Fastest Location on mobile: Automatically connects users to the optimal server using real-time speed and latency checks. Redesigned mobile interface: Cleaner layout removes Smart Location…
Key Takeaways Researchers found Codex automatically executed malicious repo configs. Attackers could plant backdoors through simple commits, compromising CI pipelines. OpenAI fixed the flaw in…
Cybersecurity Awareness: Surfshark promoted strong encryption and shared security insights through research and workshops. Digital Rights Protection: Company supported journalists, activists, and global privacy discussions…
Gera Dorfman – Orca Security Gera Dorfman has been appointed Chief Product Officer at Orca Security, joining from Check Point where he served as Vice…
CGO Replaces Tor1: Tor adopts the new Tor CGO encryption system to eliminate outdated cryptographic weaknesses. Stronger Security Measures: Wide-block encryption and tag chaining block…
Key Takeaways Government mandate: India's telecoms ministry has ordered smartphone manufacturers to preload the state-owned Sanchar Saathi app on all new devices. Non-deletable requirement: A…
Key Takeaways Service takedown: Law enforcement authorities have shut down the illegal cryptocurrency mixing service Cryptomixer. Significant seizures: The operation resulted in the seizure of…
Key Takeaways U.K. conviction: A Norfolk-based dark web drug dealer has been jailed for more than six years for operating an illegal market. Drug delivery:…
VPN Suspension Order: Two-month Poonch district-wide VPN ban issued under BNSS due to rising suspicious usage. Security Concerns: Authorities cite encrypted data, IP masking, and…
Law Activation: Missouri’s online age-verification law now active for sites with one-third harmful content. Verification Process: Users must submit ID, digital ID, or transaction data…
Cyberattacks this week underscored how inexpensively threat activity is evolving, from low-cost malicious AI to large-scale supply-chain compromises hitting npm ecosystems. As retail infrastructure scales…
Threat Protection Pro Performance: Achieved 90% phishing detection with zero false positives in AV-Comparatives’ 2025 test. Independent Ranking: Placed third among all tested security tools,…
Key Takeaways Third-party breach: The security incident occurred within Mixpanel's systems, a third-party analytics provider, not within OpenAI's infrastructure. Limited data exposure: The breach exposed…
Key Takeaways Target profile: Tomiris APT is targeting foreign ministries and intergovernmental and government entities, focusing on Russian speakers and Central Asian countries. Novel C2…
Key Takeaways Attack confirmed: The City of Santa Paula, a government organization in the USA, has reportedly been targeted by the Qilin ransomware group. System…
Key Takeaways New campaign: Scattered Lapsus$ Hunters is targeting Zendesk users with a sophisticated phishing campaign involving fake support sites. Phishing infrastructure: Security researchers have…
EU Proposal: EU considers under-16 social media ban after strong parliamentary backing for unified rules across Europe. Global Influence: Australia’s upcoming 2025 under-16 ban influences…
Law Activation: Takes effect Nov 30, requiring age checks for sites with 33% harmful content. Compliance Requirements: Platforms must verify users via digital IDs, government…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: