Resources
Cybercrime Group Targets Developers with Malicious Telnyx Package on PyPI
Mitchell Langley
March 31, 2026
Cybercrime group associated with Trivy attack uploads malicious Telnyx packages to PyPI aiming to deploy credential-stealing malware.
Hackers Exploit a Critical Citrix Vulnerability to Steal Sensitive Data
Mitchell Langley
March 31, 2026
Critical Citrix vulnerability CVE-2026-3055 is targeted by attackers to steal data.
Critical Security Vulnerabilities Patched in n8n Workflow Automation Platform
Mitchell Langley
March 12, 2026
Two critical security vulnerabilities in n8n automation platform have been patched.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Gabby Lee
March 6, 2026
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Gabby Lee
March 5, 2026
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Critical Grandstream Phone Vulnerability Allows for Eavesdropping Opportunities
Gabby Lee
February 23, 2026
A critical flaw in Grandstream phones enables remote code execution without authentication.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
Andrew Doyle
February 19, 2026
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Andrew Doyle
February 19, 2026
Texas accuses TP-Link of falsely advertising its routers' security, allowing Chinese state-backed hackers to exploit firmware vulnerabilities and acce...
Polish Authorities Detain Suspected Phobos Ransomware Operative
Andrew Doyle
February 18, 2026
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
Gabby Lee
February 17, 2026
Leveraging artificial intelligence, Zast.AI aims to advance the field of code security by implementing AI agents to effectively identify and verify software vulnerabilities, ensuring accuracy ...
Weekly Newsletter
Weekly Cybersecurity Newsletter: 14th to 18th August
Andrew Doyle
July 19, 2025
Explore our latest cybersecurity podcast episodes featuring ransomware attacks, phishing campaigns, corporate breaches, legal showdowns, and deep dives into evolving threats and digital defenses.
This Week In Cybersecurity: 23rd June to 27th June
Andrew Doyle
June 30, 2025
News Stories New ‘FileFix’ Attack Exploits Windows File Explorer to Deliver Stealthy Commands Threat actors use the search-ms URI protocol ...
This Week In Cybersecurity: 26th to 30th May, 2025
Andrew Doyle
May 30, 2025
"Cybersecurity threats escalate as ransomware attacks target major organizations, exposing sensitive data and highlighting vulnerabilities in systems across various industries. Stay informed."
This Week In Cybersecurity: 19th to 23rd May, 2025
Andrew Doyle
May 23, 2025
This week, significant cybersecurity incidents include ransomware attacks, data breaches affecting major organizations, and ongoing threats from state-sponsored groups, highlighting vulnerabilities across various sectors.
This Week In Cybersecurity: 21st – 25th April, 2025
Andrew Doyle
April 25, 2025
Targeted malware, ransomware, phishing, and ad fraud hit SK Telecom, Baltimore schools, Google, and more this week—exposing critical data and abusing trusted systems.
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.














