Cyber Security
Application Security
Passwd Offers Secure Credential Management for Google Workspace Users
Andrew Doyle
December 24, 2025
Passwd provides a secure credential management platform designed exclusively for businesses using Google Workspace, emphasizing integration, controlled sharing, and practicality.
Cybersecurity
Operation Sentinel: INTERPOL’s Comprehensive Cybercrime Crackdown Across Africa
Mitchell Langley
December 24, 2025
INTERPOL's Operation Sentinel culminated in the arrest of 574 suspects and the recovery of $3 million. The operation involved collaboration with 19 countries to target ...
News
Feds Seize Database Targeting $28 Million Bank Account Theft
Mitchell Langley
December 24, 2025
Authorities took significant action by seizing a password database used in a phishing attack that attempted a $28 million bank heist. This article delves into ...
Cybersecurity
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
Gabby Lee
December 24, 2025
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
Cybersecurity
WebRAT Malware Utilizing GitHub for Malicious Distribution
Andrew Doyle
December 24, 2025
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
Application Security
n8n Automation Platform Faces Severe Security Issue
Mitchell Langley
December 24, 2025
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Application Security
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
Gabby Lee
December 24, 2025
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
Cybersecurity
French National Postal Service Disruption Affects Millions of Users
Mitchell Langley
December 24, 2025
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Data Security
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
Gabby Lee
December 24, 2025
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Cybersecurity
Microsoft Focuses on Security with Its Timely Out-of-Band Update
Andrew Doyle
December 24, 2025
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Data Security
Anna’s Archive Takes a Stand on Music Preservation
Andrew Doyle
December 23, 2025
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Cybersecurity
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
Mitchell Langley
December 23, 2025
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Cybersecurity
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
Andrew Doyle
December 23, 2025
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Cybersecurity
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
Gabby Lee
December 23, 2025
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
News
MacSync Malware Distributed via Signed Swift Application
Andrew Doyle
December 22, 2025
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
Information Security
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
Andrew Doyle
December 22, 2025
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cybersecurity
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
Mitchell Langley
December 22, 2025
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
News
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
Gabby Lee
December 22, 2025
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
Cybersecurity
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
Mitchell Langley
December 22, 2025
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
News
Clop Ransomware Breach Compromises University of Phoenix Data
Mitchell Langley
December 22, 2025
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Cybersecurity
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
Mitchell Langley
January 13, 2026
Cybersecurity
University of Hawaii Ransomware Attack Leads to Data Breach at Cancer Center
Mitchell Langley
January 13, 2026
News
Diplomatic Exchange Between Nations Highlights Tensions in Cybercrime Prosecutions
Mitchell Langley
January 11, 2026
Data Security
Ledger Breach Due to Global-e Attack Compromises Customer Data
Andrew Doyle
January 6, 2026
TOP CYBERSECURITY HEADLINES
Data Security
Endesa Cyberattack Results in Customer Data Exposure
Application Security
Meta Addresses Security Vulnerability in Instagram Password Resets
This Week’s Security Spotlight
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Andrew Doyle
January 13, 2026
Application Security
Apex Legends Players Face Unprecedented Character Hijacking Over Weekend
Mitchell Langley
January 13, 2026
Application Security
BreachForums Re-emerges Only to Fall Victim to Data Breach
Mitchell Langley
January 12, 2026
Application Security
Chinese-Speaking Threat Actors Allegedly Exploit SonicWall VPN for VMware ESXi Breach
Gabby Lee
January 11, 2026
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Featured Videos
Podcasts
Cyber Security News
- All
- Application Security
- Blog
- CVE Vulnerability Alerts
- Cybersecurity
- Cybersecurity Newsletter
- Data Security
- Endpoint Security
- Identity and Access Management
- Information Security
- Network Security
- News
- Phishing
- Podcasts
- Product Reviews
- Ransomware
- Ransomware Victims
- Resources
- Security Spotlight
- Sponsored
- Threat Actors
- Threat Actors
- Threat Detection Tools
ServiceNow Acquires Armis for $7.75 Billion, Boosting Cybersecurity Capabilities
December 24, 2025
Following rumors, ServiceNow confirms its acquisition of Armis for $7.75 billion, expanding its capabilities in securing IoT and connected device environments, a crucial move post ...
WebRAT Malware Utilizing GitHub for Malicious Distribution
December 24, 2025
WebRAT malware spreads through GitHub, claiming to offer proof-of-concept exploits for recent vulnerabilities, revealing challenging implications for cybersecurity experts.
n8n Automation Platform Faces Severe Security Issue
December 24, 2025
CVE-2025-68613 vulnerability in n8n's automation platform potentially allows unauthorized code execution, demanding immediate attention from users.
Dangerous Chrome Extensions: Phantom Shuttle Targets Sensitive Data
December 24, 2025
'Phantom Shuttle' Chrome extensions mimic legitimate plugins but hijack user traffic to exfiltrate sensitive data. These malicious tools in the Web Store pose a significant ...
French National Postal Service Disruption Affects Millions of Users
December 24, 2025
La Poste, France’s national postal service, saw its online services disrupted by a major network incident, leading to outages affecting millions of users.
Nissan Cyberattack: Hackers Compromise Red Hat GitLab Instances
December 24, 2025
An attack on Red Hat's GitLab system has uncovered sensitive data of 21,000 customers linked to Nissan, creating significant security challenges and necessitating immediate remedial ...
Microsoft Focuses on Security with Its Timely Out-of-Band Update
December 24, 2025
Microsoft promptly issued an out-of-band update addressing a Message Queuing flaw from its December 2025 update, ensuring continued system security and reliability during a critical ...
Anna’s Archive Takes a Stand on Music Preservation
December 23, 2025
A hacktivist group has scraped 300 terabytes of music from Spotify to create an open-source digital music archive. This undertaking raises questions about the security ...
Long Development Timelines Highlight Challenges in Zero-Day Vulnerabilities
December 23, 2025
Insights from Zafran Security CEO Sanaz Yashar reveal the meticulous and time-consuming nature of zero-day vulnerability creation in the past.
Operation Sentinel Leads to Arrest of 574 Individuals in Global Cybercrime Crackdown
December 23, 2025
Operation Sentinel, a global initiative led by Interpol, resulted in the arrest of 574 individuals and the recovery of $3 million. The initiative targeted cybercrimes ...
Former Fugitive and Convicted Fraudster Expected Never to Return to the UK
December 23, 2025
A UK judge rules that convicted fraudster Mark Acklom, previously a most-wanted fugitive, will likely not return to the UK.
MacSync Malware Distributed via Signed Swift Application
December 22, 2025
The evolution of MacSync malware allows seamless operation without requiring direct user terminal interaction. Distribution via a signed Swift application has enabled threat actors to ...
ASUS Live Update Vulnerability Misrepresented as New Threat: Details on CVE-2025-59374
December 22, 2025
CVE-2025-59374, frequently misinterpreted as a present danger, is rooted in a historic supply-chain attack affecting an outdated ASUS software product.
Cyber Threats Exploit Everyday Tools: Firewalls, Browser Add-ons, and Smart TVs Under Siege
December 22, 2025
Cybersecurity professionals face challenges as attackers target daily tools, like firewalls and browser add-ons, transforming them into silent threats capable of causing significant damage. Ensuring ...
Ukrainian Nefilim Ransomware Affiliate Pleads Guilty in U.S.
December 22, 2025
Artem Stryzhak, an alleged affiliate of the Nefilim ransomware group, has pleaded guilty to conspiracy to commit computer fraud in the United States. Extradited earlier ...
UK Government Launches Probe into Cyber Incident After Allegations of Chinese Hacking
December 22, 2025
The UK government is investigating a cyber incident following media reports suggesting Chinese hackers accessed numerous confidential documents, raising concerns about data security and espionage ...
Clop Ransomware Breach Compromises University of Phoenix Data
December 22, 2025
The personal information of nearly 3.5 million University of Phoenix students, staff, and suppliers has been compromised due to a network breach by the Clop ...
Gambit Cyber Raises $3.4 Million in Seed Funding for Growth
December 22, 2025
Gambit Cyber, a cybersecurity startup, has successfully raised $3.4 million in seed funding. The infusion of capital is set to accelerate the advancement of the ...
PwC Promotes Responsible Innovation in the Era of AI
December 22, 2025
With AI becoming ubiquitous, security and compliance risks are on the rise. Organizations face the challenge of innovating responsibly as regulations evolve and risk postures ...
The Kimwolf Android Botnet Poses a Significant Threat to Mobile Security
December 22, 2025
The Kimwolf Android botnet, uncovered by XLab, has compromised more than 1.8 million devices globally. With over 1.7 billion DDoS commands issued, this malicious network ...





































