Cyber Security
Smart Slider 3 Plugin Flaw Lets Subscriber-Level Users Access Server Files
Apple Alerts Users to Update Outdated iPhones and iPads Due to Active Web-Based Threats
CareCloud Responds to a Potential Data Security Breach
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
A Hidden Flaw in OpenAI ChatGPT Turns Conversations Into Data Leaks
Researchers Uncover a New Malware Loader Targeting Credentials Through ClickFix
Huskeys Steps Out of Stealth With $8 Million in Funding and a New Edge Security Platform
Apple Blocks Dangerous Terminal Commands in macOS Tahoe 26.4
Zero-Click Flaw in Telegram Raises Security Alarms Despite Company Denial
Firefox 149 Launches with a Built-In VPN for Better Privacy
FCC Adds Consumer Routers to Covered List Amid Security Concerns
DOE Rolls Out Project Armor to Fortify Critical Energy Infrastructure
Cybercriminals Exploit Google Ads in a Deceptive Tax Document Malvertising Campaign
Dutch Ministry of Finance Hit by Cyberattack as Data Breach Investigation Continues
Open Source Projects Face a Rising Tide of Malware Infections
Major Announcements from RSAC 2026: What Day 1 Revealed
QualDerm Partners Data Breach Hits Over 3.1 Million People
Microsoft Fixes Gmail and Yahoo Synchronization Issues for Classic Outlook Users
Gartner Publishes Its First Market Guide for Guardian Agents
Software Supply Chains Are the New Frontline for Cyber Risk
Sam Altman’s Eyeball-Scanning Orb Takes on a New Role in AI Integration
Companies House Confirmed a Vulnerability That Put Millions of Business Records at Risk
New Threat Vector Exploits DNS Queries for Data Exfiltration in AI Environments
EU Council Sanctions Three Entities and Two Individuals for Cyberattacks on Critical Infrastructure
Identity-Based Access Control for AI Agents Is Now a Security Necessity
Hidden Commands in Font Rendering Are Being Used to Manipulate AI Assistants Through Webpages
Surf AI Raises $57 Million for Its Agentic Security Operations Platform
RondoDox Botnet Ramps Up Attacks, Hitting 15,000 Daily Exploitation Attempts
Tech and Retail Giants Sign Global Pact to Combat Online Scams and Fraud
Tech Giants Invest $12.5 Million in Open Source Software Security
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
News
Dutch Police Give Suspected Scammers a Two-Week Deadline to Surrender
Dutch police give 100 alleged scammers two weeks to surrender, or their images could be displayed nationwide.
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
Cybersecurity
Evasive ClickFix Tactic Leverages Windows Terminal to Avoid Detection
New ClickFix technique utilizes Windows Terminal instead of the Run dialog to bypass security measures.
Perplexity's Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
Application Security
Perplexity’s Comet Browser Had a Flaw That Left Users Vulnerable to Local File Theft
A vulnerability in Perplexity's Comet browser exposed local files to potential theft via calendar events.
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Cybersecurity
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Cybersecurity
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
Cybersecurity
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
Application Security
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
CVE Vulnerability Alerts
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
US Government Contractor's Son Charged with Cryptocurrency Theft from US Marshals Service
Cybersecurity
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
News
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Cybersecurity
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta's Smart Glasses Face Privacy Investigation in Britain
Cybersecurity
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
Cybersecurity
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
News
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
Cybersecurity
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.
Fake OpenClaw Installers on GitHub Are Stealing User Data
Cybersecurity
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Cybersecurity
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Cybersecurity
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Cybersecurity
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Cybersecurity
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Tier 1 SOC Analysts Are Carrying More Weight Than They Should
Tier 1 SOC analysts face unique challenges in threat detection due to their inexperience, affecting overall security operations center performance.
Joint Operation Dismantles Criminal Syndicate Exploiting Ukrainian War Refugees
Investigation dismantles online gambling criminal syndicate exploiting war-displaced women, highlights international collaboration in cybersecurity.
JavaScript Worm Disrupts Wikimedia Platforms Across Multiple Wikis
A JavaScript worm affects Wikimedia wikis, altering user scripts and pages, demanding a swift response to mitigate damage.
WordPress Plugin Vulnerability Puts Over 60,000 Sites at Risk
A critical flaw in WordPress's User Registration & Membership plugin threatens over 60,000 sites, risking exploitation.
US Government Contractor’s Son Charged with Cryptocurrency Theft from US Marshals Service
US contractor's son arrested for allegedly stealing $46M in digital currency from Marshals Service.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
Russian Campaign Targets Ukraine with BadPaw and MeowMeow Malware
Russian hackers target Ukrainian entities using fresh malware BadPaw and MeowMeow delivered through phishing.
Russian Ransomware Operator Admits Guilt in U.S. Court
Russian cybercriminal faces U.S. justice after South Korean extradition.
Meta’s Smart Glasses Face Privacy Investigation in Britain
Britain's privacy watchdog questions Meta's AI-powered glasses after intimate footage review.
Iranian MOIS-Linked MuddyWater Cyber Group Deploys New Custom Implant
An Iranian MOIS-linked cybercrew infiltrates U.S. firms with a sophisticated implant.
Underground Sale of Compromised cPanel Credentials Fuels Phishing Infrastructure
Flare reveals the booming underground market for hacked cPanel credentials fueling phishing schemes.
HungerRush POS Platform Targeted in Data Extortion Scheme
HungerRush POS customers report extortion emails threatening data exposure.
Fake OpenClaw Installers on GitHub Are Stealing User Data
Fake OpenClaw installers hosted on a malicious GitHub repository are targeting users with information stealers and GhostSocks malware to harvest sensi...
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Zurich Forms Cyber Insurance Powerhouse with $11 Billion Beazley Acquisition
Zurich's acquisition of Beazley, valued at $11 billion, is set to reshape the cyberinsurance landscape by the second half of 2026.
Retaliatory Hacktivism Escalates Amid Epic Fury and Roaring Lion Military Operations
Hacktivist activities rise sharply following the U.S.-Israel military campaign against Iran.
University of Mississippi Medical Center Resumes Operations After Nine-Day Ransomware Attack
UMMC restores IT systems and electronic medical records access after a ransomware attack caused nine days of operational interruptions.
Phishing Warnings as LastPass Users Get Targeted by Fake Alerts
LastPass alerts users of phishing emails posing as security warnings to obtain master passwords.
Law Enforcement Dismantles Tycoon2FA Phishing-as-a-Service Platform
Europol disables Tycoon2FA, a PhaaS platform responsible for tens of millions of phishing messages monthly.