Recent

Key TakeawaysHigh-Profile Target: Prominent Angolan journalist Teixeira Candido had his phone infected with Predator spyware in May 2024, according to a report from Amnesty International.Attack…

|
Published
passport

Key TakeawaysHigh-Profile Exposure: An ADFW data leak exposed personal data of global figures, including former British Prime Minister David Cameron and hedge fund billionaire Alan…

|
Published
Spain Court Orders ProtonVPN and NordVPN Blocks During LaLiga Matches, Raising Concerns for Users

Key TakeawaysVPN blocking Spain ruling: Court ordered ProtonVPN and NordVPN temporary suspension during LaLiga matches to prevent piracy access attempts.Limited scope and enforcement: Block applies…

|
Published
UK Government Considers Age Restrictions on Children’s VPN Use After Consultation

Key TakeawaysUK VPN age restriction proposal: Government may limit children's VPN access following consultation to strengthen online safety enforcement powers nationwide.New legislative powers planned: Amendments…

|
Published
OpenClaw

Key TakeawaysResearchers disclosed 15 vulnerabilities in OpenClaw, including one rated critical, nine high, and five marked as moderate.The findings show that integration layers, not just…

|
Published
ClickFix

Key TakeawaysNew RAT Discovered: A recent cyberattack has led to the discovery of a new, full-featured Remote Access Trojan dubbed AstarionRAT.Complex Attack Chain: The intrusion…

|
Published
Password Code Illustration

Key TakeawaysSignificant Flaws: An academic study has systematically identified 25 distinct attack vectors targeting password recovery mechanisms in major cloud-based password managers.Vulnerability Target: Vulnerabilities were…

|
Published
University - Data - Lock(2)

Key TakeawaysDonor Leak: A major data breach at the University of Pennsylvania has compromised the personal information of approximately 624,000 individuals, including donors.Sensitive Information Disclosed:…

|
Published
X Twitter Logo

Key TakeawaysDual Disruptions: The social media platform X experienced two separate outages on Monday, affecting tens of thousands of users.Peak Reports: The first outage saw…

|
Published
Iran Faces Internet Shutdown Amid US Disagreement on VPN Funding

Key TakeawaysVPN Funding Dispute: US agencies clash over $10M for Iranian civilians' VPN access amidst unrest.Rising Demand: VPN users in Iran surged from 7.5M to…

|
Published
Brazilian Flag

Key TakeawaysSignificant Exposure: The APOIA.se data breach compromised the personal information of approximately 451,000 unique users.Data Leaked: Exposed data includes names, email addresses, and physical…

|
Published

Key TakeawaysExpanded Threat: Hudson Rock has identified a real-world incident in which an infostealer successfully exfiltrated a victim's entire OpenClaw configuration environment.Total Compromise: The stolen…

|
Published

Key TakeawaysAutonomous Coding: An AI agent operating under the persona "Kai Gritun" has successfully merged pull requests into major open-source projects like Nx and ESLint…

|
Published
Google Chrome

Key TakeawaysActive Exploitation: Google has confirmed that a high-severity Chrome 0-day vulnerability, tracked as CVE-2026-2441, is being actively exploited in the wild.Vulnerability Type: The flaw…

|
Published

Jonathon Dixon – CrowdStrike Jonathon Dixon has taken on the role of vice president and managing director for the Japan and Asia Pacific (JAPAC) theater…

|
Published
Google Chrome

Key TakeawaysWidespread Impact: A coordinated campaign of 30 malicious Chrome extensions, dubbed "AiFrame," has compromised over 260,000 users by posing as legitimate AI tools.Attack Mechanism:…

|
Published on February 13, 2026
telecommunications

Key TakeawaysMassive Data Theft: Odido announced hackers stole personal data from 6.2 million customers, including personally identifiable data such as names, addresses, bank account numbers,…

|
Published on February 13, 2026
Map - Control Room - Data Breaches - Email

Key TakeawaysState-Backed Exploitation: Google's latest cybersecurity report finds that government-backed hackers are using Gemini AI for reconnaissance and code support.Attack Tactics: Threat actors used the…

|
Published on February 13, 2026

Key TakeawaysConference Removal: Cybersecurity veteran Vincenzo Iozzo was removed from the review board websites of Black Hat and Code Blue following revelations of his ties…

|
Published on February 13, 2026
Windscribe Confirms Dutch Authorities Seized One of Its VPN Servers

Key TakeawaysWindscribe Seized Dutch Server: Confiscation occurred, but RAM-only setup ensures no user data or VPN logs are exposed to authorities.RAM-Only Architecture Protects Privacy: Volatile…

|
Published on February 13, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: