Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution Risks
News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution Risks
Bluetooth flaws in OpenSynergy’s BlueSDK expose vehicles from Mercedes, Volkswagen, and Skoda to over-the-air attacks, enabling remote access and potential movement into critical systems.
Say Goodbye to Manual Identity Processes and Hello to Scalable IAM Automation
Blog
Say Goodbye to Manual Identity Processes and Hello to Scalable IAM Automation
Manual identity processes expose your business to risk. Discover how scalable IAM automation transforms user access, improves compliance, and eliminates operational bottlenecks.
Iranian Hacktivists Breach Iran International and Threaten Journalists in London
News
Iranian Hacktivists Breach Iran International and Threaten Journalists in London
Iran International suffers a massive breach by Iranian hacktivist group Handala, exposing sensitive journalist data and threatening targeted leaks against staff in London and beyond. ...
Krispy Kreme Faces Class Action Lawsuit Over Breach That Exposed 160,000 Employee Records
News
Krispy Kreme Faces Class Action Lawsuit Over Breach That Exposed 160,000 Employee Records
A 2024 data breach at Krispy Kreme exposed over 160,000 employee records. A new class action lawsuit blames the company’s failure to encrypt sensitive data. ...
Job Seeker Data Breach Exposes 5.1 Million Resumes Through Misconfigured Cloud Storage
News
Job Seeker Data Breach Exposes 5.1 Million Resumes Through Misconfigured Cloud Storage
A misconfigured cloud storage container exposed 5.1 million resumes linked to LiveCareer, putting job seekers at high risk of identity theft and phishing attacks.
NightEagle APT Group Exploits Microsoft Exchange Zero-Day to Target China’s AI and Military Sectors
News
NightEagle APT Group Exploits Microsoft Exchange Zero-Day to Target China’s AI and Military Sectors
APT group NightEagle exploited a Microsoft Exchange zero-day to infiltrate Chinese AI and defense sectors, using stealthy payloads and persistent backdoors to steal sensitive data. ...
Browser Extensions Turned Trojan Overnight, Compromising 2.3 Million Users
News
Browser Extensions Turned Trojan Overnight, Compromising 2.3 Million Users
Eighteen Chrome and Edge extensions’ updates transformed them into Trojans, compromising 2.3 million users by redirecting traffic, hijacking data, and enabling persistent access.
M&S Ransomware Attack Traced to Sophisticated Social Engineering Scheme
News
M&S Ransomware Attack Traced to Sophisticated Social Engineering Scheme
M&S confirmed a major ransomware attack stemmed from social engineering, leading to data theft and system shutdowns linked to DragonForce ransomware and possible third-party compromise. ...
Public EV Chargers Pose New Cybersecurity Risks to Tesla and Other Electric Vehicles
News
Public EV Chargers Pose New Cybersecurity Risks to Tesla and Other Electric Vehicles
New research reveals how hackers can exploit EV public chargers—including Teslas—using man-in-the-middle attacks, unencrypted data links, and exposed SSH ports to disrupt charging networks.
Qantas Cyberattack Exposes Data of 5.7 Million Customers
News
Qantas Cyberattack Exposes Data of 5.7 Million Customers
The Qantas cyberattack compromised personal data of 5.7 million customers. No financial information was stolen, but names, emails, and contact details were exposed.
Android Malware ‘Anatsa’ Returns to Google Play to Target Banking Apps Across the U.S.
News
Android Malware ‘Anatsa’ Returns to Google Play to Target Banking Apps Across the U.S.
The Anatsa banking trojan resurfaced on Google Play, disguised as a PDF app, targeting U.S. users with credential theft overlays on popular mobile banking apps. ...
AI Deepfakes Used to Impersonate Secretary Rubio in Targeted Cyber Campaign
News
AI Deepfakes Used to Impersonate Secretary Rubio in Targeted Cyber Campaign
AI-generated deepfakes impersonating U.S. Secretary Rubio were used to contact foreign ministers and U.S. officials, with Russian actors suspected in the targeted social engineering campaign. ...
iOS Wingman App FlirtAI Exposes 160,000 Private Chat Screenshots in Major Privacy Breach
News
iOS Wingman App FlirtAI Exposes 160,000 Private Chat Screenshots in Major Privacy Breach
FlirtAI leaked 160,000 private chat screenshots from users seeking AI-generated responses, raising privacy concerns—especially for teenagers—due to an unprotected cloud storage bucket.
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
Blog
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
A cyber security specialist is central to cyber resilience and cyber risk management, ensuring modern defense mechanisms protect organizations from evolving digital threats.
https://app.heygen.com/videos/7e9173773f4d4621aafcd286ded3a83e
News
Bitcoin Depot Notifies Over 26,000 Customers of Year-Old Data Breach Involving Driver’s License Information
Bitcoin Depot is alerting over 26,000 users of a 2024 data breach involving driver’s license details, after federal investigators delayed public notification for nearly a ...
Qantas Faces Extortion Following Cyberattack That Exposed Millions of Customer Records
News
Qantas Faces Extortion Following Cyberattack That Exposed Millions of Customer Records
Qantas confirms it’s facing extortion following a cyberattack that exposed customer data from a third-party vendor, possibly linked to Scattered Spider’s aviation sector targeting.
'Batavia' Spyware Campaign Hits Russian Industrial Firms via Phishing Contracts
News
‘Batavia’ Spyware Campaign Hits Russian Industrial Firms via Phishing Contracts
Batavia spyware is hitting Russian industrial firms with phishing emails posing as contracts, deploying multi-part malware to steal sensitive data and monitor infected systems.
Hackers Exploit Leaked Shellter Red Team Tool to Deploy Infostealers
News
Hackers Exploit Leaked Shellter Red Team Tool to Deploy Infostealers
Hackers weaponized Shellter Elite, a legitimate red team tool, to deliver infostealers after a leaked copy enabled months-long stealth attacks across the threat landscape.
SatanLock Ransomware Group Abruptly Shuts Down, Leaks All Stolen Files
News
SatanLock Ransomware Group Abruptly Shuts Down, Leaks All Stolen Files
Ransomware gang SatanLock has ceased operations, announcing plans to leak all stolen victim data, marking an abrupt end to its brief but chaotic campaign.
Ingram Micro Hit by Global Outage, Internal Systems Remain Inaccessible Amid Cyberattack Concerns
News
Ingram Micro Hit by Global Outage, Internal Systems Remain Inaccessible Amid Cyberattack Concerns
Ingram Micro is facing a global outage affecting both external and internal systems, with growing concerns that a possible ransomware attack may be behind the ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
Credential Theft Up 160% in 2025: 1.8 Billion Logins Stolen in First Half of Year
Credential theft has surged 160% in 2025, with 1.8 billion logins stolen from 5.8 million infected hosts. AI-driven malware, phishing, and unpatched vulnerabilities are fueling ...
CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain
A critical security flaw, tracked as CVE-2025-53786, is putting tens of thousands of organizations at risk — and U.S. federal agencies are under orders to ...
Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack
On July 16, 2025, Allianz Life Insurance Company of North America confirmed a major data breach that exposed up to 2.8 million sensitive records belonging ...
Charon Ransomware Targets Middle East Government and Aviation Sectors
A newly discovered ransomware family named Charon is making waves in the cybersecurity world — and not for good reasons. Targeting government agencies and the ...
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a combined 170+ ...
RansomHub Hits Michigan’s Manpower — Data Breach Exposes 140,000 Individuals
Manpower, a major staffing company based in Lansing, Michigan, has confirmed a ransomware attack that exposed the personal data of approximately 140,000 individuals. The breach, ...
DARPA’s AI Cyber Challenge: Advancements in Autonomous Bug Patching
DARPA’s AI Cyber Challenge showcased autonomous tools that detected 77% of vulnerabilities and patched 61% within minutes, signaling a breakthrough in AI-driven cybersecurity for protecting ...
Connex Data Breach Affects 172,000 Customers
Connex Credit Union says a June network intrusion exposed personal and financial data for 172,000 customers; notification began August 7, 2025, with CyberScout monitoring offered.
Hackers Leak Allianz Life Data Stolen in Salesforce Attacks
ShinyHunters leaked 2.8 million Allianz Life records from Salesforce after the insurer disclosed a July 16 CRM breach affecting the majority of 1.4 million customers. ...
Financial Impact From Severe OT Events Could Top $300B
A Dragos and Marsh McLennan report warns severe OT disruptions could cost nearly $330 billion annually in a 1-in-250-year event, driven by business interruption.
Cybersecurity Trends 2025: AI, Digital Identity, and the Shift to Intelligent SecOps
In 2025, AI is both a weapon and a shield in cybersecurity, driving trends from intelligent SecOps to digital identity protection, zero-trust adoption, and predictive ...
Russia Said to Be Behind US Federal Court Systems Hack
Investigators say Russia is partly behind the US federal court hack, exposing sealed and sensitive records, as courts move files offline and tighten access controls. ...
Over 200,000 New Zealand Government, Health, and Banking Credentials Found on Dark Web
A dark web leak has exposed over 200,000 credentials linked to New Zealand’s government, healthcare, and banking sectors, highlighting systemic cybersecurity weaknesses and raising urgent ...
UK Proposes New Cybersecurity Law with Stricter Reporting and Governance Rules
The UK’s proposed Cyber Security and Resilience Bill expands oversight to critical suppliers, MSPs, and digital services, introducing stricter governance, 24/72-hour incident reporting, and enhanced ...
North St. Paul Municipal Data Breach Targets Police Department
A phishing email targeting a police department account triggered a cyber breach in North St. Paul. While contained quickly, the incident prompted a forensic investigation, ...
Qualys Unveils Agentic AI for Autonomous Cyber Risk Management
Qualys has unveiled Agentic AI, an autonomous security framework within its Enterprise TruRisk platform. Designed to automate risk analysis, threat prioritization, and remediation, it promises ...
Windows 11 August 2025 Security Update Introduces AI Features
The Windows 11 August 2025 update blends security patches with bold AI features, from Recall’s controversial memory function to upcoming “agentic companions,” signaling Microsoft’s long-term ...
Deepfake Vishing Incidents Surge by 170% in Q2 2025
Deepfake-enabled vishing attacks are skyrocketing, with criminals using AI-cloned voices to impersonate executives, officials, and loved ones. These scams bypass defenses, exploit trust, and are ...
August Infosec Spotlight: Elastic EASE & Black Kite ASI Advance AI Threat Detection
Two new AI-driven tools—Elastic’s AI SOC Engine and Black Kite’s Adversary Susceptibility Index—are setting a new standard in cybersecurity by automating detection, enhancing context, and ...
Cybersecurity Complexity Due to Tool Sprawl and Multi-Vendor Ecosystems
Cybersecurity teams are drowning in complexity, not threats. Multi-vendor tool sprawl inflates costs, weakens visibility, and burns out staff—proving that smarter integration, not more tools, ...