Cyber Security
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
Microsoft Rolls Out Fast-Track Account Recovery for Windows Hardware Program Suspensions
Google Enhances Pixel Security with Rust-Based DNS Parser
US, UK, and Canadian Forces Execute Successful Anti-Cryptocurrency Theft Operation
Stolen Credentials and Zero Trust: Preventing Privilege Escalation in Security Breaches
Cybercriminals Use Ad Fraud With AI and SEO Tactics to Push Scareware
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Information Theft Revolutionized: No Local Decryption in This Security Threat
Booking.com Confirms Unauthorized Access Compromising User Data
LinkedIn’s Browser Extension Draws Corporate Espionage Allegations
OpenAI Responds to Supply Chain Attack Affecting macOS Security
Juniper Networks Addresses Critical Junos OS Vulnerabilities
GlassWorm Campaign Deploys New Zig Dropper to Target Developer IDEs
UK Government Seeks Public Input on Radiofrequency Jammers to Shape Upcoming Legislation
$100 Million AI Initiative Targets Hidden Vulnerabilities in Open Source Software
AI Browser Extensions Pose a Hidden Risk to Network Security
Critical Marimo Vulnerability Is Now Being Actively Exploited for Credential Theft
Cybercriminals Target Venice’s Flood Control Systems, Exposing Dangerous Gaps in Urban Security
Adobe Addresses Critical Flaw in Acrobat Reader with Emergency Updates
Emerging Threats in Malware: Recent Developments in Software Vulnerabilities
U.S. Cybersecurity Agencies Warn of Rising Threats From Exposed Rockwell Automation PLCs
CPUID Website Was Briefly Compromised to Spread Remote Access Trojan
Atomic Stealer Exploits Script Editor in a New Attack Targeting macOS Users
Chaos Malware Expands Its Reach to Cloud Deployments
Seven Vulnerabilities Patched in OpenSSL, Several Enabling DoS Attacks
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
Critical RCE Flaw in Apache ActiveMQ Classic Went Undetected for 13 Years
A $30,000 AI GPU Still Loses to Consumer Hardware in Password Cracking
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Cybersecurity
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Cisco fixes critical vulnerabilities threatening authentication, code execution, and more.
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity
Stryker Corporation Restores Operations After Cyberattack
Stryker Corporation resumes operations after a cyberattack by Handala hacktivists.
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Cybersecurity
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Explore prominent cybersecurity M&A deals announced in March 2026 by Airbus, Cellebrite, and others.
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Cybersecurity
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Anthropic confirms internal code leak of Claude Code due to human error, no sensitive data involved.
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Cybersecurity
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Microsoft has released an emergency fix for the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to widespread ...
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Application Security
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Google introduces a feature to change Gmail addresses, enhancing user email customization options in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Application Security
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Cybersecurity
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
News
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
News
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.
Depthfirst Secures $80 Million for AI Security Expansion
Cybersecurity
Depthfirst Secures $80 Million for AI Security Expansion
Depthfirst secures Series B funding to enhance AI research, train security models, and boost enterprise adoption.
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
News
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
New malware named DeepLoad threatens cybersecurity by deploying a malicious browser extension and spreading via USB drives to steal credentials.
Hasbro Targeted in a Recent Cybersecurity Incident
Cybersecurity
Hasbro Targeted in a Recent Cybersecurity Incident
Toy manufacturer Hasbro investigates potential data compromise following a cyberattack.
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Application Security
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Google addresses 21 vulnerabilities, including a zero-day in Chrome's Dawn component.
FBI Cautions on Security Threats from Chinese Mobile Applications
Cybersecurity
FBI Cautions on Security Threats from Chinese Mobile Applications
The FBI alerts users about data privacy issues connected to Chinese mobile applications, urging caution.
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Application Security
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Application Security
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
UK Government Allocates £630,000 for Digital Identity Card Discussion
Cybersecurity
UK Government Allocates £630,000 for Digital Identity Card Discussion
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Cybersecurity
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Cybersecurity
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Anthropic confirms internal code leak of Claude Code due to human error, no sensitive data involved.
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Microsoft has released an emergency fix for the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to widespread ...
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Google introduces a feature to change Gmail addresses, enhancing user email customization options in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.
Depthfirst Secures $80 Million for AI Security Expansion
Depthfirst secures Series B funding to enhance AI research, train security models, and boost enterprise adoption.
DeepLoad Malware Poses a Multifaceted Threat with Credential Theft and Extension Installation
New malware named DeepLoad threatens cybersecurity by deploying a malicious browser extension and spreading via USB drives to steal credentials.
Hasbro Targeted in a Recent Cybersecurity Incident
Toy manufacturer Hasbro investigates potential data compromise following a cyberattack.
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Google addresses 21 vulnerabilities, including a zero-day in Chrome's Dawn component.
FBI Cautions on Security Threats from Chinese Mobile Applications
The FBI alerts users about data privacy issues connected to Chinese mobile applications, urging caution.
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
UK Government Allocates £630,000 for Digital Identity Card Discussion
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.
The “Doctor No” Problem Is Changing the Face of Enterprise Security
The controversial "Doctor No" role in security operations highlights a shift from mere obstruction to strategic decision-making.
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.