Recent
Attackers and Defenders

Digital systems shape everyday life, often in ways people notice when something breaks. They reveal how personal data is quietly collected, traded, and used to…

|
Published
NordVPN Expands Virtual Server Network with 30 New Locations

Key TakeawaysExpanded Coverage: NordVPN virtual servers increase locations to 79, improving access, privacy, and content availability worldwide for users.Performance & Security: Virtual servers perform like…

|
Published
VeePN Chrome Extension Gets Featured on Chrome Web Store - What It Means for You

Key TakeawaysVeePN Chrome extension recognition: Featured badge confirms privacy standards, secure browsing, simple setup, and compliance with Chrome policies.Key features and privacy focus: Offers encrypted…

|
Published
Grubhub

Key TakeawaysUnauthorized Access: Grubhub has officially acknowledged that unauthorized individuals accessed and downloaded data from its systems.Extortion Attempts Reported: ShinyHunters may be extorting Grubhub, threatening…

|
Published on January 16, 2026
Man holding an envelope targeted by a fishing hook, depicting phishing attack

Key TakeawaysTargeted Espionage: A Chinese-linked cyberespionage group executed a highly targeted campaign against U.S. government and policy officials.Political Lure: Emails contain Venezuela-themed phishing lures following…

|
Published on January 16, 2026
Claude

Key TakeawaysCritical Flaw: A vulnerability in Anthropic’s Cowork AI permits attackers to exfiltrate files via prompt injection without additional user approvalAPI Exploitation: The attack vector…

|
Published on January 16, 2026
Office - US Flag - Hacker - Email

Key TakeawaysProlonged Disruption: The Russell Township Police Department's email was blocked for nearly two months last year following a suspected cyber intrusion.Intrusion Indicators: Geauga County…

|
Published on January 16, 2026
ExpressVPN launches ExpressVPN for Teams to Simplify VPN Access for Organizations

Key TakeawaysExpressVPN for Teams: New platform offers centralized VPN management, bulk licenses, discounts up to 50%Admin-friendly dashboard: Enables quick user onboarding, license control, and easy…

|
Published on January 16, 2026
Ransomware Actor

Key TakeawaysUnprecedented Growth: Observed ransomware victims increased by 58% year-over-year in 2025, with a record-breaking 124 distinct threat groups tracked.Dominant Threat Groups: Qilin and Akira…

|
Published on January 15, 2026
Confused Hackers - Reading - Dictionary

Key TakeawaysDeceptive Branding: Sicarii is a new RaaS that surfaced in late 2025 with explicit Israeli and Jewish branding, despite evidence suggesting non-native Hebrew speakers.Geographic…

|
Published on January 15, 2026
Access Controls - Text Boxes - Check Boxes - Credentials - Questions Mark

Key TakeawaysCritical Vulnerabilities: Bluspark Global exposed sensitive internal data via an unauthenticated API.Impact: The vulnerability potentially granted unauthorized access to shipment records dating back to…

|
Published on January 15, 2026
Hacker - Phishing - Skull - Data

Key TakeawaysInternational Takedown: Europol and German authorities dismantled the RedVDS cybercrime-as-a-service platform with Microsoft’s help.Massive Phishing Operations: In a single month, over 2,600 RedVDS virtual…

|
Published on January 15, 2026
Target

Key TakeawaysLeak Confirmed: Current and former Target employees have confirmed that samples of leaked source code and documentation match real internal systems and projects.Git Server…

|
Published on January 14, 2026
Bank Building - Data Stream - Man

Key TakeawaysComplex Threat: Devixor is a sophisticated Android RAT that integrates financial data theft, credential harvesting, remote device control, and a ransomware module.Targeted Campaign: It…

|
Published on January 14, 2026
Malware Target

Key TakeawaysCloud-Native Design: VoidLink is a sophisticated malware framework capable of detecting and adapting to environments like AWS, Azure, and Google Cloud.Modular Architecture: Its extensive…

|
Published on January 14, 2026
JPMorgan

Key TakeawaysThird-Party Breach: JPMorgan Chase reported a data breach originating from a cybersecurity incident at the law firm Fried, Frank, Harris, Shriver & Jacobson LLP.Affected…

|
Published on January 14, 2026
US Court with Flag

Key TakeawaysGuilty Plea Expected: Nicholas Moore, 24, is scheduled to plead guilty to accessing the Supreme Court's electronic filing system without authorization.Repeated Unauthorized Access: Court…

|
Published on January 14, 2026
Server Room – IoT Router

Key TakeawaysCritical Flaw: A high-severity flaw in Broadcom chipsets allows attackers to terminate client connections on 5 GHz networks via a single over-the-air frame.Hardware Impact:…

|
Published on January 13, 2026
E-Commerce - Websites - Laptop - Shopping Cart

Key TakeawaysExtensive Campaign: A long-term, ongoing web-skimming campaign has been uncovered, targeting global e-commerce platforms.Targeted Providers: The operation explicitly targets major payment networks, including American…

|
Published on January 13, 2026
Hacker - Spy - Laptop - Data

Key TakeawaysDark Web Sale: A threat actor is offering a dataset allegedly containing 8 million Armenian government records for $2,500 on an underground forum.Government Response:…

|
Published on January 13, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: