Cyber Security
Klopatra Android RAT Masquerades as IPTV and VPN App, Drains Banking Devices across Europe
Allianz Life Confirms July Breach Exposed SSNs for Nearly 1.5 Million People
Axonius Identities Review 2025: Unified IAM, Governance & Security
11 Types of Social Engineering Attacks and How to Prevent Them
Cain and Abel: The Classic Cybersecurity Tool for Password Recovery and Network Testing
UK Government Backs Jaguar Land Rover With £1.5 Billion Loan Guarantee After Cyberattack
Harrods Suffers New Data Breach Exposing 430,000 Customer Records
Friends of NRA Posts Mailing List Online, Exposing Nearly 10,000 Supporter Records
How to Enable Kernel-mode Hardware-Enforced Stack Protection in Windows 11
Medusa Ransomware Claims Comcast Data Haul; $1.2M Extortion Demand Posted
Spacecom Breach Claims Questioned Amid Hacktivist Group’s Bold Assertions
Asahi Group Suspends Operations After Cyberattack Disrupts Japanese Headquarters
WestJet Notifies U.S. Travelers After June Data Breach
Microsoft Warns of New XCSSET macOS Malware Variant Targeting Xcode Devs
Maryland Department of Transportation Confirms Data Loss in Rhysida Ransomware Attack
Co-Op Reports $107 Million Loss After Scattered Spider Cyberattack
Texas Compliance Vendor Exposes 40K+ Sensitive DOT Records in S3 Leak
ICO Fines U.K. Energy Firms £550K for Unlawful Robo Marketing Calls
UK Arrests Suspect in Ransomware Attack That Disrupted European Airports
Dark Web Monitoring Guide for CISOs: Turning Shadows into Signals
Legislative Shifts in Cybersecurity: Analyzing the Impact of EU and UK Cyber Laws
Cisco ASA 5500-X Devices Under Attack: U.S. CISA Issues Emergency Directive
Teen Suspect in Scattered Spider Casino Hacks Allegedly Holds $1.8M Bitcoin
AI-Driven Zero-Day Attacks: Preparing for the Autonomous Cyber Threat Era
Black Arrow Cyber Threat Intelligence Briefing: Analyzing Emerging Attack Vectors
Congress Struggles to Renew Cyber Threat Sharing Act Amid Rising Cybersecurity Concerns
Brickstorm Backdoor Used Espionage Campaign Against U.S. Tech
GitHub Notifications Abused to Impersonate Y Combinator for Crypto Theft
Interpol Operation HAECHI VI Recovers $439 Million From Global Cybercrime Networks
China Mandates 1-Hour Cybersecurity Incident Reporting Under New CAC Rules
ShinyHunters Claims 160 Million Vietnamese Credit Records Stolen From National Database
Cybersecurity
ShinyHunters Claims 160 Million Vietnamese Credit Records Stolen from National Database
ShinyHunters claims 160 million Vietnam credit records stolen from CIC; samples verified by ReSecurity include PII, credit histories, and government IDs with recent timestamps.
Everest Ransomware Gang Names Allegis Group on Dark Web Claiming Client Lists
Cybersecurity
Everest Ransomware Gang Names Allegis Group on Dark Web Claiming Client Lists
Everest ransomware gang claims Allegis Group documents and client lists were taken; screenshots show spreadsheets of 135,000 and 426,000 lines, researchers warn of phishing risks.
Apple Warns Users of Sophisticated Spyware Attacks Across Multiple Countries
Cybersecurity
Apple Warns Users of Sophisticated Spyware Attacks Across Multiple Countries
Apple has warned users in over 150 countries of mercenary spyware attacks using zero-days and zero-click exploits, urging Lockdown Mode and emergency security assistance.
Microsoft to Roll Out Built-In Link Warnings for Teams Chats
Cybersecurity
Microsoft to Roll Out Built-In Link Warnings for Teams Chats
Microsoft will roll out real-time malicious link warnings for Teams chats in September 2025, adding another security layer to protect enterprise users from phishing and ...
National Cyber Director Pushes for Aggressive Cyber Strategy to Shift Risk to Adversaries
Cybersecurity
National Cyber Director Pushes for Aggressive Cyber Strategy to Shift Risk to Adversaries
National Cyber Director Sean Cairncross calls for a unified cyber strategy, urging CISA 2015 reauthorization, IT modernization, and stronger deterrence measures to shift risk onto ...
U.S. Sanctions Southeast Asian Cybercrime Networks That Stole $10 Billion from Americans
Cybersecurity
U.S. Sanctions Southeast Asian Cybercrime Networks That Stole $10 Billion from Americans
The U.S. Treasury sanctioned 19 Southeast Asian cybercrime networks tied to forced labor, trafficking, and scams that stole over $10 billion from Americans in 2024.
Temu Fined $2 Million for INFORM Consumers Act Violations
Cybersecurity
Temu Fined $2 Million for INFORM Consumers Act Violations
Temu will pay $2 million to settle FTC and DoJ claims it violated the INFORM Consumers Act by failing to disclose seller details and suspicious ...
NSW Health Data Breach Exposes Personal and Professional Records Of Nearly 600 Doctors
Cybersecurity
NSW Health Data Breach Exposes Personal and Professional Records Of Nearly 600 Doctors
A major data privacy lapse has rattled the New South Wales (NSW) health system after confidential records of nearly 600 ...
Threat Actor Upgrades Docker API Attacks, Moves Toward Botnet Development
Cybersecurity
Threat Actor Upgrades Docker API Attacks, Moves Toward Botnet Development
Attackers targeting exposed Docker APIs have upgraded their tools, enabling persistent access, lateral movement, and self-replication—laying the groundwork for a potential large-scale botnet campaign.
Dynatrace Confirms Customer Data Exposure in Salesforce Supply Chain Breach
Cybersecurity
Dynatrace Confirms Customer Data Exposure in Salesforce Supply Chain Breach
Dynatrace confirmed customer data exposure in the Salesforce supply chain breach via Salesloft Drift, joining Cloudflare, Google, and others hit by the Scattered LapSus$ Hunters ...
Wealthsimple Data Breach Exposes Government IDs in Third-Party Attack
Cybersecurity
Wealthsimple Data Breach Exposes Government IDs in Third-Party Attack
Wealthsimple confirmed a third-party data breach exposing account numbers, government IDs, and SINs of 30,000 clients. No funds stolen, but identity theft risks remain significant.
External Attack Surface Management: CISO’s Guide to Mitigating Risk Before It Strikes
Cybersecurity
External Attack Surface Management: CISO’s Guide to Mitigating Risk Before It Strikes
External Attack Surface Management gives CISOs continuous visibility into internet-facing assets, prioritizes risks by context, and enables proactive remediation—shrinking exposure before attackers exploit vulnerabilities.
U.S. Charges Ukrainian National for Administering Ransomware
Cybersecurity
U.S. Charges Ukrainian National for Administering Ransomware
The U.S. charged Ukrainian national Volodymyr Tymoshchuk for administering LockerGoga, MegaCortex, and Nefilim ransomware, linked to hundreds of corporate breaches and millions in damages worldwide.
Salesloft Data Breach Exposes 700 Companies Through OAuth Token Attack
Cybersecurity
Salesloft Data Breach Exposes 700 Companies Through OAuth Token Attack
A major security breach at Salesloft has compromised sensitive information from more than 700 companies, marking one of the largest ...
Doctors Outraged After NSW Health Department Leaks Personal and Professional Data
Cybersecurity
Doctors Outraged After NSW Health Department Leaks Personal and Professional Data
NSW Health exposed passports, medical credentials, and IDs of nearly 600 doctors, sparking outrage and raising serious risks of identity theft, fraud, and professional impersonation.
Salt Typhoon Breach Exposes U.S. Telecom Wiretap Systems
Cybersecurity
Salt Typhoon Breach Exposes U.S. Telecom Wiretap Systems
Chinese-linked APT group Salt Typhoon infiltrated major U.S. telecom providers in 2024, compromising surveillance systems and metadata from millions of users. The breach exposed lawful ...
China Is Blurring the Lines Between Civilian AI and Military Power
Cybersecurity
China Is Blurring the Lines Between Civilian AI and Military Power
China is merging civilian AI with military applications. Everyday tools like drones and voice apps are being leveraged by the PLA, according to a CSET ...
Rose Acre Farms Targeted in Alleged Lynx Ransomware Attack
Cybersecurity
Rose Acre Farms Targeted in Alleged Lynx Ransomware Attack
Rose Acre Farms, America’s second-largest egg producer, was allegedly hit by Lynx ransomware, with attackers claiming encrypted data in a breach that threatens food supply ...
Lovesac Confirms Data Breach Following Ransomware Attack
Cybersecurity
Lovesac Confirms Data Breach Following Ransomware Attack
Lovesac confirmed a ransomware-linked data breach impacting personal information. Attackers accessed systems in February 2025, with stolen data linked to the RansomHub ransomware group’s extortion ...
GhostAction Supply Chain Attack on GitHub Exposes 3,325 Secrets
Cybersecurity
GhostAction Supply Chain Attack on GitHub Exposes 3,325 Secrets
The GhostAction supply chain attack on GitHub compromised 3,325 secrets, including npm, PyPI, AWS, and GitHub tokens, after attackers injected malicious workflows into 817 repositories.

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Harrods Suffers New Data Breach Exposing 430,000 Customer Records
Cybersecurity
Harrods Suffers New Data Breach Exposing 430,000 Customer Records
Congress Struggles to Renew Cyber Threat Sharing Act Amid Rising Cybersecurity Concerns
Cybersecurity
Congress Struggles to Renew Cyber Threat Sharing Act Amid Rising Cybersecurity Concerns
VMScape Attack Bypasses Hypervisor Isolation on AMD and Intel CPUs
Cybersecurity
VMScape Attack Bypasses Hypervisor Isolation on AMD and Intel CPUs
UK Arrests Scattered Spider Teens Linked to TfL Cyberattack
Cybersecurity
UK Arrests Scattered Spider Teens Linked to TfL Cyberattack
Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Detection Tools
Hackers Use SEO Poisoning to Deliver Malware through Fake Apps
Researchers warn SEO-poisoning campaigns push trojanized Signal, WhatsApp and Chrome installers that bundle legitimate apps with Hiddengh0st and Winos malware for long-term surveillance.
Panama’s Finance Ministry Confirms Cyberattack as INC Ransom Claims Massive Data Theft
Panama’s MEF confirms a cyberattack but says systems remain safe. INC Ransom claims stealing financial data, emails, and documents, posting samples on its dark web ...
HybridPetya Ransomware Bypasses UEFI Secure Boot
ESET found HybridPetya, a Petya-style ransomware that exploits CVE-2024-7344 to bypass UEFI Secure Boot, install a bootkit, encrypt MFT clusters, and demand Bitcoin.
Microsoft Fairwater Center: Hyperscale AI Hub Coming to Wisconsin
Microsoft is building Fairwater, a hyperscale AI data center in Wisconsin with clustered NVIDIA GPUs, closed-loop liquid cooling, and a Datacenter Academy for local workforce ...
SystemBC Turns Infected VPS Hosts Into Global Proxy Highway
SystemBC leverages vulnerable commercial VPS hosts to run a 1,500-node proxy botnet that serves scraping, proxy resale, and high-volume criminal traffic globally.
Clarins Listed by Everest Ransomware Gang on Dark Web Post
Paris-headquartered luxury skincare maker Clarins has been named on a dark web leak page run by the Everest ransomware gang, which claims to have obtained ...
Hackers Claim Breach of Italian Post, Researchers Disagree
Hackers claim to have breached Poste Italiane, but researchers say the data is recycled from older leaks with fabricated fields, meaning no new compromise actually ...
New Kid Warlock Steps Up Ransomware Attacks with SharePoint Exploits
Warlock — tracked as Storm 2603 and GOLD SALEM — has surged since March 2025, exploiting SharePoint and other enterprise flaws and listing dozens of ...
Hundreds of NPM Packages Compromised in Self-Replicating Supply Chain Attack
A worm-style supply chain attack has compromised hundreds of NPM packages, harvesting npm tokens and secrets while propagating across popular JavaScript libraries and developer scopes.
Baltimore Medical System Claimed by Brain Cipher Ransomware
Brain Cipher claims several terabytes stolen from Baltimore Medical System, posting large server and database samples; impact could include medical identity theft for thousands of ...
Hackers Now Going Straight to the Source — Company Data Backups
Hackers are increasingly targeting company backups, with 18% of breaches linked to backup attacks — crippling recovery efforts and highlighting the urgent need for secure, ...
Hackers Claim Attack on the US’s Biggest Sushi Supplier — Again?
Ransomware gang Lynx claims to have stolen True World Group data, posting invoices and employee records—raising fears of a new breach and business, identity risks.
FBI Issues Guidance as Fraudsters Pose as IC3 to Extort Victims
The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick ...
Fraudulent GitHub Repos Spread Atomic Stealer Malware Targeting macOS Users
A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security ...
Netskope’s IPO Raises $908M: SASE Leader Surges 18% on First Trading Day
Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of ...
SPLX Exposes AI Exploit: Prompt Injection Tricks ChatGPT Into Solving CAPTCHAs
A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated ...
Brussels, Berlin, London Hit Hard as Cyber Disruption Sparks Flight Chaos
A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning ...
Novakon Ignored Security Reports on ICS Weaknesses, Leaving 40,000+ Devices Exposed
A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security ...
RevengeHotels Cybercrime Group Adopts AI and VenomRAT in Hotel Credit Card Theft Campaign
The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with ...
ShadowLeak: Server-Side Data Theft Attack Discovered Against ChatGPT Deep Research
A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such ...
Klopatra Android RAT Masquerades as IPTV and VPN App, Drains Banking Devices across Europe
Allianz Life Confirms July Breach Exposed SSNs for Nearly 1.5 Million People
FTC vs. Sendit: Lawsuit Alleges Data Theft, Fake Messages, and Subscription Traps
Broadcom Patches VMware Zero-Day: CVE-2025-41244 Exploited by China-Linked UNC5174
Seven Years, £5.5 Billion, 128,000 Victims – The Case of Yadi Zhang
Axonius Identities Review 2025: Unified IAM, Governance & Security
11 Types of Social Engineering Attacks and How to Prevent Them
Cisco ASA/FTD Flaws Under Siege: 50,000 Devices at Risk from Active Exploits
Cain and Abel: The Classic Cybersecurity Tool for Password Recovery and Network Testing
MatrixPDF: The New Phishing Toolkit That Turns Safe PDFs into Cyber Weapons
UK Government Backs Jaguar Land Rover With £1.5 Billion Loan Guarantee After Cyberattack
Harrods Suffers New Data Breach Exposing 430,000 Customer Records
Friends of NRA Posts Mailing List Online, Exposing Nearly 10,000 Supporter Records
Asahi Brewery Cyberattack Halts Domestic Operations Across Japan
Akira Ransomware Exploits SonicWall Flaw with Record-Breaking Speed
Ex-Hacktivist “Sabu” Backs SafeHill’s $2.6M Bet on Continuous Threat Management
How to Enable Kernel-mode Hardware-Enforced Stack Protection in Windows 11
Medusa Ransomware Claims Comcast Data Haul; $1.2M Extortion Demand Posted
Spacecom Breach Claims Questioned Amid Hacktivist Group’s Bold Assertions
Asahi Group Suspends Operations After Cyberattack Disrupts Japanese Headquarters