News

Espionage Map Binoculars

Key TakeawaysSophisticated TTPs: The Evasive Panda APT utilizes advanced techniques, including DNS poisoning and adversary-in-the-middle (AitM) attacks.Geographic focus: The campaignโ€ฆ

|
Published
Angry RAT - Laptop - GitHub Repo

Key TakeawaysDeceptive distribution: The WebRAT malware is being distributed through GitHub repositories disguised as PoC exploits for high-severity flaws.Targeted audience:โ€ฆ

|
Published
Apple In-Store Logo

Key TakeawaysAntitrust penalty: Italy's competition authority fined Apple โ‚ฌ98.6 million for abusing its dominant market position through the App Trackingโ€ฆ

|
Published
DDoSia Attack Through Car

Key Takeaways Service paralysis: A suspected DDoS attack disrupted La Poste's websites and mobile apps, causing significant delays in parcelโ€ฆ

|
Published
Laptops - Online Banking - Server Racks

Key Takeaways Operation disruption: The Department of Justice seized a database containing stolen user credentials used to facilitate unauthorized bankโ€ฆ

|
Published
Google Chrome

Key Takeaways Deceptive VPN service: Two extensions, active since 2017, masquerade as a legitimate VPN service, tricking users into payingโ€ฆ

|
Published
Control Room - Radio Devices - Data Stream - Water

Key Takeaways Widespread disruption: 1,000 computer systems were compromised in a Romanian Water Agency attack, forcing a return to communicationโ€ฆ

|
Published
Cars - Office - Employee - Laptop

Key Takeaways Vendor-related breach: A server managed by Red Hat, a third-party vendor developing a customer management system for Nissan,โ€ฆ

|
Published
Windscribe Anonymous Accounts Introduce Hashed Login

Windscribe Anonymous Account: Login uses a 32-character hash, no email, username, or password required. Privacy-focused design: Reduces personal data storage,โ€ฆ

|
Published
Cybersecurity Job Moves(Featured) (5)

Vlad Korsunsky โ€“ Tenable HoldingsVlad Korsunsky has been named Chief Technology Officer and Managing Director of Tenable Israel, where heโ€ฆ

|
Published
Whatsapp Privacy Issue

Key Takeaways High impact: The NPM package lotusbail, downloaded over 56,000 times, functions as a malicious backdoor that steals WhatsAppโ€ฆ

|
Published
NordVPN and Saily Study Finds Thousands of Airline Loyalty Accounts Leaked on Dark Web

NordVPN & Saily Finds Loyalty Accounts Theft: Thousands of airline and hotel loyalty accounts sold cheaply on dark web forums.โ€ฆ

|
Published
NordVPN OpenWrt Routers Get New Headless VPN Package

NordVPN OpenWrt Routers: Headless VPN package launched in December 2025 for full-network router-level VPN protection. OpenWrt Router Support: Uses NordLynxโ€ฆ

|
Published
Good - Bad - Hand - Manipulation - Legal - Illegal

Key Takeaways Legitimate tool misuse: Nezha, a legitimate open-source server monitoring tool, is used as a full-featured RAT for post-exploitationโ€ฆ

|
Published
Man - Signals - Rays - Test - Biometric - Body Scan

Key Takeaways Polygraph examination: Acting CISA Director Madhu Gottumukkala reportedly did not pass a polygraph examination scheduled to grant himโ€ฆ

|
Published
EU Chat Control 2.0 evolves into Going Dark initiative

EU Chat Control 2.0 Update: Going Dark/ProtectEU aims to access encrypted data, potentially including VPN services. Data Retention Plans: EUโ€ฆ

|
Published
UK Childrenโ€™s Wellbeing Bill Raises Privacy and Encryption Concerns

Privacy Impact: UK Childrenโ€™s Wellbeing Bill mandates client-side scanning, potentially banning end-to-end encryption and open-source operating systems. VPN and Ageโ€ฆ

|
Published
GotaTun Rollout Marks Major WireGuard Shift at Mullvad

What GotaTun Is: Rust-based WireGuard implementation, forked from BoringTun, focused on Mullvad's performance, reliability, and privacy features. Why It Wasโ€ฆ

|
Published
Trust.Zone Christmas New Year VPN Sale

Festive Limited-Time Offer: Trust.Zone offers 2-year plan plus 1 year free, limited to 1,000 activations Discounted Add-On Features: Its add-onsโ€ฆ

|
Published
Police - Arrest - Data Steam - Hacker

Cybersecurity activity intensified across law enforcement, enterprises, and cloud environments. Authorities advanced ransomware prosecutions with arrests and cross-border extraditions whileโ€ฆ

|
Published on December 20, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: