News

Breaking Glass - Hand - Call Center - Crypto

Key Takeaways Cross-border fraud: The operation exposed multiple linked cryptocurrency platforms supported by call centres and advertising. Laundering infrastructure: Overโ€ฆ

|
Published
Cyber Risks 2026

Key Takeaways Attackers targeting systemic weakness: Concentrated cloud and productivity platforms are creating high-leverage entry points. Behavior manipulation for intrusion:โ€ฆ

|
Published
Data Wiping

Key Takeaways What the DOJ says: The brothers allegedly accessed systems without authorization and deleted numerous federal databases. The indictment:โ€ฆ

|
Published
TunnelBear Free Changes Key Updates to Free VPN Features

Feature Shift: TunnelBear shifts advanced features to paid plans to maintain security, infrastructure, and transparency for users. Free Tier: Freeโ€ฆ

|
Published
Meta Pushes Canada for App Store Age Verification ID Laws

Parental Support: Poll shows 83% of Canadian parents want app store age verification before downloads. Privacy Risks: System-level checks couldโ€ฆ

|
Published
IVPN Rolls Out V2Ray Obfuscation Across All Platforms

Full Platform Support: IVPN now offers V2Ray obfuscation on Windows, macOS, Linux, iOS, Android. Censorship Bypass: V2Ray obfuscation disguises WireGuardโ€ฆ

|
Published
ExpressVPN Fastest Location Comes to Mobile & New macOS App

Fastest Location on mobile: Automatically connects users to the optimal server using real-time speed and latency checks. Redesigned mobile interface:โ€ฆ

|
Published

Key Takeaways Researchers found Codex automatically executed malicious repo configs. Attackers could plant backdoors through simple commits, compromising CI pipelines.โ€ฆ

|
Published
NFC Relay Malware Surge Targets European Payment Cards

Rapid Spread: NFC malware campaigns hit Poland, Czech Republic, Russia, exploiting Android HCE for cardless payments. Malware Capabilities: Captures EMVโ€ฆ

|
Published
Surfshark Shares Its Key 2025 CSR Efforts for Giving Tuesday

Cybersecurity Awareness: Surfshark promoted strong encryption and shared security insights through research and workshops. Digital Rights Protection: Company supported journalists,โ€ฆ

|
Published
Cybersecurity Job Moves(Featured) (2)

Gera Dorfman โ€“ Orca Security Gera Dorfman has been appointed Chief Product Officer at Orca Security, joining from Check Pointโ€ฆ

|
Published
Tor Introduces New CGO Encryption System to Strengthen Network Security

CGO Replaces Tor1: Tor adopts the new Tor CGO encryption system to eliminate outdated cryptographic weaknesses. Stronger Security Measures: Wide-blockโ€ฆ

|
Published
Holding Phone in Hands

Key Takeaways Government mandate: India's telecoms ministry has ordered smartphone manufacturers to preload the state-owned Sanchar Saathi app on allโ€ฆ

|
Published
Europol

Key Takeaways Service takedown: Law enforcement authorities have shut down the illegal cryptocurrency mixing service Cryptomixer. Significant seizures: The operationโ€ฆ

|
Published
Coupang

Key Takeaways Massive scale: The personal data of over 33 million customers was exposed in what is being called Southโ€ฆ

|
Published
Man - Table - Glowing Web - Dark Web Market - Sale

Key Takeaways U.K. conviction: A Norfolk-based dark web drug dealer has been jailed for more than six years for operatingโ€ฆ

|
Published
VPN Ban in Poonch Authorities Order Two-Month Suspension of Services

VPN Suspension Order: Two-month Poonch district-wide VPN ban issued under BNSS due to rising suspicious usage. Security Concerns: Authorities citeโ€ฆ

|
Published
Missouriโ€™s Age-Verification Law Takes Effect What Residents Should Know

Law Activation: Missouriโ€™s online age-verification law now active for sites with one-third harmful content. Verification Process: Users must submit ID,โ€ฆ

|
Published
Man - Laptop - Cybersecurity (1)

Cyberattacks this week underscored how inexpensively threat activity is evolving, from low-cost malicious AI to large-scale supply-chain compromises hitting npmโ€ฆ

|
Published on November 29, 2025
NordVPNโ€™s Threat Protection Pro Ranks Third in AV-Comparativesโ€™ 2025 Anti-Phishing Test

Threat Protection Pro Performance: Achieved 90% phishing detection with zero false positives in AV-Comparativesโ€™ 2025 test. Independent Ranking: Placed thirdโ€ฆ

|
Published on November 28, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: