Cyber Security
Cybersecurity
Hasbro Targeted in a Recent Cybersecurity Incident
Andrew Doyle
April 2, 2026
Toy manufacturer Hasbro investigates potential data compromise following a cyberattack.
Application Security
Google Patches Exploited Zero-Day Among 21 Chrome Vulnerabilities
Andrew Doyle
April 2, 2026
Google addresses 21 vulnerabilities, including a zero-day in Chrome's Dawn component.
Cybersecurity
FBI Cautions on Security Threats from Chinese Mobile Applications
Andrew Doyle
April 2, 2026
The FBI alerts users about data privacy issues connected to Chinese mobile applications, urging caution.
Application Security
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
Mitchell Langley
April 2, 2026
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Application Security
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
Gabby Lee
April 2, 2026
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
Cybersecurity
UK Government Allocates £630,000 for Digital Identity Card Discussion
Andrew Doyle
April 2, 2026
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Cybersecurity
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
Mitchell Langley
April 2, 2026
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
Cybersecurity
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
Mitchell Langley
April 2, 2026
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.
Cybersecurity
The “Doctor No” Problem Is Changing the Face of Enterprise Security
Gabby Lee
April 2, 2026
The controversial "Doctor No" role in security operations highlights a shift from mere obstruction to strategic decision-making.
Cybersecurity
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
Mitchell Langley
April 1, 2026
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
Cybersecurity
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
Mitchell Langley
April 1, 2026
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.
News
New Phishing Techniques Threaten TikTok Business Account Security
Andrew Doyle
April 1, 2026
Cybercriminals use phishing tactics to hijack TikTok business accounts.
Cybersecurity
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
Gabby Lee
April 1, 2026
US and UK aim to strengthen maritime defense against underwater drones.
Cybersecurity
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
Andrew Doyle
April 1, 2026
AFC Ajax confirms a significant data breach that exposed vulnerabilities in its internal systems, enabling unauthorized access.
Cybersecurity
TP-Link Routers Receive Patches for High-Severity Security Flaws
Mitchell Langley
April 1, 2026
TP-Link patches high-severity router flaws that could enable authentication bypass, arbitrary command execution, and configuration file decryption.
Cybersecurity
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Gabby Lee
April 1, 2026
Cloudflare-themed attack uses ClickFix tactics to deliver Python-based Infiniti stealer on macOS systems.
Cybersecurity
Infinity Stealer Malware Takes Aim at macOS Systems
Andrew Doyle
March 31, 2026
New malware, Infinity Stealer, targeting macOS via Python payload compiled with Nuitka.
Cybersecurity
Iranian Hackers Breach FBI Director’s Personal Email Account
Mitchell Langley
March 31, 2026
Iranian-backed hackers penetrated FBI director's email, leaked sensitive information online.
News
Russian-Affiliated Attackers Deploy DarkSword Exploit Kit Targeting iOS Devices
Gabby Lee
March 31, 2026
Russian-based TA446 group wields DarkSword to compromise iOS devices, escalating cybersecurity threats.
Cybersecurity
European Commission Responds to Cloud Infrastructure Cyberattack
Andrew Doyle
March 31, 2026
The European Commission contained a cyberattack affecting its cloud infrastructure, ensuring no internal network disruption to Europa.eu websites.
Cybersecurity
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Mitchell Langley
April 14, 2026
Cybersecurity
UK Government Seeks Public Input on Radiofrequency Jammers to Shape Upcoming Legislation
Gabby Lee
April 13, 2026
Cybersecurity
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Mitchell Langley
April 14, 2026
TOP CYBERSECURITY HEADLINES
Application Security
Booking.com Confirms Unauthorized Access Compromising User Data
Application Security
LinkedIn’s Browser Extension Draws Corporate Espionage Allegations
Application Security
OpenAI Responds to Supply Chain Attack Affecting macOS Security
This Week’s Security Spotlight
Application Security
OpenAI Responds to Supply Chain Attack Affecting macOS Security
Andrew Doyle
April 14, 2026
Cybersecurity
U.S. Cybersecurity Agencies Warn of Rising Threats From Exposed Rockwell Automation PLCs
Mitchell Langley
April 13, 2026
Cybersecurity
Android Security Update Patches Severe StrongBox and Framework Vulnerabilities
Mitchell Langley
April 8, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
VBS File Campaign Uses WhatsApp for Multi-Stage Malware Deployment
April 2, 2026
New campaign exploits WhatsApp to spread Visual Basic Script files, forming a multi-stage infection chain.
