Resources
Critical Security Vulnerabilities Patched in n8n Workflow Automation Platform
Mitchell Langley
March 12, 2026
Two critical security vulnerabilities in n8n automation platform have been patched.
Cisco Catalyst SD-WAN Manager Faces Active Exploitation of New Vulnerabilities
Gabby Lee
March 6, 2026
Cisco reveals active exploitation of vulnerabilities in their Catalyst SD-WAN Manager.
FBI Seizes LeakBase and Disrupts a Major Cybercrime Forum
Gabby Lee
March 5, 2026
A recent FBI takedown of the LeakBase cybercrime forum disrupts major online criminal activities.
Critical Grandstream Phone Vulnerability Allows for Eavesdropping Opportunities
Gabby Lee
February 23, 2026
A critical flaw in Grandstream phones enables remote code execution without authentication.
Critical Vulnerability in Honeywell CCTVs Exposes Security Risks
Andrew Doyle
February 19, 2026
CISA alerts to a critical flaw in Honeywell CCTVs enabling unauthorized access with potential for account hijacking and system compromise.
Texas Sues TP-Link Over Router Security Deception Tied to Chinese State-Backed Hackers
Andrew Doyle
February 19, 2026
Texas accuses TP-Link of falsely advertising its routers' security, allowing Chinese state-backed hackers to exploit firmware vulnerabilities and acce...
Polish Authorities Detain Suspected Phobos Ransomware Operative
Andrew Doyle
February 18, 2026
Polish authorities have arrested a 47-year-old man suspected of participating in cybercrimes associated with the Phobos ransomware. During the operation, officers seized devices containing evidence ...
Zast.AI Secures $6 Million for Innovating AI-Powered Software Vulnerability Detection
Gabby Lee
February 17, 2026
Leveraging artificial intelligence, Zast.AI aims to advance the field of code security by implementing AI agents to effectively identify and verify software vulnerabilities, ensuring accuracy ...
Attackers Exploit Critical Vulnerability in BeyondTrust Remote Support
Mitchell Langley
February 17, 2026
BeyondTrust Remote Support's CVE-2026-1731, a critical vulnerability, witnessed exploitation attempts within 24 hours of the public release of a Proof of Concept (PoC), highlighting attackers' ...
CISA Catalog Includes BeyondTrust Flaw Vulnerability
Andrew Doyle
February 17, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a vulnerability in BeyondTrust RS and PRA, identified as CVE-2026-1731, to its Known Exploited ...
Weekly Newsletter
Weekly Cybersecurity Newsletter: 14th to 18th August
Andrew Doyle
July 19, 2025
Explore our latest cybersecurity podcast episodes featuring ransomware attacks, phishing campaigns, corporate breaches, legal showdowns, and deep dives into evolving threats and digital defenses.
This Week In Cybersecurity: 23rd June to 27th June
Andrew Doyle
June 30, 2025
News Stories New ‘FileFix’ Attack Exploits Windows File Explorer to Deliver Stealthy Commands Threat actors use the search-ms URI protocol ...
This Week In Cybersecurity: 26th to 30th May, 2025
Andrew Doyle
May 30, 2025
"Cybersecurity threats escalate as ransomware attacks target major organizations, exposing sensitive data and highlighting vulnerabilities in systems across various industries. Stay informed."
This Week In Cybersecurity: 19th to 23rd May, 2025
Andrew Doyle
May 23, 2025
This week, significant cybersecurity incidents include ransomware attacks, data breaches affecting major organizations, and ongoing threats from state-sponsored groups, highlighting vulnerabilities across various sectors.
This Week In Cybersecurity: 21st – 25th April, 2025
Andrew Doyle
April 25, 2025
Targeted malware, ransomware, phishing, and ad fraud hit SK Telecom, Baltimore schools, Google, and more this week—exposing critical data and abusing trusted systems.
Trending
Daily Briefing Newsletter
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.














