Recent

Key TakeawaysUrgency Tactic: Attackers are impersonating LastPass in emails, falsely claiming imminent maintenance to pressure users into "backing up" their vaults within 24 hours.Credential Theft:…

|
Published
Hackers - Screens - Credentials

Key TakeawaysIncident Type: The security event affecting Spanish retailer PcComponentes was a credential stuffing attack, not a direct breach of the company's internal systems.Data Source:…

|
Published
Arrest - Mobile Phone - Handcuffs - Police - Vehicle - Car

Key TakeawaysMobile Impersonation: Greek authorities have dismantled a criminal operation that used a fake mobile base station hidden in a car to send mass phishing…

|
Published
Office - Staff - Confused - Cloud

Key TakeawaysGrowing Gap: Almost 70% of organizations cite tool sprawl and visibility gaps impeding cloud security, widening the disconnect between cloud velocity and security capabilities.Confidence…

|
Published

Key TakeawaysDeceptive Tactics: Mobile-optimized phishing sites impersonate PNB MetLife to steal policyholder data and facilitate fraudulent transactions.Data Exfiltration: The malicious pages use Telegram bots to…

|
Published

Key TakeawaysSupply Chain Vulnerability: Reports indicate a critical escalation in cyber risks targeting the wholesale and retail sectors through third-party vendors.Ransomware Persistence: Ransomware remains a…

|
Published

Key TakeawaysTargeted Campaign: A cyber campaign, dubbed Operation Nomad Leopard, is actively targeting Afghan government employees with spear-phishing emails.Deceptive Lures: Decoy documents disguised as official…

|
Published

Key TakeawaysVulnerability Identified: A misconfigured GraphQL endpoint on the UStrive mentorship platform allowed authenticated users to access the private data of other users.Scope of Exposure:…

|
Published
Malicious Extension - Man

Key TakeawaysTargeted Attack: The Evelyn Stealer campaign specifically targets software developers by distributing malware through malicious Visual Studio Code (VSC) extensions.Multi-Stage Payload: The attack utilizes…

|
Published

Key TakeawaysMassive Exposure: A data breach involving the French Pass'Sport program has exposed approximately 6.4 million email addresses and sensitive personal information.Source Confirmation: While initially…

|
Published
Prompt Injection - Vulnerability - Laptop

Key TakeawaysPrompt Injection Flaw: A significant vulnerability was discovered in Google Gemini that enabled prompt injection attacks via malicious Google Calendar invites.Data Exposure Risk: The…

|
Published
Iran Flag

Key TakeawaysCommunications Disrupted: Protests that began in Tehran in late December escalated into a nationwide crisis affecting Iran’s communications infrastructure.State Response: Authorities responded with widespread…

|
Published on January 20, 2026

Key TakeawaysBroadcast Interruption: Several Iranian state television channels carried on the Badr satellite were hacked on Sunday.Protest Content Aired: The unauthorized broadcast replaced state programming…

|
Published on January 20, 2026
Surfshark Launches Post-Quantum Protection on WireGuard

Key TakeawaysSurfshark post-quantum protection: Launched on WireGuard to protect user data from future quantum computing threats.Future-ready VPN security: Uses quantum-resistant algorithms to strengthen encryption beyond…

|
Published on January 20, 2026
Hacker - Laptops - Codes

Key TakeawaysRemote Access Dominance: Remote access compromise has emerged as the leading entry point for ransomware, exploiting stolen VPN credentials and OAuth tokens.Human-Targeted Tactics: Phishing…

|
Published on January 19, 2026

Key TakeawaysNew Details: The individual who pleaded guilty to hacking into the U.S. Supreme Court's electronic filing system and other federal agencies leaked data on…

|
Published on January 19, 2026
Most Wanted

Key TakeawaysInternational Manhunt: German authorities added a Russian national to the EU's most-wanted list for his alleged role as the founder and leader of Black…

|
Published on January 19, 2026
Attackers and Defenders

Digital systems shape everyday life, often in ways people notice when something breaks. They reveal how personal data is quietly collected, traded, and used to…

|
Published on January 17, 2026
NordVPN Expands Virtual Server Network with 30 New Locations

Key TakeawaysExpanded Coverage: NordVPN virtual servers increase locations to 79, improving access, privacy, and content availability worldwide for users.Performance & Security: Virtual servers perform like…

|
Published on January 17, 2026
VeePN Chrome Extension Gets Featured on Chrome Web Store - What It Means for You

Key TakeawaysVeePN Chrome extension recognition: Featured badge confirms privacy standards, secure browsing, simple setup, and compliance with Chrome policies.Key features and privacy focus: Offers encrypted…

|
Published on January 17, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: