Cyber Security
AFC Ajax Data Breach Exposed Systems and Allowed Intruder Control
TP-Link Routers Receive Patches for High-Severity Security Flaws
Cloudflare-Themed Scam Targets Macs With Infiniti Stealer Malware
Infinity Stealer Malware Takes Aim at macOS Systems
Iranian Hackers Breach FBI Director’s Personal Email Account
European Commission Responds to Cloud Infrastructure Cyberattack
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
CareCloud Responds to a Potential Data Security Breach
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Firefox 149 Launches with a Built-In VPN for Better Privacy
FCC Adds Consumer Routers to Covered List Amid Security Concerns
DOE Rolls Out Project Armor to Fortify Critical Energy Infrastructure
Cybercriminals Exploit Google Ads in a Deceptive Tax Document Malvertising Campaign
Dutch Ministry of Finance Hit by Cyberattack as Data Breach Investigation Continues
Open Source Projects Face a Rising Tide of Malware Infections
Major Announcements from RSAC 2026: What Day 1 Revealed
QualDerm Partners Data Breach Hits Over 3.1 Million People
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Gartner Publishes Its First Market Guide for Guardian Agents
Software Supply Chains Are the New Frontline for Cyber Risk
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
Ericsson Inc. Faces Data Breach Through a Third-Party Service Provider
Cybersecurity
Ericsson Inc. Faces Data Breach Through a Third-Party Service Provider
Ericsson Inc. reports data theft affecting employees and customers due to a service provider breach.
Malicious npm Package Disguises as OpenClaw Installer for Data Theft
Application Security
Malicious npm Package Disguises as OpenClaw Installer for Data Theft
New npm threat involves package posing as OpenClaw installer deploying RAT to steal sensitive data.
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant's Own Tool
Application Security
ShinyHunters Breaches Salesforce and 100 Companies Using Mandiant’s Own Tool
ShinyHunters claims responsibility for a high-profile data breach affecting Salesforce and other major companies, utilizing an open-source tool develo...
Salesforce's Experience Cloud Platform Faces Vulnerability Challenges
Application Security
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
Salesforce's Experience Cloud under scrutiny as vulnerabilities expose extensive data risks.
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
News
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
Russian hackers are targeting Signal and WhatsApp accounts of officials globally, posing cyber risks.
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
Cybersecurity
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
North Korean state-sponsored threat actors are suspected of a 2025 cryptocurrency cloud heist.
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Cybersecurity
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Microsoft is still working to resolve a bright white flash issue in Windows 11's File Explorer that continues to affect users on certain systems.
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
News
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
Dutch police give 100 alleged scammers two weeks to surrender, or their images could be displayed nationwide.
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
Cybersecurity
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
New ClickFix technique utilizes Windows Terminal instead of the Run dialog to bypass security measures.
Perplexity's Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Application Security
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
A vulnerability in Perplexity's Comet browser exposed local files to potential theft via calendar events.
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Cybersecurity
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Cybersecurity
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
Cybersecurity
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
Application Security
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
CVE Vulnerability Alerts
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
US Government Contractor's Son Charged with Cryptocurrency Theft from US Marshals Service
Cybersecurity
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
News
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Cybersecurity
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta's Smart Glasses Face Privacy Investigation in Britain
Cybersecurity
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
Cybersecurity
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Salesforce’s Experience Cloud Platform Faces Vulnerability Challenges
Salesforce's Experience Cloud under scrutiny as vulnerabilities expose extensive data risks.
Russian Threat Actors Targeting Signal and WhatsApp Accounts of Officials
Russian hackers are targeting Signal and WhatsApp accounts of officials globally, posing cyber risks.
North Korean Group UNC4899 Suspected Behind Cryptocurrency Cloud Heist in 2025
North Korean state-sponsored threat actors are suspected of a 2025 cryptocurrency cloud heist.
Microsoft Still Working to Fix Bright White Flash Issue in Windows 11 File Explorer
Microsoft is still working to resolve a bright white flash issue in Windows 11's File Explorer that continues to affect users on certain systems.
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
Dutch police give 100 alleged scammers two weeks to surrender, or their images could be displayed nationwide.
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
New ClickFix technique utilizes Windows Terminal instead of the Run dialog to bypass security measures.
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
A vulnerability in Perplexity's Comet browser exposed local files to potential theft via calendar events.
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...