News

UK Government Considers Age Restrictions on Children’s VPN Use After Consultation

Key TakeawaysUK VPN age restriction proposal: Government may limit children's VPN access following consultation to strengthen online safety enforcement powers…

|
Published
OpenClaw

Key TakeawaysResearchers disclosed 15 vulnerabilities in OpenClaw, including one rated critical, nine high, and five marked as moderate.The findings show…

|
Published
ClickFix

Key TakeawaysNew RAT Discovered: A recent cyberattack has led to the discovery of a new, full-featured Remote Access Trojan dubbed…

|
Published
Password Code Illustration

Key TakeawaysSignificant Flaws: An academic study has systematically identified 25 distinct attack vectors targeting password recovery mechanisms in major cloud-based…

|
Published
University - Data - Lock(2)

Key TakeawaysDonor Leak: A major data breach at the University of Pennsylvania has compromised the personal information of approximately 624,000…

|
Published
X Twitter Logo

Key TakeawaysDual Disruptions: The social media platform X experienced two separate outages on Monday, affecting tens of thousands of users.Peak…

|
Published
Iran Faces Internet Shutdown Amid US Disagreement on VPN Funding

Key TakeawaysVPN Funding Dispute: US agencies clash over $10M for Iranian civilians' VPN access amidst unrest.Rising Demand: VPN users in…

|
Published
Brazilian Flag

Key TakeawaysSignificant Exposure: The APOIA.se data breach compromised the personal information of approximately 451,000 unique users.Data Leaked: Exposed data includes…

|
Published

Key TakeawaysExpanded Threat: Hudson Rock has identified a real-world incident in which an infostealer successfully exfiltrated a victim's entire OpenClaw…

|
Published

Key TakeawaysAutonomous Coding: An AI agent operating under the persona "Kai Gritun" has successfully merged pull requests into major open-source…

|
Published
Google Chrome

Key TakeawaysActive Exploitation: Google has confirmed that a high-severity Chrome 0-day vulnerability, tracked as CVE-2026-2441, is being actively exploited in…

|
Published

Jonathon Dixon – CrowdStrike Jonathon Dixon has taken on the role of vice president and managing director for the Japan…

|
Published
Google Chrome

Key TakeawaysWidespread Impact: A coordinated campaign of 30 malicious Chrome extensions, dubbed "AiFrame," has compromised over 260,000 users by posing…

|
Published on February 13, 2026
telecommunications

Key TakeawaysMassive Data Theft: Odido announced hackers stole personal data from 6.2 million customers, including personally identifiable data such as…

|
Published on February 13, 2026
Map - Control Room - Data Breaches - Email

Key TakeawaysState-Backed Exploitation: Google's latest cybersecurity report finds that government-backed hackers are using Gemini AI for reconnaissance and code support.Attack…

|
Published on February 13, 2026

Key TakeawaysConference Removal: Cybersecurity veteran Vincenzo Iozzo was removed from the review board websites of Black Hat and Code Blue…

|
Published on February 13, 2026
Windscribe Confirms Dutch Authorities Seized One of Its VPN Servers

Key TakeawaysWindscribe Seized Dutch Server: Confiscation occurred, but RAM-only setup ensures no user data or VPN logs are exposed to…

|
Published on February 13, 2026
Pixel VPN by Google Update Makes It Easier to Check Your VPN Status at a Glance

Key TakeawaysPixel VPN Quick Settings Update: Displays live connection status directly in tile, reducing taps and improving everyday usability.Version 2025.12.19.x…

|
Published on February 13, 2026
NordVPN Boosts Threat Protection Proâ„¢ with CrowdStrike Intelligence to Strengthen Online Safety

Key TakeawaysNordVPN Threat Protection Pro Update: Integrates CrowdStrike Threat Intelligence to improve malicious site, phishing, and malware detection accuracy.Enterprise-Grade Threat…

|
Published on February 13, 2026
Chat - Bot -Message - Prompt - Click

Key TakeawaysNew Threat Vector: Microsoft researchers have detected a surge in "AI Recommendation Poisoning," a technique where attackers manipulate AI…

|
Published on February 12, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: