Recent
Russia’s State-Backed MAX App May Detect VPN Usage, Researchers Claim

Key TakeawaysMAX app VPN detection claims: Researchers say app may detect VPN use, identify server IPs, user ISP, and bypassed restrictions.Government-linked messaging platform: MAX, developed…

|
Published
Hacker - Formal - Employee - Insider - Office

Key TakeawaysDOJ Indictment: A former incident response employee faces charges for allegedly colluding with the notorious BlackCat ransomware syndicate.Insider Scheme: The suspect reportedly shared confidential…

|
Published on March 12, 2026
ambulance

Key TakeawaysSignificant Impact: The cyberattack on Bell Ambulance, Wisconsin's largest ambulance provider, compromised the sensitive data of almost 240,000 individuals.Data Compromised: Stolen information includes Social…

|
Published on March 12, 2026

Key TakeawaysInitial Intrusion: A foreign hacker reportedly breached a server at the FBI’s New York Field Office, accessing files related to the Jeffrey Epstein investigation.Point…

|
Published on March 12, 2026

Key TakeawaysOperational disruption: Medical device manufacturer Stryker experienced a significant global network disruption, resulting in wiped corporate devices and locked systems.Handala attribution: The pro-Iran Handala…

|
Published on March 12, 2026
An abstract image of a data breach settlement with digital currency symbols representing compensation

Key TakeawaysSettlement Fund: Cadence Bank has agreed to a $5.25 million settlement to resolve claims related to the May 2023 MOVEit data breach.Affected Individuals: The…

|
Published on March 11, 2026

Key TakeawaysPrimary Target: A new malware, KadNap, is actively targeting Asus routers, conscripting them into a botnet of over 14,000 devices.Evasive Tactics: The botnet uses…

|
Published on March 11, 2026

Key TakeawaysInitial Compromise: Threat actors are exploiting Fortinet vulnerabilities and weak credentials to extract configuration files and service account credentials from FortiGate appliances.Post-Exploitation Tactics: Attackers…

|
Published on March 11, 2026

Key TakeawaysWhistleblower allegation: A former DOGE software engineer is accused of copying Social Security Administration databases containing records tied to over 500 million living and…

|
Published on March 11, 2026

Key TakeawaysHigh-Value Targets: A Russian cybercriminal campaign is actively targeting Signal and WhatsApp accounts of government officials and military personnel worldwide.Accounts Hijacking: Attackers use phishing…

|
Published on March 10, 2026

Key TakeawaysSalesforce Experience Cloud: ShinyHunters claimed a large-scale data exfiltration operation affecting 100 high-profile organizations, including Salesforce itself, Snowflake, Okta, Sony, AMD, and LastPass.Salesforce Guest…

|
Published on March 10, 2026

Key TakeawaysAllegations: An exploit reportedly originated from Trenchant, the offensive cyber operations division of U.S. defense contractor L3Harris, developed specifically for Western intelligence collection.Hackers’ Hands:…

|
Published on March 10, 2026
Australia age verification laws drive VPN surge online use

Key TakeawaysAustralia age verification laws trigger VPN surge: New restrictions on social media and adult content push Australians to download VPN apps.Adult platforms restrict Australian…

|
Published on March 10, 2026
hide.me VPN Introduces SSTP Support on Apple Platforms, Marking an Industry First

Key Takeawayshide.me VPN SSTP support launches on Apple devices: First VPN provider offering SSTP protocol across iOS, macOS, and tvOS platforms.Protocol designed for restrictive networks:…

|
Published on March 10, 2026

Key TakeawaysD'Zyre Youngblood, 28, was arrested in Florida for her alleged role in a government impersonation fraud ring that extorted thousands from victims.The syndicate, operated…

|
Published on March 9, 2026

Key TakeawaysPhishing Transactions: An Advocate General of the CJEU asserts that financial institutions must immediately refund customers impacted by unauthorized transactions stemming from phishing attacks.Quick…

|
Published on March 9, 2026

Key TakeawaysCVE-2026-20127: A recently disclosed Cisco Catalyst SD-WAN vulnerability is now being widely exploited, following its initial use in targeted zero-day attacks.Global Attacks: Threat actors…

|
Published on March 9, 2026

Key TakeawaysAutomation Work: Threat actors are now leveraging AI agents to automate and manage foundational cyberattack tasks, significantly increasing operational efficiency and speed.North Korean Actors:…

|
Published on March 9, 2026

Aaron Bishop – U.S. Department of Defense Aaron Bishop has been named Deputy Chief Information Officer for Cybersecurity and Chief Information Security Officer at the…

|
Published on March 9, 2026

We observed threat actors’ continued abuse of artificial intelligence, phishing, and identity impersonation using stolen credentials. Targets primarily included government systems and vulnerable individuals online. …

|
Published on March 7, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: