Cyber Security
Cybersecurity
Chrome’s Gemini Live Feature Left Users Exposed to Malicious Extensions
Mitchell Langley
March 3, 2026
A Chrome vulnerability allowed malicious extensions to exploit Gemini Live, potentially hijacking the AI assistant to spy on users and steal their fil...
Cybersecurity
Google Chrome Moves to Strengthen HTTPS Certificates Against Quantum Threats
Gabby Lee
March 3, 2026
Google Chrome rolls out an experimental program to improve HTTPS certificate security against future quantum threats.
Cybersecurity
Florida Woman Gets 22 Months in Prison for Trafficking Stolen Microsoft COA Labels
Mitchell Langley
March 3, 2026
Florida resident sentenced to 22 months in prison for trafficking thousands of stolen Microsoft COA labels over several years.
Cybersecurity
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
Andrew Doyle
March 3, 2026
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
Cybersecurity
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
Gabby Lee
March 3, 2026
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Cybersecurity
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
Mitchell Langley
March 3, 2026
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
Cybersecurity
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
Gabby Lee
March 3, 2026
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Cybersecurity
Madison Square Garden Cyber Incident Revealed Months Later
Gabby Lee
March 3, 2026
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.
Cybersecurity
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
Andrew Doyle
March 2, 2026
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.
Cybersecurity
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
Gabby Lee
March 2, 2026
Hackers used Claude Code to infiltrate Mexican government systems, exfiltrating 150GB of sensitive data using AI-assisted exploits and automated theft...
Cybersecurity
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
Mitchell Langley
March 2, 2026
ShinyHunters group exposes a significant data breach at Odido, shaking the Dutch telecommunications sector.
Blog
How Safety Technology Is Transforming Workplace Protection
Gabby Lee
March 1, 2026
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive ...
Cybersecurity
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
Mitchell Langley
February 25, 2026
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
Cybersecurity
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
Gabby Lee
February 25, 2026
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
Cybersecurity
ShinyHunters Leak Exposes Millions of CarGurus User Records
Gabby Lee
February 25, 2026
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
Cybersecurity
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
Mitchell Langley
February 25, 2026
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
Cybersecurity
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
Andrew Doyle
February 25, 2026
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.
News
Lazarus Group Expands Its Ransomware Arsenal with Medusa
Andrew Doyle
February 25, 2026
North Korea's Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.
News
Optimizely Suffers a Data Breach Through a Voice Phishing Attack
Andrew Doyle
February 25, 2026
Optimizely has reported a data breach caused by a voice phishing attack, compromising customer data.
Application Security
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
Gabby Lee
February 25, 2026
New cryptojacking campaign uses pirated software to deliver XMRig miner payloads onto hosts.
Cybersecurity
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Gabby Lee
March 18, 2026
Cybersecurity
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
Andrew Doyle
March 18, 2026
News
LeakNet Ransomware Adopts ClickFix to Trick Users Into Compromising Themselves
Andrew Doyle
March 18, 2026
Cybersecurity
RondoDox Botnet Ramps Up Attacks, Hitting 15,000 Daily Exploitation Attempts
Mitchell Langley
March 18, 2026
TOP CYBERSECURITY HEADLINES
This Week’s Security Spotlight
Cybersecurity
Canadian Outsourcing Leader Telus Digital Faces a Severe Data Breach
Andrew Doyle
March 13, 2026
Cybersecurity
Senate Confirms Joshua Rudd to Lead the NSA and US Cyber Command
Andrew Doyle
March 12, 2026
CVE Vulnerability Alerts
Critical Security Vulnerabilities Patched in n8n Workflow Automation Platform
Mitchell Langley
March 12, 2026
Cybersecurity
OpenClaw Security Issues Persist as SecureClaw Open Source Tool Debuts
Andrew Doyle
February 19, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Deepfake and Injection Attacks Are Targeting Identity Verification Systems
March 3, 2026
Understand how deepfake and injection attacks affect identity verification processes and what enterprises can do to defend against them.
Russian APT28 Allegedly Exploited MSHTML Vulnerability Before Microsoft Patch
March 3, 2026
Russia-linked APT28 may have exploited MSHTML zero-day CVE-2026-21513, a high-severity flaw, before Microsoft issued a fix.
Criminals Exploit Dubai Crisis With Elaborate Fake Police Scheme
March 3, 2026
Scammers impersonate police in Dubai, exploiting a crisis to access bank accounts.
OpenClaw Vulnerability Allowed Websites to Hijack AI Agents
March 3, 2026
Malicious websites exploited a WebSocket flaw to hijack AI agents via OpenClaw.
Madison Square Garden Cyber Incident Revealed Months Later
March 3, 2026
Madison Square Garden disclosed a data breach months after being targeted in a hacking campaign.
Samsung Reaches Settlement with Texas Over Smart TV Data Collection
March 2, 2026
Samsung resolves allegations of unauthorized data collection via smart TVs with Texas settlement.
Hackers Used Claude Code to Steal 150GB of Mexican Government Data
March 2, 2026
Hackers used Claude Code to infiltrate Mexican government systems, exfiltrating 150GB of sensitive data using AI-assisted exploits and automated theft...
Netherlands Faces Its Biggest Data Breach as ShinyHunters Leaks Odido’s Full Customer Database
March 2, 2026
ShinyHunters group exposes a significant data breach at Odido, shaking the Dutch telecommunications sector.
How Safety Technology Is Transforming Workplace Protection
March 1, 2026
Companies are placing a greater emphasis on protecting their workforce. This shift from a reactive safety culture to a proactive one is creating new demand ...
‘Sandworm_Mode’ Supply Chain Attack Hits the NPM Ecosystem
February 25, 2026
Analysis of the Sandworm_Mode supply chain attack impacting NPM.
ICO Fines Reddit £14.47 Million for Failing to Protect Children’s Data
February 25, 2026
The ICO has fined Reddit for collecting data on children under 13 without adequate safety measures in place.
Broadcom Releases Patches for VMware Aria Operations Vulnerabilities
February 25, 2026
Broadcom addresses critical VMware Aria Operations vulnerabilities; users urged to update.
RoguePilot Vulnerability in GitHub Codespaces Has Been Patched by Microsoft
February 25, 2026
A vulnerability called RoguePilot in GitHub Codespaces risked repository control.
ShinyHunters Leak Exposes Millions of CarGurus User Records
February 25, 2026
ShinyHunters have exposed over 12 million records reportedly taken from CarGurus, an automotive digital platform.
Lazarus Group Expands Its Ransomware Arsenal with Medusa
February 25, 2026
North Korea's Lazarus Group deploys Medusa ransomware against critical sectors, targeting US healthcare.
Optimizely Suffers a Data Breach Through a Voice Phishing Attack
February 25, 2026
Optimizely has reported a data breach caused by a voice phishing attack, compromising customer data.
Cryptojacking Campaign Exploits Pirated Software to Deploy XMRig Miner
February 25, 2026
New cryptojacking campaign uses pirated software to deliver XMRig miner payloads onto hosts.
Arkanix Stealer Malware Quickly Vanishes After Its Initial Launch
February 25, 2026
The newly launched Arkanix Stealer malware vanished shortly after targeting sensitive system and browser data.
Microsoft Investigates Vanishing Mouse Pointer Bug in Classic Outlook
February 25, 2026
Microsoft investigates an issue causing Outlook's mouse pointer to disappear for some users.
GitHub’s Dependabot is Under Fire for Alert Accuracy Issues
February 25, 2026
A Go library maintainer questions the effectiveness of GitHub's Dependabot due to alert fatigue from inaccurate dependency-scanning alerts.






































