• Menu
  • Skip to main content

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cyber Security News

First and the last stop to get the latest cyber security news.

crescentharvest campaign targets iran protest supporters with rat malware

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests to conduct information theft and long-term espionage. The Acronis Threat Research Unit (TRU) said it observed the activity…

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT MalwareRead More

citizen lab finds cellebrite tool used on kenyan activist’s phone

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident’s phone, making it the latest case of…

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police CustodyRead More

grandstream gxp1600 voip phones exposed to unauthenticated remote code execution

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score…

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code ExecutionRead More

critical flaws found in four vs code extensions with over

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely. The extensions, which…

Critical Flaws Found in Four VS Code Extensions with Over 125 Million InstallsRead More

cybersecurity tech predictions for 2026: operating in a world of

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are…

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent InstabilityRead More

3 ways to start your intelligent workflow program

3 Ways to Start Your Intelligent Workflow Program

Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn’t enough. 88% of AI proofs-of-concept…

3 Ways to Start Your Intelligent Workflow ProgramRead More

dell recoverpoint for vms zero day cve 2026 22769 exploited since mid 2024

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat …

notepad++ fixes hijacked update mechanism used to deliver targeted malware

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism …

cisa flags four security flaws under active exploitation in latest

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) …

researchers show copilot and grok can be abused as malware

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be …

keenadu firmware backdoor infects android tablets via signed ota updates

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new …

smartloader attack uses trojanized oura mcp server to deploy stealc

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context …

webinar: how modern soc teams use ai and context to

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Cloud attacks move fast. Much faster than most incident response teams. In data centers, you had time. You could collect disk images, review logs, and …

my day getting my hands dirty with an ndr system

My Day Getting My Hands Dirty with an NDR System

My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see …

Get the latest news

Subscribe now and get the latest cyber security news in your email.

Copyright © TheCyberSecurity.News, All Rights Reserved.