CGO Replaces Tor1: Tor adopts the new Tor CGO encryption system to eliminate outdated cryptographic weaknesses. Stronger Security Measures: Wide-blockโฆ
Key Takeaways Government mandate: India's telecoms ministry has ordered smartphone manufacturers to preload the state-owned Sanchar Saathi app on allโฆ
Key Takeaways Service takedown: Law enforcement authorities have shut down the illegal cryptocurrency mixing service Cryptomixer. Significant seizures: The operationโฆ
Law Activation: Missouriโs online age-verification law now active for sites with one-third harmful content. Verification Process: Users must submit ID,โฆ
Cyberattacks this week underscored how inexpensively threat activity is evolving, from low-cost malicious AI to large-scale supply-chain compromises hitting npmโฆ
Threat Protection Pro Performance: Achieved 90% phishing detection with zero false positives in AV-Comparativesโ 2025 test. Independent Ranking: Placed thirdโฆ
Key Takeaways Third-party breach: The security incident occurred within Mixpanel's systems, a third-party analytics provider, not within OpenAI's infrastructure. Limitedโฆ
Key Takeaways Target profile: Tomiris APT is targeting foreign ministries and intergovernmental and government entities, focusing on Russian speakers andโฆ
Key Takeaways New campaign: Scattered Lapsus$ Hunters is targeting Zendesk users with a sophisticated phishing campaign involving fake support sites.โฆ
EU Proposal: EU considers under-16 social media ban after strong parliamentary backing for unified rules across Europe. Global Influence: Australiaโsโฆ
Key Takeaways New threat: A Mirai-based botnet variant, ShadowV2, is actively exploiting multiple vulnerabilities to compromise IoT devices. Widespread exploitation:โฆ
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: