Cyber Security
The DockerDash Vulnerability: Understanding Its Impact on Docker Desktop and CLI
U.S. CISA’s Vulnerability Notice Revisions Spark Concerns
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
State-Sponsored Cyber Espionage: Notepad++ Update Traffic Hijacked
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Malicious VS Code Extensions Spread GlassWorm Loader
Surge in Fake Investment Platforms Exploiting Social Media
Fast Food Giant McDonald Calls for Creative Passwords to Enhance Security
Identity Challenges in User Data Storage and Security Maintenance
Microsoft’s Strategy to Eliminate NTLM in Favor of Kerberos
ClawHub’s Third-Party Skills Security Risks: User Data at Stake
Firefox Introduces Options to Control AI Features
Microsoft Acknowledges Shutdown Issue in Windows 10 and 11 Systems
Increasing Threats from Automated Data Extortion Targeting MongoDB
Apple Enhances Location Privacy With New Feature for iPhone and iPad
Zero-Day Vulnerabilities in Ivanti EPMM Exploited
Instagram’s Privacy Controls Data Exposure: Review of Recent Findings
Former Google Engineer Found Guilty of Stealing AI Data for Chinese Firms
eScan Antivirus Compromised: Supply Chain Security Breach Uncovered
Revelations from Epstein Files: Allegations of a “Personal Hacker”
Android Malware Incident: Hugging Face Repository Misuse
Chrome Extensions Prove Malicious with Data Hijacking Tricks
White House Revokes Software Security Rules But Keeps Key Resources
Microsoft Sets Retirement for NTLM Protocol in Windows for Enhanced Security
Startup Aisy Secures $2.3 Million Seed Fund to Enhance Vulnerability Management
Surge in Illegal Cryptocurrency Flows Reaches $158 Billion by 2025
Legal Repercussions Mount for Cognizant After TriZetto Incident
Global Crackdown Disrupts Illegal IPTV Services and Sends Strong Message
More Than 175,000 Exposed Hosts Pose Risks for Ollama LLM Misuse
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
News
OAuth Phishing Technique ConsentFix Poses New Threat to Microsoft Accounts
ConsentFix exploits browser-based OAuth flows to hijack Microsoft accounts. Understanding its mechanisms can help protect against this evolving phishing threat.
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Cybersecurity
Microsoft and Law Enforcement Collaborate to Dismantle RedVDS
Microsoft and law enforcement have disrupted the RedVDS cybercrime operation, which facilitated phishing and other malicious activities. This operation involves seizing digital infrastructure and pursuing ...
Critical Remote Code Execution Threat in Fortinet's SIEM Solution Exposed
Cybersecurity
Critical Remote Code Execution Threat in Fortinet’s SIEM Solution Exposed
A significant vulnerability has been identified in Fortinet's Security Information and Event Management (SIEM) product. This flaw could let a remote attacker execute commands or ...
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
Cybersecurity
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
VoidLink, a sophisticated Linux malware, exploits cloud environments with 37 plugins enabling activities from reconnaissance to lateral movement, posing serious risks.
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Application Security
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet's Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Application Security
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
Cybersecurity
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
A judicial decision marked a win for CrowdStrike as an investor lawsuit was dismissed due to inadequate evidence of intent to defraud investors following a ...
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Cybersecurity
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Lumen Technologies’ Black Lotus Labs null-routed traffic to more than 550 command-and-control nodes since October 2025, targeting AISURU and Kimwolf botnets. These networks exploit devices ...
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Data Security
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Two French telecom companies were fined €42 million by CNIL for GDPR violations. The breaches revealed significant lapses in security protocols.
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Cybersecurity
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine's Defense Amid Rising Cyber Threats
Cybersecurity
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Cybersecurity
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Verizon Wireless faces sweeping outages in the United States, leaving customers unable to access cellular services. Many report phones stuck in SOS mode, impacting communication ...
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
Cybersecurity
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Application Security
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Application Security
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Fried Frank Data Breach Implications for High-Profile Clients
Data Security
Fried Frank Data Breach: Implications for High-Profile Clients
The prestigious law firm Fried Frank has recently experienced a data breach, affecting confidential information related to its high-profile clientele. Notable entities such as JPMorgan ...
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
Cybersecurity
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
CrowdStrike announces a $420 million deal to acquire Seraphic, bolstering its capabilities in browser security. This acquisition, following a recent identity security purchase, reinforces CrowdStrike's ...
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since ...
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Cybersecurity
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Belgian healthcare facility AZ Monica was hit by a cyberattack, leading to a temporary shutdown of all servers, the cancellation of procedures, and patient transfers. ...
Adobe's Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Application Security
Adobe’s Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Adobe recently released updates to resolve 25 vulnerabilities across its software products. A critical bug in ColdFusion, linked to Apache Tika, is among the flaws ...

TOP CYBERSECURITY HEADLINES

This Week’s Security Spotlight

Trending

Daily Briefing Newsletter

Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Featured Videos​

  • All
  • Application Security
  • Blog
  • CVE Vulnerability Alerts
  • Cybersecurity
  • Cybersecurity Newsletter
  • Data Security
  • Endpoint Security
  • Identity and Access Management
  • Information Security
  • Network Security
  • News
  • Phishing
  • Podcasts
  • Product Reviews
  • Ransomware
  • Ransomware Victims
  • Resources
  • Security Spotlight
  • Sponsored
  • Threat Actors
  • Threat Actors
  • Threat Detection Tools
New Linux Malware, VoidLink, Exploits Cloud Infrastructures with Over 30 Plugins
VoidLink, a sophisticated Linux malware, exploits cloud environments with 37 plugins enabling activities from reconnaissance to lateral movement, posing serious risks.
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Court Dismisses Investor Dispute Against CrowdStrike Due to Insufficient Evidence
A judicial decision marked a win for CrowdStrike as an investor lawsuit was dismissed due to inadequate evidence of intent to defraud investors following a ...
Lumen Technologies Disrupts AISURU and Kimwolf Botnet Networks
Lumen Technologies’ Black Lotus Labs null-routed traffic to more than 550 command-and-control nodes since October 2025, targeting AISURU and Kimwolf botnets. These networks exploit devices ...
Telecom Giants Face Significant GDPR Fines Due to Data Breaches
Two French telecom companies were fined €42 million by CNIL for GDPR violations. The breaches revealed significant lapses in security protocols.
Aikido Security Secures $60 Million Investment at $1 Billion Valuation
Aikido Security, a firm dedicated to developer security, recently raised $60 million, elevating its valuation to $1 billion. This milestone is part of their broader ...
PLUGGYAPE Malware Targets Ukraine’s Defense Amid Rising Cyber Threats
CERT-UA reported recent cyberattacks targeting Ukraine's defense using PLUGGYAPE malware. Security experts associate these assaults with medium confidence to the Russian-affiliated Void Blizzard group.
Verizon Wireless Faces Widespread U.S. Outage and Service Issues
Verizon Wireless faces sweeping outages in the United States, leaving customers unable to access cellular services. Many report phones stuck in SOS mode, impacting communication ...
GoBruteforcer Botnet Exploits Weak Server Credentials to Target Crypto Ventures
The GoBruteforcer botnet uses AI-driven server deployments with weak credentials to target crypto and blockchain projects. The botnet, by exploiting legacy web technologies, enhances its ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Fried Frank Data Breach: Implications for High-Profile Clients
The prestigious law firm Fried Frank has recently experienced a data breach, affecting confidential information related to its high-profile clientele. Notable entities such as JPMorgan ...
CrowdStrike Enhances Browser Security Via $420M Seraphic Acquisition
CrowdStrike announces a $420 million deal to acquire Seraphic, bolstering its capabilities in browser security. This acquisition, following a recent identity security purchase, reinforces CrowdStrike's ...
Ongoing Web Skimming Threats Targeting Payment Networks and Clients
Cybersecurity experts have uncovered a large-scale web skimming attack targeting notable payment providers, including American Express and Mastercard. The attack has threatened enterprise organizations since ...
Belgian Hospital Cyberattack Forces Operational Halt and Patient Transfers
Belgian healthcare facility AZ Monica was hit by a cyberattack, leading to a temporary shutdown of all servers, the cancellation of procedures, and patient transfers. ...
Adobe’s Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Adobe recently released updates to resolve 25 vulnerabilities across its software products. A critical bug in ColdFusion, linked to Apache Tika, is among the flaws ...
Central Maine Healthcare Data Breach: Sensitive Information of Over 145,000 at Risk
Central Maine Healthcare suffered a data breach affecting more than 145,000 individuals. Sensitive data such as Social Security numbers and addresses was potentially exposed. Investigators ...
Microsoft Enhances Secure Boot Certificates for Windows 11
Microsoft introduces updated Secure Boot certificates for eligible Windows 11 systems, aiming to bolster security through automated installations, adding precautionary measures against past vulnerabilities.
CISO Strategies for 2026: Navigating Future Cybersecurity Challenges
The cybersecurity landscape in 2026 demands that Chief Information Security Officers (CISOs) adapt to new challenges and opportunities. Strategic foresight into emerging threats, technological evolution, ...