Recent
Australia Map - Network - Com Towers

Key Takeaways Official warning: Australia's spy chief said that Chinese state-sponsored hackers are actively probing telecommunications networks and critical infrastructure. Economic impact: Espionage activities are…

|
Published
Phone - Message - Temu Support

Key Takeaways Suspicious accounts: Multiple unofficial accounts on the social media platform X have been identified posing as official Temu customer support. Data collection: These…

|
Published
Server Room - Police Tape - Tor

Key Takeaways Infrastructure offline: The infrastructure supporting the Rhadamanthys Infostealer, including its official TOR website, has been rendered inaccessible. Law enforcement: Internal communications among threat…

|
Published
Italy Enforces Online Age Checks, VPN Use Still Legal

Age Verification Starts: Italy mandates adult sites to verify users are 18+ from November 12, 2025. Website Restrictions: Adult sites must not promote or mention…

|
Published
GitHub

Key Takeaways Widespread leaks: A security analysis revealed that 65% of the private companies listed on the Forbes AI 50 have leaked sensitive data on…

|
Published
AI, Robot, Content

Key Takeaways New vulnerability: A side-channel attack named "Whisper Leak" can infer the topics of encrypted Large Language Model conversations. Attack method: It analyzes patterns…

|
Published

Key Takeaways Malware return: The DanaBot banking malware has reemerged with a new variant six months after its takedown in May 2025. Infrastructure rebuilt: The…

|
Published
vulnerability

Key Takeaways Vulnerability exploited: A critical vulnerability in the Triofox file-sharing solution is being actively exploited by threat actors for remote access. Novel attack vector:…

|
Published
cyberespionage

Key Takeaways Targeted operations: xHunt continues its cyber espionage, primarily targeting shipping, transportation, and government entities in Kuwait. Custom toolkit: The group uses a unique,…

|
Published
Surfshark Highlights Cybersecurity and Data Research at 2025 IPI Congress

Global Journalism Event: The IPI 2025 Congress in Vienna focused on press freedom and media innovation worldwide. Surfshark Sessions: Presented research hub insights and live…

|
Published
UK Regulator Ofcom Monitors VPN Use Following Online Safety Act

VPN Monitoring: Ofcom tracks UK VPN usage using an AI-enabled third-party tool, raising privacy questions. Purpose: Monitoring aims to assess Online Safety Act effectiveness, especially…

|
Published
Google Issues Critical VPN Threat Warning for Billions of Users

Critical Alert: Google warns billions about fake VPN apps stealing personal and login data. User Risk: Malicious VPNs may compromise privacy instead of protecting sensitive…

|
Published
Cybersecurity Job Moves

Matthew Cowell – Nozomi NetworksFormer Dragos executive Matthew Cowell has joined Nozomi Networks as Vice President of Strategic Alliances. He will lead cybersecurity-focused partnerships and…

|
Published
Application-bound encryption bypassed

Key Takeaways Vulnerability disclosure: Three new high-severity flaws have been found in runC, the universal container runtime used by Docker and Kubernetes. Potential impact: They…

|
Published
Bank, Lock, Security

Key Takeaways Threat actor claim: An entity known as BreachParty claims it has compromised Banco Santander and is selling its data. Data scope: The actor…

|
Published
Crypto Coins

Key Takeaways Unexpected return: The domain for the popular torrent site TorrentGalaxy has unexpectedly become active again. New purpose: Instead of hosting torrents, the site…

|
Published
Earth - Mic - Web - Hacker - Codes

This week’s cyber landscape underscored an escalating clash between advanced criminal alliances and coordinated law enforcement responses. While the week centered on digital and data-driven…

|
Published on November 8, 2025
Wisconsin Bill Seeks VPN Ban, Age Checks on Adult Sites

VPN Ban Proposal: Wisconsin lawmakers propose restricting VPN use on adult websites for age verification. Privacy Concerns: Critics warn the law could expose user data…

|
Published on November 7, 2025
Malware Target

Key Takeaways Packages compromised: A threat cluster tracked as MUT-4831 published 17 trojanized npm packages masquerading as legitimate SDKs. Payload delivery: The packages execute a…

|
Published on November 7, 2025
Mullvad's Leta Search Proxy to Shut Down on November 27, 2025

Shutdown Date: Leta, the privacy-focused search proxy, will officially close operations on November 27, 2025. Reason: Ongoing industry changes make Leta’s privacy model less effective…

|
Published on November 7, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: