Recent
Cyber Risks 2026

Key Takeaways Attackers targeting systemic weakness: Concentrated cloud and productivity platforms are creating high-leverage entry points. Behavior manipulation for intrusion: Misleading security advice may be…

|
Published
Data Wiping

Key Takeaways What the DOJ says: The brothers allegedly accessed systems without authorization and deleted numerous federal databases. The indictment: The deletions affected FOIA records,…

|
Published
TunnelBear Free Changes Key Updates to Free VPN Features

Feature Shift: TunnelBear shifts advanced features to paid plans to maintain security, infrastructure, and transparency for users. Free Tier: Free users keep basic secure browsing,…

|
Published
Meta Pushes Canada for App Store Age Verification ID Laws

Parental Support: Poll shows 83% of Canadian parents want app store age verification before downloads. Privacy Risks: System-level checks could centralize user data, reducing anonymity…

|
Published
IVPN Rolls Out V2Ray Obfuscation Across All Platforms

Full Platform Support: IVPN now offers V2Ray obfuscation on Windows, macOS, Linux, iOS, Android. Censorship Bypass: V2Ray obfuscation disguises WireGuard traffic to avoid detection on…

|
Published
ExpressVPN Fastest Location Comes to Mobile & New macOS App

Fastest Location on mobile: Automatically connects users to the optimal server using real-time speed and latency checks. Redesigned mobile interface: Cleaner layout removes Smart Location…

|
Published

Key Takeaways Researchers found Codex automatically executed malicious repo configs. Attackers could plant backdoors through simple commits, compromising CI pipelines. OpenAI fixed the flaw in…

|
Published on December 2, 2025
NFC Relay Malware Surge Targets European Payment Cards

Rapid Spread: NFC malware campaigns hit Poland, Czech Republic, Russia, exploiting Android HCE for cardless payments. Malware Capabilities: Captures EMV data, manipulates POS commands, and…

|
Published on December 2, 2025
Surfshark Shares Its Key 2025 CSR Efforts for Giving Tuesday

Cybersecurity Awareness: Surfshark promoted strong encryption and shared security insights through research and workshops. Digital Rights Protection: Company supported journalists, activists, and global privacy discussions…

|
Published on December 2, 2025
Cybersecurity Job Moves(Featured) (2)

Gera Dorfman – Orca Security Gera Dorfman has been appointed Chief Product Officer at Orca Security, joining from Check Point where he served as Vice…

|
Published on December 1, 2025
Tor Introduces New CGO Encryption System to Strengthen Network Security

CGO Replaces Tor1: Tor adopts the new Tor CGO encryption system to eliminate outdated cryptographic weaknesses. Stronger Security Measures: Wide-block encryption and tag chaining block…

|
Published on December 1, 2025
Holding Phone in Hands

Key Takeaways Government mandate: India's telecoms ministry has ordered smartphone manufacturers to preload the state-owned Sanchar Saathi app on all new devices. Non-deletable requirement: A…

|
Published on December 1, 2025
Europol

Key Takeaways Service takedown: Law enforcement authorities have shut down the illegal cryptocurrency mixing service Cryptomixer. Significant seizures: The operation resulted in the seizure of…

|
Published on December 1, 2025
Coupang

Key Takeaways Massive scale: The personal data of over 33 million customers was exposed in what is being called South Korea's worst data breach in…

|
Published on December 1, 2025
Man - Table - Glowing Web - Dark Web Market - Sale

Key Takeaways U.K. conviction: A Norfolk-based dark web drug dealer has been jailed for more than six years for operating an illegal market. Drug delivery:…

|
Published on December 1, 2025
VPN Ban in Poonch Authorities Order Two-Month Suspension of Services

VPN Suspension Order: Two-month Poonch district-wide VPN ban issued under BNSS due to rising suspicious usage. Security Concerns: Authorities cite encrypted data, IP masking, and…

|
Published on December 1, 2025
Missouri’s Age-Verification Law Takes Effect What Residents Should Know

Law Activation: Missouri’s online age-verification law now active for sites with one-third harmful content. Verification Process: Users must submit ID, digital ID, or transaction data…

|
Published on December 1, 2025
Man - Laptop - Cybersecurity (1)

Cyberattacks this week underscored how inexpensively threat activity is evolving, from low-cost malicious AI to large-scale supply-chain compromises hitting npm ecosystems.  As retail infrastructure scales…

|
Published on November 29, 2025
NordVPN’s Threat Protection Pro Ranks Third in AV-Comparatives’ 2025 Anti-Phishing Test

Threat Protection Pro Performance: Achieved 90% phishing detection with zero false positives in AV-Comparatives’ 2025 test. Independent Ranking: Placed third among all tested security tools,…

|
Published on November 28, 2025

Key Takeaways Third-party breach: The security incident occurred within Mixpanel's systems, a third-party analytics provider, not within OpenAI's infrastructure. Limited data exposure: The breach exposed…

|
Published on November 28, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: