Cyber Security
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
Microsoft Rolls Out Fast-Track Account Recovery for Windows Hardware Program Suspensions
Google Enhances Pixel Security with Rust-Based DNS Parser
US, UK, and Canadian Forces Execute Successful Anti-Cryptocurrency Theft Operation
Stolen Credentials and Zero Trust: Preventing Privilege Escalation in Security Breaches
Cybercriminals Use Ad Fraud With AI and SEO Tactics to Push Scareware
JanelaRAT: Continuing Threat to Latin American Financial Institutions
Information Theft Revolutionized: No Local Decryption in This Security Threat
Booking.com Confirms Unauthorized Access Compromising User Data
LinkedIn’s Browser Extension Draws Corporate Espionage Allegations
OpenAI Responds to Supply Chain Attack Affecting macOS Security
Juniper Networks Addresses Critical Junos OS Vulnerabilities
GlassWorm Campaign Deploys New Zig Dropper to Target Developer IDEs
UK Government Seeks Public Input on Radiofrequency Jammers to Shape Upcoming Legislation
$100 Million AI Initiative Targets Hidden Vulnerabilities in Open Source Software
AI Browser Extensions Pose a Hidden Risk to Network Security
Bogus Traffic Violation Text Scam Targeting Americans
News
Bogus Traffic Violation Text Scam Targeting Americans
Fraudulent "Notice of Default" text scams impersonate U.S. state courts, leading victims to phishing sites.
Qilin Ransomware Group Targets German Political Party Die Linke
News
Qilin Ransomware Group Targets German Political Party Die Linke
Qilin ransomware group claims responsibility for a cyberattack on German political party Die Linke.
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Cybersecurity
Analysis Reveals .cmd Malware Escalating Privileges and Bypassing Antivirus
Detailed analysis of a .cmd malware found in an email, escalating privileges and bypassing antivirus.
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
CVE Vulnerability Alerts
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
Fortinet issues emergency patches for a critical vulnerability (CVE-2026-35616) in FortiClient EMS, already exploited in the wild.
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
Cybersecurity
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
A North Korean orchestrated cyber attack stole $285 million from Drift, a Solana-based exchange, on April 1, 2026.
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
Application Security
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
The popular Axios HTTP client faced a social engineering attack attributed to North Korean actors, exposing serious security risks within open-source ...
Free Android VPNs Are Quietly Working Against You
Cybersecurity
Free Android VPNs Are Quietly Working Against You
Free VPNs on Android promise protection, but often jeopardize user privacy with tracking, permissions, and risky servers.
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Cybersecurity
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Residential proxies confuse IP reputation systems, obscuring differences between malicious traffic and legitimate users.
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Cybersecurity
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Drift Protocol faces a substantial breach, leading to administrative control loss and financial damages exceeding $280 million.
Apple Rolls Out DarkSword Exploit Protection to More Devices
Cybersecurity
Apple Rolls Out DarkSword Exploit Protection to More Devices
Apple enhances its defenses against the DarkSword exploit kit, a threat linked to state-sponsored hackers and commercial spyware vendors.
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Application Security
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Claude Code faces a critical vulnerability discovered by Adversa AI just days after its source code was unintentionally leaked by Anthropic.
Cybercriminals Exploit Empty Properties for Postal Fraud
Cybersecurity
Cybercriminals Exploit Empty Properties for Postal Fraud
Threat actors use vacant homes to snatch mail and perpetrate fraud using Flare's findings.
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Cybersecurity
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Cisco fixes critical vulnerabilities threatening authentication, code execution, and more.
Stryker Corporation Restores Operations After Cyberattack
Cybersecurity
Stryker Corporation Restores Operations After Cyberattack
Stryker Corporation resumes operations after a cyberattack by Handala hacktivists.
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Cybersecurity
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Explore prominent cybersecurity M&A deals announced in March 2026 by Airbus, Cellebrite, and others.
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Cybersecurity
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Anthropic confirms internal code leak of Claude Code due to human error, no sensitive data involved.
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Cybersecurity
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Microsoft has released an emergency fix for the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to widespread ...
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Application Security
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Google introduces a feature to change Gmail addresses, enhancing user email customization options in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Application Security
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Cybersecurity
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Fortinet Acts Quickly on Zero-Day Vulnerability Impacting FortiClient EMS Users
Fortinet issues emergency patches for a critical vulnerability (CVE-2026-35616) in FortiClient EMS, already exploited in the wild.
North Korean Cyber Operatives Drain $285 Million from Drift Exchange
A North Korean orchestrated cyber attack stole $285 million from Drift, a Solana-based exchange, on April 1, 2026.
Axios HTTP Client Developer Targeted in North Korean Social Engineering Campaign
The popular Axios HTTP client faced a social engineering attack attributed to North Korean actors, exposing serious security risks within open-source ...
Free Android VPNs Are Quietly Working Against You
Free VPNs on Android promise protection, but often jeopardize user privacy with tracking, permissions, and risky servers.
Residential Proxies Are Breaking IP Reputation Systems for Malware Traffic
Residential proxies confuse IP reputation systems, obscuring differences between malicious traffic and legitimate users.
Apple Rolls Out DarkSword Exploit Protection to More Devices
Apple enhances its defenses against the DarkSword exploit kit, a threat linked to state-sponsored hackers and commercial spyware vendors.
Drift Protocol Hit by Calculated Attack Resulting in $280 Million Loss
Drift Protocol faces a substantial breach, leading to administrative control loss and financial damages exceeding $280 million.
Critical Vulnerability in Claude Code Surfaces Days After Source Code Leak
Claude Code faces a critical vulnerability discovered by Adversa AI just days after its source code was unintentionally leaked by Anthropic.
Cybercriminals Exploit Empty Properties for Postal Fraud
Threat actors use vacant homes to snatch mail and perpetrate fraud using Flare's findings.
Cisco Releases Patches for Critical and High-Severity Vulnerabilities
Cisco fixes critical vulnerabilities threatening authentication, code execution, and more.
Stryker Corporation Restores Operations After Cyberattack
Stryker Corporation resumes operations after a cyberattack by Handala hacktivists.
Cybersecurity M&A Activity Surges With 38 Deals Closing in March 2026
Explore prominent cybersecurity M&A deals announced in March 2026 by Airbus, Cellebrite, and others.
Anthropic Confirms Internal Claude Code Leak Was Caused by Human Error
Anthropic confirms internal code leak of Claude Code due to human error, no sensitive data involved.
Microsoft Releases Emergency Fix for KB5079391 Update Installation Failures
Microsoft has released an emergency fix for the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to widespread ...
Google Rolls Out Gmail Address Change and Alias Feature in the U.S.
Google introduces a feature to change Gmail addresses, enhancing user email customization options in the U.S.
Proton Launches Meet as a Privacy-First Alternative to Google Meet and Zoom
Proton introduces Meet, a new video conferencing service focused on privacy.
Anthropic Accidentally Leaked Source Code for Claude Code
Anthropic's Claude Code source code leak report assures that no client data was breached.
EvilTokens Kit Uses Device Code Phishing to Target Microsoft Accounts
Explore how EvilTokens exploits phishing methods to endanger Microsoft accounts and facilitate business email compromise attacks.
Ukrainian CERT Impersonated in Phishing Campaign Distributing AGEWHEEZE
Ukrainian CERT is impersonated in a phishing campaign that distributes AGEWHEEZE, a remote administration tool.
Depthfirst Secures $80 Million for AI Security Expansion
Depthfirst secures Series B funding to enhance AI research, train security models, and boost enterprise adoption.
Microsoft Awards $2.3 Million to Researchers in Zero Day Quest Hacking Contest
Sweden Points to Pro-Russian Group in Cyberattack on Energy Infrastructure
Autovista Battles Ransomware Attack Across Europe and Australia
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws
A ‘By Design’ Flaw in Anthropic’s MCP Could Enable Widespread AI Supply Chain Attacks
Capsule Security Secures $7 Million to Protect AI Agents at Runtime
France’s Rising Kidnapping Cases Amid Crypto Extortion Schemes
Over 100 Malicious Chrome Extensions Are Stealing User Data and Creating Backdoors
Modern Trucking’s Cybersecurity Imperative: Industry Leaders Address Digital Threats
Microsoft Releases Windows 10 KB5082200 to Fix April 2026 Patch Tuesday Zero-Days
Fake Ledger Live App on macOS Drains $9.5 Million From Victims
Basic-Fit Data Breach Exposes Personal Information of One Million Members
McGraw-Hill Data Breach: Salesforce Misconfiguration Exploited by Hackers
Critical Security Flaws in Composer Put PHP Applications at Risk
Adobe’s ColdFusion Vulnerabilities Pose a Major Threat Amid Broader Security Concerns
Microsoft Rolls Out Fast-Track Account Recovery for Windows Hardware Program Suspensions
Cyberwarfare Within the Underground: Ransomware Gangs Clash
Google Enhances Pixel Security with Rust-Based DNS Parser
US, UK, and Canadian Forces Execute Successful Anti-Cryptocurrency Theft Operation
Stolen Credentials and Zero Trust: Preventing Privilege Escalation in Security Breaches