Recent
IPVanish VPN Network Expands Beyond 150 Locations

Key TakeawaysIPVanish VPN Network: Expanded beyond 150 global server locations with 3,400 servers and 56,000 IP addresses.RAM-Only Servers: IPVanish added nearly 1,000 RAM-only servers across…

|
Published

Key TakeawaysMassive Data Compromise: An international cybercrime operation breached nearly 30,000 customer accounts targeting a California-based online retailer.Significant Financial Impact: Threat actors executed $721,000 in…

|
Published

Key TakeawaysSupply Chain Attack: Compromised art-template package versions injected malicious loaders into web environments.Exploit Kit Delivery: The payload targets iOS Safari users via sophisticated watering-hole…

|
Published

Key TakeawaysData Exposure: Trump Mobile is currently leaking sensitive customer records, specifically mailing and email addresses, reports say.Independent Verification: High-profile purchasers of the T1 smartphone…

|
Published

Key TakeawaysMassive Data Compromise: GitHub lost 3,800 internal repositories during a targeted security incident linked to the TanStack compromise and GitHub CLI.Malicious Update Vector: A…

|
Published
huawei building

Key TakeawaysNationwide telecom outage: A zero-day vulnerability in Huawei enterprise routers reportedly disrupted Luxembourg's networks for over three hours.Undocumented router flaw: Specially crafted network traffic…

|
Published

Key TakeawaysTargeted legal action: Microsoft unsealed a legal case against Fox Tempest, a malware-signing-as-a-service operation.Infrastructure takedown execution: Authorities seized signspace.cloud, blocked underlying code repositories, and…

|
Published

Key TakeawaysAI Accelerated Exploitation: Hackers leverage artificial intelligence to shrink vulnerability response times from months to mere hours.Exploits Surpass Credentials: Vulnerability exploitation initiated 31% of…

|
Published
github

Key TakeawaysInternal access investigation: GitHub is examining reports of unauthorized access to its internal repositories.Unverified breach claims: The TeamPCP threat group alleges it compromised approximately…

|
Published

Key TakeawaysData exposure: A CISA contractor allegedly leaked AWS GovCloud keys and internal credentials via a public GitHub repository.Validated cloud access: Security researchers confirmed the…

|
Published

Key TakeawaysNew macOS Stealer: Reaper targets Apple users by spoofing major tech brands, including Apple, Microsoft, and Google, to steal credentials.Sophisticated Evasion Tactics: The malware…

|
Published

Key TakeawaysMassive data breach: Hackers compromised the records of at least 1.8 million individuals.Extended unauthorized access: Attackers accessed the network from November 2025 to February…

|
Published

Key TakeawaysOperational Disruption: Law enforcement apprehended over 200 individuals and decommissioned more than 50 malicious servers.Victimology and Suspect Profiles: The 13-nation operation identified almost 4,000…

|
Published

Key TakeawaysAttack volume drops: Total mobile attacks decreased, but unique user targeting remained stable.Banking Trojans surge: Malicious installation packages increased by half quarter-over-quarter.Emerging mobile threats:…

|
Published on May 18, 2026

Key TakeawaysRapid cloning: The first Shai-Hulud worm clones appeared days after TeamPCP released the source code.Malicious packages: Security researchers identified four malicious NPM packages with…

|
Published on May 18, 2026

Key TakeawaysIRGC propaganda: A law enforcement operation identified and disrupted the IRGC's online presence used to spread propaganda, recruit supporters, and raise funds.Operation span: The…

|
Published on May 18, 2026

Key TakeawaysConfirmed token compromise: Grafana officially disclosed that an unauthorized party accessed its GitHub environment.Codebase extortion attempt: The unnamed threat actors successfully downloaded the company's…

|
Published on May 18, 2026

Manny Ataebi – Cerby Manny Ataebi has been appointed as Chief Marketing Officer at identity security company Cerby after spending the last three years in…

|
Published on May 18, 2026

The week’s incidents show cybercrime becoming faster and quieter, with supply chain attacks targeting developer ecosystems because compromising one package can spread malware to thousands…

|
Published on May 16, 2026
Windscribe Response to Canada Bill C-22 Surveillance Law

Key TakeawaysCanada Bill C-22 surveillance law: Windscribe may exit Canada if forced to log user metadata for compliance.Industry reaction: Signal and Windscribe oppose bill, citing…

|
Published on May 16, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: