Cybersecurity News

Stay informed about the latest cybersecurity incidents, vulnerabilities, and threat landscape changes. We cover data breaches, ransomware campaigns, critical CVEs, and regulatory updates – with context on what it means for you and how to protect yourself.

Aerial view of Googleplex showcasing the circular venue and surrounding landscape.

Quantum Breakthroughs Intensify Threat to Elliptic-Curve Cryptography

CyberSecureFox

Two independent research teams have released preprints indicating that the quantum resources required to break elliptic‑curve cryptography (ECC) may be ...

Two hackers work on computers while a mysterious figure looms in the background.

LinkedIn Browser Fingerprinting: Extension Scanning, Privacy Risks, and Security Claims

CyberSecureFox

LinkedIn, the professional networking platform owned by Microsoft, has become the focus of a growing privacy debate after the German ...

Person on a bench overlooking a tech campus with major company buildings.

Anthropic’s Project Glasswing: How Claude Mythos Changes Cybersecurity Risk

CyberSecureFox

Anthropic has unveiled Project Glasswing, an initiative that deploys its new frontier AI model Claude Mythos to hunt and remediate ...

Hacker coding with multiple programming language icons and an octopus on the laptop.

North Korean “Contagious Interview” Campaign Targets Go, Rust and PHP in Software Supply Chain Attacks

CyberSecureFox

North Korean threat actors have significantly expanded the “Contagious Interview” software supply chain campaign, placing malicious packages across multiple open-source ...

Two men engaging in intense discussion at a computer workstation.

ComfyUI Botnet Exploits Exposed Stable Diffusion Servers for Cryptomining and Proxy Abuse

CyberSecureFox

A large-scale botnet campaign is actively compromising publicly accessible ComfyUI instances – a popular web interface for the Stable Diffusion ...

Aerial view of San Francisco with digital network visuals illustrating tech issues.

Dark Applications and AI Agents: Closing the Identity Confidence Gap in Zero Trust Programs

CyberSecureFox

By 2026, many enterprises report mature identity and access management (IAM) and Zero Trust security programs on paper, yet their ...

Visual depiction of tech company interactions with icons representing updates and tools.

Axios npm Compromise Exposes Coordinated Supply Chain Attacks on Node.js Maintainers

CyberSecureFox

The recent Axios npm compromise has turned out not to be an isolated incident but part of a coordinated software ...

Geese by the waterfront with Toronto skyline and solar panels in view.

GPU RowHammer Attacks: GPUBreach, GDDRHammer and GeForge Threaten Cloud AI Security

CyberSecureFox

Recent academic research has shown that modern high‑performance graphics processing units (GPUs) are vulnerable to a new class of RowHammer ...

Aerial view of Hasbro building with maintenance sign and city skyline nearby.

Hasbro Cyber Attack: Analysis of the 2025 Security Incident and Supply Chain Risks

CyberSecureFox

Global toy and entertainment giant Hasbro has reported a significant cybersecurity incident that could disrupt parts of its operations for ...

Cyber attack scene featuring iconic landmarks with a dramatic backdrop.

Storm-1175 Uses Zero-Day Vulnerabilities to Deliver Medusa Ransomware in Rapid Attacks

CyberSecureFox

A China-based cybercriminal group tracked by Microsoft Threat Intelligence as Storm-1175 is conducting highly automated, high-speed attacks against internet-facing systems ...

123184 Next