Welcome to your trusted source for the latest cybersecurity news and digital protection updates. Our platform aggregates verified stories from leading cybersecurity websites like The Hacker News, Bleeping Computer, Krebs on Security, Dark Reading, SecurityWeek, CSO Online, TechTarget Security, and ZDNet Security. Whether you’re tracking ransomware threats, data breaches, malware trends, or cloud security insights, we keep you informed with expert analyses, best practices, and emerging developments in global cybersecurity. Stay secure and knowledgeable with our daily stream of cybersecurity news and threat intelligence from trusted industry sources.
Top Picks
- Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary's expansion of the targeting scope beyond South Korea,… - Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. "The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign," Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown… - New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector
The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the "largest cyber attack" targeting Poland's power system in the last week of December 2025. The attack was unsuccessful, the country's energy minister, Milosz Motyka, said last week. "The command of the cyberspace… - Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents
AI agents are accelerating how work gets done. They schedule meetings, access data, trigger workflows, write code, and take action in real time, pushing productivity beyond human speed across the enterprise. Then comes the moment every security team eventually hits: “Wait… who approved this?” Unlike users or applications, AI agents… - CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8),… - 2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures. - Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026. - Exploited Zero-Day Flaw in Cisco UC Could Affect Millions
Mass scanning is underway for CVE-2026-20045, which Cisco tagged as critical because successful exploitation could lead to a complete system takeover. - Europe's GCVE Raises Concerns Over Fragmentation in Vulnerability Databases
GCVE would enhance global collaboration, flexibility, and efficiency in tracking security flaws. Duplicate entries and a decentralization policy may create more chaos for defenders. - Healthy Security Cultures Want People to Report Risks
The signs of an effective security culture are shifting as companies call on CISOs and security teams to raise their hands unabashedly. - CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2025-68645 (CVSS score: 8.8) - A PHP remote file inclusion vulnerability in Synacor… - Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. "In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to… - TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order
TikTok on Friday officially announced that it formed a joint venture that will allow the hugely popular video-sharing application to continue operating in the U.S. The new venture, named TikTok USDS Joint Venture LLC, has been established in compliance with the Executive Order signed by U.S. President Donald Trump in… - Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
Cybersecurity researchers have disclosed details of a new dual-vector campaign that leverages stolen credentials to deploy legitimate Remote Monitoring and Management (RMM) software for persistent remote access to compromised hosts. "Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust," KnowBe4… - Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. "The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness," the Microsoft Defender Security Research… - Risky Chinese Electric Buses Spark Aussie Gov't Review
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport remote connectivity some worry the Chinese state could exploit. - Fortinet Firewalls Hit With Malicious Configuration Changes
Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files. - From a Whisper to a Scream: Europe Frets About Overreliance on US Tech
Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further. - New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
Cybersecurity researchers have disclosed details of a new ransomware family called Osiris that targeted a major food service franchisee operator in Southeast Asia in November 2025. The attack leveraged a malicious driver called POORTRY as part of a known technique referred to as bring your own vulnerable driver (BYOVD) to… - Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
A critical security flaw has been disclosed in the GNU InetUtils telnet daemon (telnetd) that went unnoticed for nearly 11 years. The vulnerability, tracked as CVE-2026-24061, is rated 9.8 out of 10.0 on the CVSS scoring system. It affects all versions of GNU InetUtils from version 1.9.3 up to and… - Latin American Orgs Lack Confidence in Cyber Defenses, Skills
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says. - ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
Most of this week’s threats didn’t rely on new tricks. They relied on familiar systems behaving exactly as designed, just in the wrong hands. Ordinary files, routine services, and trusted workflows were enough to open doors without forcing them. What stands out is how little friction attackers now need. Some… - DPRK Actors Deploy VS Code Tunnels for Remote Hacking
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection. - Filling the Most Common Gaps in Google Workspace Security
Security teams at agile, fast-growing companies often have the same mandate: secure the business without slowing it down. Most teams inherit a tech stack optimized for breakneck growth, not resilience. In these environments, the security team is the helpdesk, the compliance expert, and the incident response team all rolled into…
Top Sources for the Latest Cybersecurity News
The Hacker News
The Hacker News is one of the world’s most respected sources for the latest cybersecurity updates. It reports on data breaches, zero-day vulnerabilities, and ransomware incidents in real time. Known for its accuracy and speed, it’s an essential destination for IT professionals and security researchers.
Bleeping Computer
Bleeping Computer provides up-to-date cybersecurity updates focused on malware removal, patch management, and online safety. With a strong community and expert contributors, it helps readers stay protected from the latest cyber threats and vulnerabilities.
Krebs on Security
Founded by investigative journalist Brian Krebs, Krebs on Security delivers deep analysis and investigative reports on cybercrime, data breaches, and digital privacy. It’s a top resource for those seeking verified, evidence-based cybersecurity insights and case studies.
Dark Reading
Dark Reading covers the latest security news with a focus on enterprise security, cloud protection, and network defense. It publishes detailed articles, research reports, and industry analysis that help businesses strengthen their cyber resilience.
SecurityWeek
SecurityWeek offers daily cyber-security news and professional commentary on global threats, enterprise risks, and government security policies. It’s ideal for IT managers and security leaders who want in-depth understanding of the cyber threat landscape.
CSO Online
CSO Online focuses on cybersecurity management, data protection, and business continuity. Its reports, interviews, and opinion pieces guide executives and CISOs in mitigating risks and improving corporate security strategies against emerging cyber attacks.
TechTarget Security
TechTarget Security provides in-depth cybersecurity news and technical insights for professionals. Covering everything from endpoint protection to cloud compliance, it’s an educational resource for IT teams and digital infrastructure specialists.
ZDNet Security
ZDNet Security delivers the latest news on cybersecurity with a global reach. It highlights data breaches, privacy regulations, and enterprise software vulnerabilities, offering a clear overview of ongoing digital security challenges worldwide.

