Recent
hide.me VPN Introduces SSTP Support on Apple Platforms, Marking an Industry First

Key Takeawayshide.me VPN SSTP support launches on Apple devices: First VPN provider offering SSTP protocol across iOS, macOS, and tvOS platforms.Protocol designed for restrictive networks:…

|
Published

Key TakeawaysD'Zyre Youngblood, 28, was arrested in Florida for her alleged role in a government impersonation fraud ring that extorted thousands from victims.The syndicate, operated…

|
Published

Key TakeawaysPhishing Transactions: An Advocate General of the CJEU asserts that financial institutions must immediately refund customers impacted by unauthorized transactions stemming from phishing attacks.Quick…

|
Published

Key TakeawaysCVE-2026-20127: A recently disclosed Cisco Catalyst SD-WAN vulnerability is now being widely exploited, following its initial use in targeted zero-day attacks.Global Attacks: Threat actors…

|
Published

Key TakeawaysAutomation Work: Threat actors are now leveraging AI agents to automate and manage foundational cyberattack tasks, significantly increasing operational efficiency and speed.North Korean Actors:…

|
Published

Aaron Bishop – U.S. Department of Defense Aaron Bishop has been named Deputy Chief Information Officer for Cybersecurity and Chief Information Security Officer at the…

|
Published

We observed threat actors’ continued abuse of artificial intelligence, phishing, and identity impersonation using stolen credentials. Targets primarily included government systems and vulnerable individuals online. …

|
Published on March 7, 2026
GotaTun Security Audit Finds No Major Issues, Minor Fixes Made

Key TakeawaysGotaTun security audit findings: Independent review found no major vulnerabilities in GotaTun v0.2.0 during January–February 2026 security assessment.Low-severity issues identified: Audit highlighted predictable session…

|
Published on March 7, 2026

Key TakeawaysExploitation Charges: Zobaidul Amin, a Bangladeshi national, is making his initial court appearance in Alaska for operating an international child exploitation enterprise.Minors Abused: Amin…

|
Published on March 6, 2026

Key TakeawaysCrypto Theft: The FBI arrested a suspect for stealing $46 million in cryptocurrency linked to the 2016 Bitfinex hack.Government Funds: The individual allegedly diverted…

|
Published on March 6, 2026

Key TakeawaysPotential Compromise: The FBI has acknowledged identifying and addressing suspicious activity on its internal networks.Sensitive System: Reports suggest the activity targeted a sensitive network…

|
Published on March 6, 2026

Key TakeawaysPersistent Presence: Iranian cyber group MuddyWater infiltrated multiple U.S. and Israeli networks, maintaining persistent access since at least early February 2026.New Backdoor: Attackers deployed…

|
Published on March 6, 2026
ExpressVPN Launches First VPN MCP Server, Allowing AI Tools to Control VPN Connections

QUICK ANSWERExpressVPN MCP server launch: ExpressVPN launches first VPN MCP server enabling AI tools to manage VPN status, switch regions, and run diagnostics locally.AI integration…

|
Published on March 6, 2026

Key TakeawaysGuilty Plea: Evgenii Ptitsyn pled guilty to wire fraud in connection with his role as an administrator for the global Phobos ransomware network.Ransomware Revenue:…

|
Published on March 5, 2026
PureVPN Network Expansion 40+ New Server Locations to Improve Global Connectivity

QUICK ANSWERPureVPN Network Expansion: Added 40+ global servers improving speed, stability, and regional connectivity for all users.Improved Latency and Stability: Shorter routing paths and distributed…

|
Published on March 5, 2026

Key TakeawaysOfficial Inquiry: The UK's Information Commissioner's Office (ICO) is formally contacting Meta regarding significant data privacy concerns linked to its AI-powered smart glasses.Intimate Data…

|
Published on March 5, 2026

Key TakeawaysCoordinated Campaign: Almost 150 hacktivist-led Distributed Denial-of-Service attacks have targeted 110 distinct organizations across 16 countries.Critical Sector Focus: Twelve threat groups primarily focused on…

|
Published on March 5, 2026

Key TakeawaysPlatform Disruption: International law enforcement successfully executed a coordinated global cybercrime operation to completely shut down LeakBase, a massive illicit data repository.User Deanonymization: Authorities…

|
Published on March 5, 2026

Key TakeawaysMassive Scale: The open-source CyberStrikeAI framework orchestrated over 600 unauthorized network intrusions spanning 55 countries.Targeted Infrastructure: Threat actors specifically compromised FortiGate appliances utilizing 21…

|
Published on March 4, 2026

Key TakeawaysSurveillance Compromise: Suspected Iran-nexus threat actors are actively exploiting exposed network cameras, possibly for real-time assessments of battle damage.Targeted Hardware: The campaign targets known…

|
Published on March 4, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: