Recent
Bank, Lock, Security

Spike in phishing: Recent reports indicate that campaigns targeting financial brands account for approximately a third of all phishing activity. Fake websites: Attackers exploit users'…

|
Published
Scattered Spider, Man, Network

New TTPs: Scattered Spider displays more sophisticated social engineering techniques, reportedly adding a DragonForce ransomware variant. Additional approaches: The update refers to the threat actor…

|
Published
Pharmacy

What happened: The Neopharm and Stolichki pharmacy chains in Russia were targeted by cyberattacks. Impact: Over 1,100 pharmacy locations in more than 80 cities across…

|
Published
Critical Infrastructure, US Flag

What happened: Attackers tried to breach the U.S. Fermilab, exploiting a vulnerability in Microsoft SharePoint. Attack impact: Critical data, including classified or sensitive information, was…

|
Published
Infostealer

Improved malware: A new email phishing campaign with a multi-stage infection chain revealed a sophisticated threat, Obj3ctivity Stealer. Malware capabilities: The stealer includes a full…

|
Published
Hacker, Screen

What happened: New information revealed that the Allianz Life data breach occurred due to social engineering targeting a CRM service. Exposed data: Sensitive information, including…

|
Published
Autocolor Malware, RAT

First time: This is the first known use of Auto-Color via the SAP NetWeaver flaw, employing a new suppression technique. Targeting U.S. chemicals: A chemical…

|
Published
Tea Dating App

Another compromise: A second Tea app exposure has come to light, involving an unprotected database that included user messages. Impact: A service marketed as safe…

|
Published
Satellite, Red

What happened: Elon Musk’s Starlink internet service suffered an outage that even impacted the Ukrainian front. Speculations: Experts believe several reasons may be at the…

|
Published
AI, Robot, Content

Meta copyright lawsuit: Two adult film producers, Strike 3 Holdings and Counterlife Media, accuse Meta of training AI on pirated pornographic videos. New accusations: The…

|
Published
Deepfake, Face, AI

Teen deepfakes probe: A student in Valencia is suspected of creating deepfake nude images of female classmates for selling them. Victim scope: Sixteen girls complained…

|
Published
Phone, Lock, Icons

Data breach: A significant cybersecurity incident involved the leak of user images from posts, comments, and direct messages. Tea acknowledgement: The women-dedicated app confirmed identifying…

|
Published
Breachforums Dark Web Admin

BreachForums is reportedly back online under original admins, with all user data preserved They attribute the April outage to a patched MyBB software vulnerability  The…

|
Published on July 26, 2025
VPN Interest Spikes in the UK as Porn Site Age Checks Take Effect

VPN Searches Surge: UK VPN searches spike 700% after porn sites require strict age verification checks. New Age-Check Rules: Under the Online Safety Act, adult…

|
Published on July 26, 2025
Chaos, Ransomware, Codes

New threat actor: A novel RaaS operation capitalizes on the Chaos name association with popular ransomware builder tool variants. TTPs overlap: Security researchers say Chaos…

|
Published on July 25, 2025
Dark web forum breach

Breach details: A significant, unprotected database exposed sensitive user information, primarily associated with the Leak Zone cybercrime forum. Database content: Each entry consisted of a…

|
Published on July 25, 2025
Aviation, Microsoft, Laptop, Office Space

BEC scam: Fake Microsoft 365 login pages harvested credentials and finance-related emails from aviation executives. Scheme details: Hackers edited official invoices they accessed and sent…

|
Published on July 25, 2025
US Woman Aiding DPRK North Korea

DPRK-linked operation: An Arizona resident helped North Koreans pretend to be U.S.-based remote IT workers to trick 300 American companies. Charges: She pleaded guilty to…

|
Published on July 25, 2025
How VP.Net Uses SGX to Redefine VPN Privacy Architecture

Hardware-Enforced Privacy: In VP.Net, traffic is decrypted inside SGX enclaves, inaccessible even to server administrators. No Linkable Logs: Enclave obfuscates, batches, and mixes data to…

|
Last updated July 25, 2025
Windscribe Prepares for the Post-Quantum Future With New Encryption Standards

Quantum Ready: Windscribe prepares to add post-quantum encryption to VPN protocols Gradual Rollout: High-risk connections get early access to hybrid key exchange Standards Aligned: New…

|
Published on July 25, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: