News


Key TakeawaysClickFix delivery method: The DeepLoad malware infiltrates networks by tricking users into executing malicious commands, granting attackers immediate system…

|
Published
Screen, codes, lock, break, man

Key TakeawaysAccount compromise: On March 31, 2026, an npm account compromise injected the malicious [email protected] package into Axios versions 1.14.1…

|
Published
Malicious Chrome Extensions Steal User Data Through Fake Free VPN Tools

Key TakeawaysApp Store purge: A recent Apple VPN removal rumour suggests the company has eliminated access to some applications within…

|
Published

Key TakeawaysSEC filing confirms: The CareCloud data breach compromised one electronic health record environment, enabling unauthorized network access for an…

|
Published

Key TakeawaysCritical flaw discovered: An OpenAI Codex command injection flaw facilitates a massive GitHub token compromise via malicious repository branch…

|
Published

Key TakeawaysRapid AI adoption: A report reveals that 62% of small- to mid-sized businesses actively use AI tools in their…

|
Published
Ransomware Actors

Key TakeawaysBreach allegations emerge: Claims of a Feníe Energía data breach recently emerged, reportedly exposing over 1.7 million records.Massive data…

|
Published

Wendi Sturgis – New RelicWendi Sturgis has joined New Relic’s Board of Directors, bringing more than two decades of experience…

|
Published

The pattern across this week is not about isolated incidents but the test of pressure points at scale. Attackers proved…

|
Published
Mullvad Browser Alpha Update Adopts Rapid Release Model

Key TakeawaysMullvad Browser Alpha Update: Moves to Firefox Rapid Release, enabling faster feature access but increasing potential security and stability…

|
Published
IPVanish DSAR Process Explained Access, Security Flow

Key TakeawaysIPVanish DSAR Process: Secure portal, email verification required, requests processed quickly after confirmation, often within 24 hoursVerification and Security:…

|
Published

Key TakeawaysData exposed: In March 2026, security analysts verified a massive database exposure involving a recent iteration of a notorious…

|
Published on March 27, 2026

Key TakeawaysAttack escalation: The pro-Ukrainian hacker group Bearlyfy executed over 70 cyberattacks on Russian companies, demanding substantial ransom payments.Custom payload:…

|
Published on March 27, 2026

Key TakeawaysSanctions implemented: The U.K. sanctioned fraud operators linked to an expansive criminal network, targeting Legend Innovation and the crypto…

|
Published on March 27, 2026

Key TakeawaysExtradition executed: An Armenian national was extradited to the U.S. to face federal cybercrime charges connected to RedLine malware.Malware…

|
Published on March 27, 2026

Key TakeawaysCoordinated spam attack: A massive GitHub phishing campaign utilizes repository Discussions to target developers with fraudulent software security warnings.Fake…

|
Published on March 26, 2026

Key TakeawaysOpen-source vulnerability: A severe LiteLLM malware breach infected the popular AI framework via a compromised software dependency.Credential harvesting malware:…

|
Published on March 26, 2026
Police - Hacker - Arrest - Handcuffs

Key TakeawaysSuspect apprehended: Russian authorities arrested the LeakBase admin, a prominent figure behind a major stolen credential marketplace operating since…

|
Published on March 26, 2026

Key TakeawaysArrest executed: The Gabrielle Eichert arrest addresses severe allegations of receiving and distributing sexually explicit material involving minors.Prosecution: The…

|
Published on March 26, 2026
Two men in prison

Key TakeawaysPrison sentence issued: A Russian cybercriminal was sentenced to 24 months in prison and fined $1.6 million for managing…

|
Published on March 25, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: