Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Hacker at a desk with screens showing cybersecurity threats and San Francisco skyline.

How a Multi‑Stage AiTM Phishing Campaign Bypasses MFA and Targets 35,000 Users

CyberSecureFox Editorial Team

In mid‑April 2026, a multi‑stage phishing campaign was identified that targeted more than 35,000 users across 13,000 organizations. It used ...

Rusty padlock securing a server cabinet with glowing lights in the background.

Patches for Critical MOVEit Automation Auth Bypass and Privilege Bugs

CyberSecureFox Editorial Team

Progress Software has released updates to address two vulnerabilities in MOVEit Automation, one of which is the critical authentication bypass ...

Futuristic scene illustrating cyber attacks in 2025 with data visualizations and analysts.

AI-Driven Cyberattacks, Supply Chain Threats and Defense Tactics

CyberSecureFox Editorial Team

In 2025, the barrier to entry for sophisticated cyberattacks collapsed: teenagers with no technical skills, using systems based on large ...

Multiple law enforcement figures oversee a group in orange jumpsuits, with flags and digital elements.

How global raids on pig butchering scams reshape crypto risk

CyberSecureFox Editorial Team

An international operation involving the US, China, and the UAE led to the arrest of at least 276 people, the ...

Hacker in a hoodie manipulating global cyber connections against a dark background.

Shadow-Earth-053, ShadowPad and phishing clusters in Asia

CyberSecureFox Editorial Team

Researchers have recorded a new China-aligned espionage activity cluster, SHADOW-EARTH-053, targeting government and defense organizations in South, East and Southeast ...

Tux the penguin showcases a cracked shell with circuitry beneath, symbolizing hacking.

Copy Fail (CVE-2026-31431): Linux Kernel LPE Actively Exploited

CyberSecureFox Editorial Team

CISA has added the CVE-2026-31431 (Copy Fail) vulnerability in the Linux kernel to its CISA KEV Known Exploited Vulnerabilities catalog, ...

Dark-themed digital artwork featuring a bear manipulating software boxes and code elements.

PromptMink: North Korean Supply Chain Attacks Against npm, Web3 Developers and Open Source Ecosystems

CyberSecureFox Editorial Team

A newly documented campaign, dubbed PromptMink, is targeting the open source ecosystem and Web3 developers through malicious npm packages, fake ...

Close-up of a damaged hard drive showing metal shards and dust.

VECT 2.0 Ransomware: Critical Encryption Flaw Turns RaaS into a Data-Wiping Wiper

CyberSecureFox Editorial Team

Recent analysis of the VECT 2.0 ransomware family reveals a critical design flaw that effectively transforms this ransomware-as-a-service (RaaS) operation ...

Hacker working on a laptop, surrounded by tech symbols and a shattered Google logo.

Critical Gemini CLI and Cursor IDE Vulnerabilities Expose AI Development Security Risks

CyberSecureFox Editorial Team

Google has remediated a critical remote code execution (RCE) vulnerability in its Gemini CLI tools, while independent researchers have disclosed ...

123191 Next