India, using tax-themed phishing to spread ValleyRAT, including DLL hijacking in attacks.
A Record Year: Cybersecurity Acquisitions in 2025 Surpass $84 Billion
A remarkable year in cybersecurity M&A, 2025 saw total disclosed deals exceeding $84 billion. Eight significant acquisitions surpassed the $1 billion mark, representing a notable ...
How Artificial Intelligence is Being Integrated into Security Operations
As AI becomes a fixture in Security Operations Centers (SOCs), aligning its role with operational processes remains a challenge, affecting its effective deployment and value ...
Mustang Panda’s Novel Kernel-Mode Rootkit Used in Mid-2025 Cyber Attack Analysis
Mustang Panda leverages a kernel-mode rootkit and a new TONESHELL backdoor variant in a mid-2025 cyber attack on an Asian entity, as reported by Kaspersky.
Coupang to Distribute $1.17 Billion in Vouchers Following Data Breach
Coupang addresses a data breach affecting 33.7 million users by issuing $1.17 billion in vouchers, aiming to restore trust and mitigate the breach impacts.
Renewed Exploitation of FortiOS Two-Factor Authentication Bypass
Fortinet has flagged a resurgence in the exploitation of CVE-2020-12812, a vulnerability in FortiOS that allows attackers to bypass two-factor authentication. This poses significant risks ...
Lovely Extortion Group Claims Massive Data Breach at Conde Nast
The extortion threat to Conde Nast by the criminal group, Lovely, emphasizes the vulnerability of major publishers to cyberattacks. Lovely claims to have unauthorized access ...
Ransomware Attack Disrupts Operations at Romania’s Oltenia Energy Complex During Christmas
Oltenia Energy Complex, Romania's primary coal-based energy producer, faced a ransomware attack on the second day of Christmas, severely impacting its IT infrastructure and highlighting ...
OWASP’s Agentic AI Top 10 Highlights Emerging Security Threats
OWASP introduces vulnerabilities impacting AI systems, emphasizing agent tool attacks. Koi Security's assessments illustrate real incidents linked to this list.
Korean Air Data Breach Exposes Thousands of Employee Records via KC&D Hack
Korean Air encountered a significant data security breach affecting thousands of employees following an attack on its supplier, Korean Air Catering & Duty-Free, leading to ...
Why Cybersecurity is Critical to Vendor Risk Management
As organizations rely more on third-party vendors, cybersecurity has become central to vendor risk management. Understanding evolving supply-chain threats, assessing vendor security posture, and implementing ...
Sax Accounting Firm’s Year-long Investigation Exposes Data Breach Affecting 220,000
Sax, a major US accounting firm, has disclosed a data breach affecting over 220,000 clients, revealing vulnerabilities in their data security systems after a protracted ...
Arrest Linked to KMSAuto Malware Campaign That Hit 2.8 Million Systems
Authorities arrest a Lithuanian individual suspected of deploying clipboard-stealer malware through KMSAuto, impacting 2.8 million computers. The tool, camouflaged as a utility for unauthorized Windows ...
Trust Wallet Compromise Results in $7 Million Loss from Crypto Accounts
Trust Wallet users suffer a $7M loss after a targeted attack on the browser extension impacts 3,000 crypto addresses just before Christmas.
Ex-Coinbase Support Agent in India Arrested for Involvement in Data Theft
A former Coinbase agent in India was detained for aiding hackers to infiltrate company databases, allowing unlawful access to sensitive client data.
Spotify Disables User Accounts to Combat Massive Data Scraping
Spotify took action against data scraping by deactivating accounts after Anna’s Archive released data on 86 million songs from its platform.
Ubisoft’s Rainbow Six Siege Breach Enables Hackers to Exploit Internal Systems
Rainbow Six Siege faces a security breach allowing hackers to manipulate in-game systems, impacting player bans and economic balance, compromising integrity.