Android Malware NoVoice Found Hiding Across 50 Apps on Google Play
April 2, 2026
Android malware NoVoice was stealthily embedded in over 50 apps on Google Play.
UK Government Allocates £630,000 for Digital Identity Card Discussion
April 2, 2026
The UK government is investing £630,000 in a panel to examine digital identity card plans, aiming for diverse perspectives and trade-offs.
Hacker Charged in $55 Million Cryptocurrency Heist Involving Smart Contract Exploit
April 2, 2026
Investigators uncover how Jonathan Spalletta leveraged smart contract vulnerabilities, resulting in a major cryptocurrency theft that brought down the...
UNC1069 Linked to Axios NPM Supply Chain Attack for Financial Intrusion
April 2, 2026
Google attributes Axios npm attack to North Korean threat group UNC1069, aiming for financial theft.
The “Doctor No” Problem Is Changing the Face of Enterprise Security
April 2, 2026
The controversial "Doctor No" role in security operations highlights a shift from mere obstruction to strategic decision-making.
Open VSX Bug Allowed Malicious VS Code Extensions Into the Registry
April 1, 2026
Cybersecurity experts reveal details of an Open VSX scanning flaw that allowed malicious VS Code extensions to pass vetting and enter the registry.
OpenAI Introduces a Bug Bounty Program Targeting Safety Risks and Exploitable Issues
April 1, 2026
OpenAI initiates a bug bounty program to uncover and mitigate abuse and safety vulnerabilities.
New Phishing Techniques Threaten TikTok Business Account Security
April 1, 2026
Cybercriminals use phishing tactics to hijack TikTok business accounts.
US and UK Seek Advanced Tech to Counter Underwater Drone Threats
April 1, 2026
US and UK aim to strengthen maritime defense against underwater drones.
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
April 1, 2026
AFC Ajax confirms a significant data breach that exposed vulnerabilities in its internal systems, enabling unauthorized access.
TP-Link Routers Receive Patches for High-Severity Security Flaws
April 1, 2026
TP-Link patches high-severity router flaws that could enable authentication bypass, arbitrary command execution, and configuration file decryption.
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
April 1, 2026
Cloudflare-themed attack uses ClickFix tactics to deliver Python-based Infiniti stealer on macOS systems.
Infinity Stealer Malware Takes Aim at macOS Systems
March 31, 2026
New malware, Infinity Stealer, targeting macOS via Python payload compiled with Nuitka.
Iranian Hackers Breach FBI Director’s Personal Email Account
March 31, 2026
Iranian-backed hackers penetrated FBI director's email, leaked sensitive information online.
Russian-Affiliated Attackers Deploy DarkSword Exploit Kit Targeting iOS Devices
March 31, 2026
Russian-based TA446 group wields DarkSword to compromise iOS devices, escalating cybersecurity threats.
European Commission Responds to Cloud Infrastructure Cyberattack
March 31, 2026
The European Commission contained a cyberattack affecting its cloud infrastructure, ensuring no internal network disruption to Europa.eu websites.
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
March 31, 2026
Security flaw in Smart Slider 3 WordPress plugin risks unauthorized file access across more than 800,000 websites.
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
March 31, 2026
Apple is urging iOS and iPadOS users to update their devices immediately due to active web-based security threats.
CareCloud Responds to a Potential Data Security Breach
March 31, 2026
CareCloud investigates potential data breach in its electronic health record system, raising cybersecurity concerns.




































