Recent

Key TakeawaysCritical infrastructure compromise: The KelpDAO incident resulted in the unauthorized extraction of over $290 million in rsETH tokens from the decentralized finance (DeFi) protocol.Advanced…

|
Published

Key TakeawaysServer targeted: A massive Mastodon DDoS attack hit the platform's flagship server, causing a temporary “mastodon.social” outage and error messages early Monday.Limited impact: Because…

|
Published

Key TakeawaysIdeological framework: The Palantir mini-manifesto summarizes CEO Alex Karp's book, defending Western technological superiority and aggressive military artificial intelligence integration.Corporate philosophy: The document sharply…

|
Published

Key TakeawaysSystem outages: More than 18 months later, the NHS ransomware attack continues to cause severe cyberattack healthcare disruption across South East London hospitals.Pathology delays:…

|
Published
NordVPN 100 Tbps milestone highlights network capacity

Key TakeawaysNordVPN 100 Tbps milestone: NordVPN surpasses 100 Tbps capacity across 211 locations in 135 countries globallyPerformance strategy: Network runs at one-third load to prevent…

|
Published

Key TakeawaysWorkspace takeover: A recent Context AI compromise enabled unauthorized threat actors to gain administrative access to Google Workspace environments at Vercel.Limited exposure: The security…

|
Published

Steve Springett – Artiphishell Steve Springett has joined Artiphishell as an advisor. He is widely known for his work in software supply chain security, including…

|
Published

Recent incidents point to a spread across consumer platforms, financial systems, critical infrastructure, and workplace environments rather than a single dominant target. Personal data exposure…

|
Published on April 18, 2026
Cryptojacking

Key TakeawaysOperations suspended: The Grinex exchange halted all platform services after unauthorized actors reportedly extracted 1 billion roubles from its digital reserves.State involvement alleged: Grinex…

|
Published on April 17, 2026

Key TakeawaysTargeted infrastructure: ZionSiphon malware specifically seeks out Israeli water systems, focusing on desalination plants and wastewater treatment facilities.Sabotage capabilities: The OT malware attempts to…

|
Published on April 17, 2026

Key TakeawaysUnauthorized access detected: Zara owner Inditex reported a breach affecting databases hosted by a third party that contain customer transaction records.Sensitive information secured: The…

|
Published on April 17, 2026

Key TakeawaysGlobal enforcement action: Operation PowerOFF united 21 countries to dismantle illegal infrastructure supporting dangerous DDoS-for-hire services globally.Massive user targeting: Authorities targeted over 75,000 criminal…

|
Published on April 17, 2026

Key TakeawaysNew Jersey sentencing: Two men received significant federal prison terms for orchestrating a North Korea WMD funding scheme.Stolen identities exploited: The operation utilized compromised…

|
Published on April 16, 2026

Key TakeawaysTargeted infrastructure: Russian hackers attempted a highly disruptive network breach against a Swedish thermal power plant in early 2025.Security mechanisms: Built-in protective network protocols…

|
Published on April 16, 2026
Email Scammers

Key TakeawaysMassive data breach: A Russian hacking campaign compromised hundreds of email inboxes between September 2024 and March 2026.Security infrastructure failure: Cybersec researchers discovered the…

|
Published on April 16, 2026
Meta 3D Logo

Key TakeawaysClass action approved: A Milan court authorized a Meta Platforms class action initiated by the CTCU consumer association over a massive data scraping lawsuit.Millions…

|
Published on April 15, 2026
cybercrime_report

Key TakeawaysShared attack vectors: Adversaries consistently leverage unpatched software vulnerabilities and compromised identity credentials to penetrate enterprise networks.Geopolitical threat motivations: China's cyber espionage and Russia's…

|
Published on April 15, 2026
WordPress Logo

Key TakeawaysSupply chain attack: A malicious actor acquired the WordPress Essential Plugin and deployed a backdoor that affected over 20,000 active websites.Essential Plugin malware: The…

|
Published on April 15, 2026
Skull formed by binary code in a red background with floating binary code

Key TakeawaysSupply chain risk: An unregistered update domain exposed over 25,000 endpoints to potential supply chain attacks before security researchers intervened.AV killer malware: The Dragon…

|
Published on April 15, 2026

Key TakeawaysData breach confirmed: A massive data leak has exposed millions of internal records belonging to the premier video game publisher Rockstar Games.Third-party compromise: Attackers…

|
Published on April 14, 2026
Best VPN for Windows
Best Free VPNs for Windows

|
Last updated April 18, 2026
Best Fastest VPN

|
Last updated April 11, 2026
Featured - Best VPN for Australia

|
Last updated April 4, 2026
Best VPN for USA - Featured

|
Last updated March 28, 2026
Best VPN for the UK concept with UK map and secure VPN protection illustration

|
Last updated March 27, 2026
Best VPN for iPhone iPad Featured

|
Last updated March 18, 2026
Best VPN for Android Featured

|
Last updated March 12, 2026
Best VPN for BetMGM

|
Last updated February 23, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: