News


Key TakeawaysLast Sentencing: The last co-defendant in a darknet drug distribution case has been sentenced to 57 months in federal…

|
Published
Cryptojacking

Key TakeawaysSophisticated Deception: Scammers deployed a custom AI chatbot impersonating Google's Gemini assistant to aggressively market a non-existent cryptocurrency called…

|
Published
Hacker - Iran - Protest

Key TakeawaysNew Malware: A cyberespionage campaign targeting supporters of Iranian protests is deploying a previously undocumented malware strain designated CRESCENTHARVEST.Attack…

|
Published
Police - Hacker - Arrest - Handcuffs

Key TakeawaysKey Arrest: Polish police have detained a 47-year-old man in the Małopolska region for his alleged involvement with the…

|
Published

Key TakeawaysHigh-Profile Target: Prominent Angolan journalist Teixeira Candido had his phone infected with Predator spyware in May 2024, according to…

|
Published
passport

Key TakeawaysHigh-Profile Exposure: An ADFW data leak exposed personal data of global figures, including former British Prime Minister David Cameron…

|
Published
Spain Court Orders ProtonVPN and NordVPN Blocks During LaLiga Matches, Raising Concerns for Users

Key TakeawaysVPN blocking Spain ruling: Court ordered ProtonVPN and NordVPN temporary suspension during LaLiga matches to prevent piracy access attempts.Limited…

|
Published
UK Government Considers Age Restrictions on Children’s VPN Use After Consultation

Key TakeawaysUK VPN age restriction proposal: Government may limit children's VPN access following consultation to strengthen online safety enforcement powers…

|
Published
OpenClaw

Key TakeawaysResearchers disclosed 15 vulnerabilities in OpenClaw, including one rated critical, nine high, and five marked as moderate.The findings show…

|
Published
ClickFix

Key TakeawaysNew RAT Discovered: A recent cyberattack has led to the discovery of a new, full-featured Remote Access Trojan dubbed…

|
Published
Password Code Illustration

Key TakeawaysSignificant Flaws: An academic study has systematically identified 25 distinct attack vectors targeting password recovery mechanisms in major cloud-based…

|
Published
University - Data - Lock(2)

Key TakeawaysDonor Leak: A major data breach at the University of Pennsylvania has compromised the personal information of approximately 624,000…

|
Published
X Twitter Logo

Key TakeawaysDual Disruptions: The social media platform X experienced two separate outages on Monday, affecting tens of thousands of users.Peak…

|
Published
Iran Faces Internet Shutdown Amid US Disagreement on VPN Funding

Key TakeawaysVPN Funding Dispute: US agencies clash over $10M for Iranian civilians' VPN access amidst unrest.Rising Demand: VPN users in…

|
Published
Brazilian Flag

Key TakeawaysSignificant Exposure: The APOIA.se data breach compromised the personal information of approximately 451,000 unique users.Data Leaked: Exposed data includes…

|
Published

Key TakeawaysExpanded Threat: Hudson Rock has identified a real-world incident in which an infostealer successfully exfiltrated a victim's entire OpenClaw…

|
Published

Key TakeawaysAutonomous Coding: An AI agent operating under the persona "Kai Gritun" has successfully merged pull requests into major open-source…

|
Published
Google Chrome

Key TakeawaysActive Exploitation: Google has confirmed that a high-severity Chrome 0-day vulnerability, tracked as CVE-2026-2441, is being actively exploited in…

|
Published

Jonathon Dixon – CrowdStrike Jonathon Dixon has taken on the role of vice president and managing director for the Japan…

|
Published
Google Chrome

Key TakeawaysWidespread Impact: A coordinated campaign of 30 malicious Chrome extensions, dubbed "AiFrame," has compromised over 260,000 users by posing…

|
Published on February 13, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: