CGO Replaces Tor1: Tor adopts the new Tor CGO encryption system to eliminate outdated cryptographic weaknesses. Stronger Security Measures: Wide-block…
Key Takeaways Government mandate: India's telecoms ministry has ordered smartphone manufacturers to preload the state-owned Sanchar Saathi app on all…
Key Takeaways Service takedown: Law enforcement authorities have shut down the illegal cryptocurrency mixing service Cryptomixer. Significant seizures: The operation…
Law Activation: Missouri’s online age-verification law now active for sites with one-third harmful content. Verification Process: Users must submit ID,…
Cyberattacks this week underscored how inexpensively threat activity is evolving, from low-cost malicious AI to large-scale supply-chain compromises hitting npm…
Threat Protection Pro Performance: Achieved 90% phishing detection with zero false positives in AV-Comparatives’ 2025 test. Independent Ranking: Placed third…
Key Takeaways Third-party breach: The security incident occurred within Mixpanel's systems, a third-party analytics provider, not within OpenAI's infrastructure. Limited…
Key Takeaways Target profile: Tomiris APT is targeting foreign ministries and intergovernmental and government entities, focusing on Russian speakers and…
Key Takeaways New campaign: Scattered Lapsus$ Hunters is targeting Zendesk users with a sophisticated phishing campaign involving fake support sites.…
EU Proposal: EU considers under-16 social media ban after strong parliamentary backing for unified rules across Europe. Global Influence: Australia’s…
Key Takeaways New threat: A Mirai-based botnet variant, ShadowV2, is actively exploiting multiple vulnerabilities to compromise IoT devices. Widespread exploitation:…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: