Recent

Key TakeawaysLNK file attacks: Recent Democratic People's Republic of Korea (DPRK) cyber campaigns utilize malicious LNK files containing encoded PowerShell scripts to infiltrate systems and…

|
Published on April 2, 2026

Key TakeawaysiOS 18.7.7 update: Apple deployed emergency patches for older iPhones and iPads to neutralize critical vulnerabilities tied to a leaked exploitation toolkit.DarkSword attacks: The…

|
Published on April 2, 2026

Key TakeawaysAlleged breach impact: Cisco faces intense scrutiny following reports of a significant internal network intrusion that may have exposed 3 million Salesforce records.Trivy vulnerability…

|
Published on April 2, 2026

Key TakeawaysLi Xiong extradition: Cambodian authorities transferred the former Huione Group chairman to China on charges of alleged leadership of transnational fraud networks.Huione Group cyber…

|
Published on April 2, 2026

Key TakeawaysFake app: WhatsApp alerted approximately 200 users, primarily located in Italy, about downloading a malicious iOS application disguised as the official messaging platform.SIO spyware…

|
Published on April 2, 2026

Key TakeawaysAttribution confirmed: Google Threat Intelligence Group attributes the Axios supply chain attack to North Korea-linked hackers, specifically the threat actor UNC1069.Account hijacked: An npm…

|
Published on April 1, 2026

Key TakeawaysSyndicate scale exposed: Strike Force Carieville uncovered a dark net drug syndicate that facilitated an $80 million drug supply operation over eight years.Recent target…

|
Published on April 1, 2026

Key TakeawaysTargeted regions affected: A suspected Iran-nexus password spray campaign primarily impacts Microsoft 365 tenants across Israel and the UAE, specifically focusing on municipal sectors.Password…

|
Published on April 1, 2026
Proton VPN server expansion reaches five new countries

Key TakeawaysProton VPN server expansion: Proton VPN server expansion adds five countries improving access speed privacy and regional connectivity for usersUser driven infrastructure growth: Expansion…

|
Published on April 1, 2026
Russia VPN Crackdown Plans Expand Internet Control Measures

Key TakeawaysRussia VPN crackdown plans: Russia VPN crackdown plans include limiting usage increasing costs and restricting platform access for usersGovernment and tech involvement: Authorities push…

|
Published on April 1, 2026
IPVanish Introduces Threat Protection Pro for Always-On Device Security

Key TakeawaysIPVanish Threat Protection Pro launch: IPVanish Threat Protection Pro adds always on security blocking malware phishing ads trackers without VPN connectionAdvanced real time threat…

|
Published on April 1, 2026

Key TakeawaysStartup breached: The Mercor cyberattack exposed sensitive corporate data following a severe supply chain intrusion by extortionist hacking syndicates.LiteLLM project compromise: Threat actors successfully…

|
Published on April 1, 2026
ExpressVPN Introduces ExpressAI, a Privacy-Focused AI Platform

Key TakeawaysExpressAI privacy-focused AI platform: ExpressAI privacy-focused AI platform ensures zero access encryption no training and secure confidential computing interactionsConfidential computing architecture: Platform isolates user…

|
Published on April 1, 2026
ExpressVPN Expands Beyond VPN with New All-in-One Security Suite

Key TakeawaysExpressVPN security suite expansion: ExpressVPN security suite expands VPN into five tools covering identity data AI communication and credentialsShift beyond traditional VPN: Company addresses…

|
Published on April 1, 2026

Key TakeawaysClickFix delivery method: The DeepLoad malware infiltrates networks by tricking users into executing malicious commands, granting attackers immediate system access.AI-generated evasion: The payload bypasses…

|
Published on March 31, 2026
Screen, codes, lock, break, man

Key TakeawaysAccount compromise: On March 31, 2026, an npm account compromise injected the malicious [email protected] package into Axios versions 1.14.1 and 0.30.4.Cross-platform RAT: The injected…

|
Published on March 31, 2026
Malicious Chrome Extensions Steal User Data Through Fake Free VPN Tools

Key TakeawaysApp Store purge: A recent Apple VPN removal rumour suggests the company has eliminated access to some applications within the Russian digital market.Messaging platform…

|
Published on March 31, 2026

Key TakeawaysSEC filing confirms: The CareCloud data breach compromised one electronic health record environment, enabling unauthorized network access for an eight-hour window.Patient data exposure: Security…

|
Published on March 31, 2026

Key TakeawaysCritical flaw discovered: An OpenAI Codex command injection flaw facilitates a massive GitHub token compromise via malicious repository branch names.Command injection executed: The severe…

|
Published on March 30, 2026

Key TakeawaysRapid AI adoption: A report reveals that 62% of small- to mid-sized businesses actively use AI tools in their daily operational workflows.Nuanced Perspective: Employees…

|
Published on March 30, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: