Cyber Security
News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution Risks
Mitchell Langley
July 11, 2025
Bluetooth flaws in OpenSynergy’s BlueSDK expose vehicles from Mercedes, Volkswagen, and Skoda to over-the-air attacks, enabling remote access and potential movement into critical systems.
Blog
Say Goodbye to Manual Identity Processes and Hello to Scalable IAM Automation
Gabby Lee
July 11, 2025
Manual identity processes expose your business to risk. Discover how scalable IAM automation transforms user access, improves compliance, and eliminates operational bottlenecks.
News
Iranian Hacktivists Breach Iran International and Threaten Journalists in London
Mitchell Langley
July 10, 2025
Iran International suffers a massive breach by Iranian hacktivist group Handala, exposing sensitive journalist data and threatening targeted leaks against staff in London and beyond. ...
News
Krispy Kreme Faces Class Action Lawsuit Over Breach That Exposed 160,000 Employee Records
Mitchell Langley
July 10, 2025
A 2024 data breach at Krispy Kreme exposed over 160,000 employee records. A new class action lawsuit blames the company’s failure to encrypt sensitive data. ...
News
Job Seeker Data Breach Exposes 5.1 Million Resumes Through Misconfigured Cloud Storage
Mitchell Langley
July 10, 2025
A misconfigured cloud storage container exposed 5.1 million resumes linked to LiveCareer, putting job seekers at high risk of identity theft and phishing attacks.
News
NightEagle APT Group Exploits Microsoft Exchange Zero-Day to Target China’s AI and Military Sectors
Andrew Doyle
July 10, 2025
APT group NightEagle exploited a Microsoft Exchange zero-day to infiltrate Chinese AI and defense sectors, using stealthy payloads and persistent backdoors to steal sensitive data. ...
News
Browser Extensions Turned Trojan Overnight, Compromising 2.3 Million Users
Andrew Doyle
July 10, 2025
Eighteen Chrome and Edge extensions’ updates transformed them into Trojans, compromising 2.3 million users by redirecting traffic, hijacking data, and enabling persistent access.
News
M&S Ransomware Attack Traced to Sophisticated Social Engineering Scheme
Mitchell Langley
July 9, 2025
M&S confirmed a major ransomware attack stemmed from social engineering, leading to data theft and system shutdowns linked to DragonForce ransomware and possible third-party compromise. ...
News
Public EV Chargers Pose New Cybersecurity Risks to Tesla and Other Electric Vehicles
Mitchell Langley
July 9, 2025
New research reveals how hackers can exploit EV public chargers—including Teslas—using man-in-the-middle attacks, unencrypted data links, and exposed SSH ports to disrupt charging networks.
News
Qantas Cyberattack Exposes Data of 5.7 Million Customers
Andrew Doyle
July 9, 2025
The Qantas cyberattack compromised personal data of 5.7 million customers. No financial information was stolen, but names, emails, and contact details were exposed.
News
Android Malware ‘Anatsa’ Returns to Google Play to Target Banking Apps Across the U.S.
Andrew Doyle
July 9, 2025
The Anatsa banking trojan resurfaced on Google Play, disguised as a PDF app, targeting U.S. users with credential theft overlays on popular mobile banking apps. ...
News
AI Deepfakes Used to Impersonate Secretary Rubio in Targeted Cyber Campaign
Andrew Doyle
July 9, 2025
AI-generated deepfakes impersonating U.S. Secretary Rubio were used to contact foreign ministers and U.S. officials, with Russian actors suspected in the targeted social engineering campaign. ...
News
iOS Wingman App FlirtAI Exposes 160,000 Private Chat Screenshots in Major Privacy Breach
Andrew Doyle
July 9, 2025
FlirtAI leaked 160,000 private chat screenshots from users seeking AI-generated responses, raising privacy concerns—especially for teenagers—due to an unprotected cloud storage bucket.
Blog
The Role of a Cyber Security Specialist in Building Cyber Resilience and Modern Defense Strategies
Andrew Doyle
July 9, 2025
A cyber security specialist is central to cyber resilience and cyber risk management, ensuring modern defense mechanisms protect organizations from evolving digital threats.
News
Bitcoin Depot Notifies Over 26,000 Customers of Year-Old Data Breach Involving Driver’s License Information
Mitchell Langley
July 8, 2025
Bitcoin Depot is alerting over 26,000 users of a 2024 data breach involving driver’s license details, after federal investigators delayed public notification for nearly a ...
News
Qantas Faces Extortion Following Cyberattack That Exposed Millions of Customer Records
Mitchell Langley
July 8, 2025
Qantas confirms it’s facing extortion following a cyberattack that exposed customer data from a third-party vendor, possibly linked to Scattered Spider’s aviation sector targeting.
News
‘Batavia’ Spyware Campaign Hits Russian Industrial Firms via Phishing Contracts
Andrew Doyle
July 8, 2025
Batavia spyware is hitting Russian industrial firms with phishing emails posing as contracts, deploying multi-part malware to steal sensitive data and monitor infected systems.
News
Hackers Exploit Leaked Shellter Red Team Tool to Deploy Infostealers
Mitchell Langley
July 8, 2025
Hackers weaponized Shellter Elite, a legitimate red team tool, to deliver infostealers after a leaked copy enabled months-long stealth attacks across the threat landscape.
News
SatanLock Ransomware Group Abruptly Shuts Down, Leaks All Stolen Files
Andrew Doyle
July 8, 2025
Ransomware gang SatanLock has ceased operations, announcing plans to leak all stolen victim data, marking an abrupt end to its brief but chaotic campaign.
News
Ingram Micro Hit by Global Outage, Internal Systems Remain Inaccessible Amid Cyberattack Concerns
Andrew Doyle
July 7, 2025
Ingram Micro is facing a global outage affecting both external and internal systems, with growing concerns that a possible ransomware attack may be behind the ...
CVE Vulnerability Alerts
SolarWinds Vulnerability Exploitation Prompts Immediate Response from Federal Agencies
Andrew Doyle
February 4, 2026
Cybersecurity
UK Data Protection Authority Probes X’s Grok AI for Generating Inappropriate Images
Mitchell Langley
February 4, 2026
News
Everest Extortion Group and Iron Mountain Data Incident: Key Insights
Mitchell Langley
February 4, 2026
TOP CYBERSECURITY HEADLINES
Application Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
This Week’s Security Spotlight
Cybersecurity
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Andrew Doyle
February 4, 2026
Cybersecurity
Nike Investigates Breach as Hackers Threaten Data Disclosure
Andrew Doyle
January 28, 2026
Application Security
Microsoft Investigates Outlook Crashing on iPad Devices due to Coding Error
Andrew Doyle
January 28, 2026
Network Security
TP-Link’s Vulnerability: Critical Patch for VIGI Cameras
Gabby Lee
January 20, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
Credential Theft Up 160% in 2025: 1.8 Billion Logins Stolen in First Half of Year
August 14, 2025
Credential theft has surged 160% in 2025, with 1.8 billion logins stolen from 5.8 million infected hosts. AI-driven malware, phishing, and unpatched vulnerabilities are fueling ...
CVE-2025-53786: The Microsoft Exchange Hybrid Flaw That Could Take Down Your Domain
August 13, 2025
A critical security flaw, tracked as CVE-2025-53786, is putting tens of thousands of organizations at risk — and U.S. federal agencies are under orders to ...
Allianz Life Breach: 2.8 Million Records Leaked in Salesforce Hack
August 13, 2025
On July 16, 2025, Allianz Life Insurance Company of North America confirmed a major data breach that exposed up to 2.8 million sensitive records belonging ...
Charon Ransomware Targets Middle East Government and Aviation Sectors
August 13, 2025
A newly discovered ransomware family named Charon is making waves in the cybersecurity world — and not for good reasons. Targeting government agencies and the ...
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
August 13, 2025
August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a combined 170+ ...
RansomHub Hits Michigan’s Manpower — Data Breach Exposes 140,000 Individuals
August 13, 2025
Manpower, a major staffing company based in Lansing, Michigan, has confirmed a ransomware attack that exposed the personal data of approximately 140,000 individuals. The breach, ...
DARPA’s AI Cyber Challenge: Advancements in Autonomous Bug Patching
August 13, 2025
DARPA’s AI Cyber Challenge showcased autonomous tools that detected 77% of vulnerabilities and patched 61% within minutes, signaling a breakthrough in AI-driven cybersecurity for protecting ...
Connex Data Breach Affects 172,000 Customers
August 13, 2025
Connex Credit Union says a June network intrusion exposed personal and financial data for 172,000 customers; notification began August 7, 2025, with CyberScout monitoring offered.
Hackers Leak Allianz Life Data Stolen in Salesforce Attacks
August 13, 2025
ShinyHunters leaked 2.8 million Allianz Life records from Salesforce after the insurer disclosed a July 16 CRM breach affecting the majority of 1.4 million customers. ...
Financial Impact From Severe OT Events Could Top $300B
August 13, 2025
A Dragos and Marsh McLennan report warns severe OT disruptions could cost nearly $330 billion annually in a 1-in-250-year event, driven by business interruption.
Cybersecurity Trends 2025: AI, Digital Identity, and the Shift to Intelligent SecOps
August 13, 2025
In 2025, AI is both a weapon and a shield in cybersecurity, driving trends from intelligent SecOps to digital identity protection, zero-trust adoption, and predictive ...
Russia Said to Be Behind US Federal Court Systems Hack
August 13, 2025
Investigators say Russia is partly behind the US federal court hack, exposing sealed and sensitive records, as courts move files offline and tighten access controls. ...
Over 200,000 New Zealand Government, Health, and Banking Credentials Found on Dark Web
August 13, 2025
A dark web leak has exposed over 200,000 credentials linked to New Zealand’s government, healthcare, and banking sectors, highlighting systemic cybersecurity weaknesses and raising urgent ...
UK Proposes New Cybersecurity Law with Stricter Reporting and Governance Rules
August 13, 2025
The UK’s proposed Cyber Security and Resilience Bill expands oversight to critical suppliers, MSPs, and digital services, introducing stricter governance, 24/72-hour incident reporting, and enhanced ...
North St. Paul Municipal Data Breach Targets Police Department
August 13, 2025
A phishing email targeting a police department account triggered a cyber breach in North St. Paul. While contained quickly, the incident prompted a forensic investigation, ...
Qualys Unveils Agentic AI for Autonomous Cyber Risk Management
August 13, 2025
Qualys has unveiled Agentic AI, an autonomous security framework within its Enterprise TruRisk platform. Designed to automate risk analysis, threat prioritization, and remediation, it promises ...
Windows 11 August 2025 Security Update Introduces AI Features
August 13, 2025
The Windows 11 August 2025 update blends security patches with bold AI features, from Recall’s controversial memory function to upcoming “agentic companions,” signaling Microsoft’s long-term ...
Deepfake Vishing Incidents Surge by 170% in Q2 2025
August 13, 2025
Deepfake-enabled vishing attacks are skyrocketing, with criminals using AI-cloned voices to impersonate executives, officials, and loved ones. These scams bypass defenses, exploit trust, and are ...
August Infosec Spotlight: Elastic EASE & Black Kite ASI Advance AI Threat Detection
August 13, 2025
Two new AI-driven tools—Elastic’s AI SOC Engine and Black Kite’s Adversary Susceptibility Index—are setting a new standard in cybersecurity by automating detection, enhancing context, and ...
Cybersecurity Complexity Due to Tool Sprawl and Multi-Vendor Ecosystems
August 13, 2025
Cybersecurity teams are drowning in complexity, not threats. Multi-vendor tool sprawl inflates costs, weakens visibility, and burns out staff—proving that smarter integration, not more tools, ...





































