Recent
Laptop - Skull - Kraken - Octopus - Lock

Key Takeaways Origins and tactics: Kraken, which emerged in February 2025, is a Russian-speaking double extortion operation linked to the former HelloKitty ransomware cartel. Cross-platform…

|
Published
Man holding an envelope targeted by a fishing hook, depicting phishing attack

Key Takeaways Targeting Italy: A large-scale phishing campaign is actively targeting customers of Aruba S.p.A., one of Italy's largest web hosting providers. Sophisticated toolkit: The…

|
Published
Telegram Challenges Australia’s Online Safety Law

Legal Challenge: Telegram disputes eSafety Commissioner authority and nearly A$1 million fine over compliance. Age Verification: New Australian rules may require sensitive personal data for…

|
Published
Pakistan Launches Official VPN Licensing for Local Providers

VPN Licensing Restart: Pakistan approves five local companies to offer regulated, lawful VPN services to citizens. User Impact: Licensed VPNs don’t require personal IP registration;…

|
Published
ExpressVPN Partners With Brooklyn Nets for Digital Privacy

Partnership Announcement: ExpressVPN becomes the Brooklyn Nets’ Official Digital Privacy Partner with arena-wide visibility. New Server Launch: Company adds a Brooklyn server to improve speeds,…

|
Published
Holiday - Shopping - Mobile Phone

Key Takeaways Phishing spike: Mobile phishing campaigns increase by up to 4x during the holiday shopping season, often impersonating retail and shipping brands. Malware evolution:…

|
Published
Op Endgame - Bulldozer - Operator - Grid - Servers

Key Takeaways Massive takedown: Over 1,000 servers used by the Rhadamanthys, VenomRAT, and Elysium malware operations were dismantled. Arrests and seizures: The November action resulted…

|
Published on November 13, 2025
Border - Checkpoint - Fence - Wire Frames

Key Takeaways New sanctions: The U.S. Treasury has sanctioned the Democratic Karen Benevolent Army (DKBA), a Burmese armed group, for its involvement in cyber scam…

|
Published on November 13, 2025
EU Parliament - Shield - Deepfake - EU Flag

Key Takeaways New strategy: The EC has launched the European Democracy Shield to combat foreign interference and promote democratic values. Platform and influencer role: The…

|
Published on November 13, 2025
CISCO

Key Takeaways Zero-day exploit: Amazon's threat intelligence team discovered an APT exploiting previously undisclosed zero-day vulnerabilities in Cisco and Citrix systems. Vulnerabilities identified: The targeted…

|
Published on November 13, 2025
Lightweight WireGuard Obfuscation Now Available on Mullvad VPN

New Feature: Mullvad launches Lightweight WireGuard Obfuscation to bypass censorship and blocked VPN traffic. Availability: Available on desktop and Android; iOS support coming in a…

|
Published on November 13, 2025
Network Map - Grid - AI - Risk - Employee

Key Takeaways Pervasive AI adoption: Two-thirds of new enterprise applications now include AI components, significantly expanding the corporate attack surface. Shadow AI proliferation: The same…

|
Published on November 12, 2025
U.S. - China - Bitcoin - Scales of Justice

Key Takeaways U.S. seizure: The U.S. DoJ has seized over 127,000 Bitcoin linked to the chairman of the Prince Group, who is indicted for operating…

|
Published on November 12, 2025
Australia Map - Network - Com Towers

Key Takeaways Official warning: Australia's spy chief said that Chinese state-sponsored hackers are actively probing telecommunications networks and critical infrastructure. Economic impact: Espionage activities are…

|
Published on November 12, 2025
Phone - Message - Temu Support

Key Takeaways Suspicious accounts: Multiple unofficial accounts on the social media platform X have been identified posing as official Temu customer support. Data collection: These…

|
Published on November 12, 2025
Server Room - Police Tape - Tor

Key Takeaways Infrastructure offline: The infrastructure supporting the Rhadamanthys Infostealer, including its official TOR website, has been rendered inaccessible. Law enforcement: Internal communications among threat…

|
Published on November 12, 2025
Italy Enforces Online Age Checks, VPN Use Still Legal

Age Verification Starts: Italy mandates adult sites to verify users are 18+ from November 12, 2025. Website Restrictions: Adult sites must not promote or mention…

|
Published on November 12, 2025
GitHub

Key Takeaways Widespread leaks: A security analysis revealed that 65% of the private companies listed on the Forbes AI 50 have leaked sensitive data on…

|
Published on November 11, 2025
AI, Robot, Content

Key Takeaways New vulnerability: A side-channel attack named "Whisper Leak" can infer the topics of encrypted Large Language Model conversations. Attack method: It analyzes patterns…

|
Published on November 11, 2025

Key Takeaways Malware return: The DanaBot banking malware has reemerged with a new variant six months after its takedown in May 2025. Infrastructure rebuilt: The…

|
Published on November 11, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: