News

School Auditorium

Key TakeawaysIncident Confirmation: Higham Lane School confirmed it was hit by a cyberattack that has disabled all major IT systems,โ€ฆ

|
Published

Key TakeawaysGovernment Intervention: New Zealand's health minister has ordered an official review into a significant cyberattack targeting the ManageMyHealth platform.Patientโ€ฆ

|
Published

Peter Soulsby โ€“ Brennan Peter Soulsby has been elevated to director at Brennan, joining the firmโ€™s executive leadership team withโ€ฆ

|
Published
NordVPN Security Update Alleged Salesforce Breach Investigated

Key TakeawaysNordVPN breach clarification: NordVPN investigation shows no internal Salesforce servers compromised; leaked files came from third-party test environment.Security teamโ€ฆ

|
Published
Hacker - Control Room - Nodes

Key TakeawaysContested Breach: Threat actors claim to have breached cybersecurity firm Resecurity, while the company maintains that the attackers accessedโ€ฆ

|
Published
Drop - Data

Key TakeawaysCentralized Opt-Out: The new DROP allows submitting a single request to delete personal data held by over 500 registeredโ€ฆ

|
Published
Ransomware Attack

Key TakeawaysChristmas Day Incident: Leduc County administration discovered a deliberate cybersecurity breach on December 25, 2025.Ransomware Attack: The cybersecurity incidentโ€ฆ

|
Published
Jammu and Kashmir VPN Ban Leads to Police Action

Key TakeawaysEnforcement action: Jammu and Kashmir VPN ban enforced; police filed FIRs, monitored internet use, and bound down dozens.District-wide impact:โ€ฆ

|
Published on January 5, 2026
France Plans 2026 Ban on Social Media for Children Under 15

Key TakeawaysPolicy direction: France social media ban proposes blocking under-15 access by 2026 using mandatory age verification systems.Implementation method: Lawโ€ฆ

|
Published on January 5, 2026
Hacker - Insider Threat - Incentive - Call Center - Bribe

Bribing support agents, coercing insiders, or abusing outsourced staff is seen as a cheaper, quieter, and more scalable entry pointโ€ฆ

|
Published on January 3, 2026
Australia Enforces Age Verification for Search Engine Users

Key TakeawaysMandatory Age Checks: Australia enforces age verification, which implies that search engines now require logged-in users to confirm ageโ€ฆ

|
Published on January 3, 2026
Desktop - Glitch Poster โ€“ Gloved hand

Key TakeawaysCommoditized Cybercrime: An ErrTraffic v2 panel is lowering the entry barrier for social engineering campaigns.Efficacy: Conversion rates approach 60%,โ€ฆ

|
Published on January 2, 2026
Laptop - Hardware Wallet

Key TakeawaysPlatform Shift: The GlassWorm malware has evolved to specifically target macOS systems, accumulating 50,000 downloads through malicious Open VSXโ€ฆ

|
Published on January 2, 2026
Jammu and Kashmir Implements VPN Ban in Several Districts

Key TakeawaysJammu and Kashmir VPN ban: Authorities suspend VPN services in multiple districts citing public order and security risksLegal enforcement:โ€ฆ

|
Published on January 2, 2026
Malaysia Social Media Regulations and Privacy Changes in 2026

Key TakeawaysMalaysia social media ban 2026: Under-16 users barred; major platforms must follow licensing and age verification rules your firstโ€ฆ

|
Published on January 2, 2026
Earth โ€“ Floating Servers โ€“ Space

Key TakeawaysBreach Confirmed: The ESA has confirmed a cybersecurity incident involving external servers outside its primary corporate network.Data Exfiltration: Threatโ€ฆ

|
Published on December 31, 2025

Key TakeawaysSanctions: The Trump administration has lifted sanctions on three executives previously designated over links to the Intellexa spyware consortium.Officialโ€ฆ

|
Published on December 31, 2025
Hacker โ€“ icons โ€“ Bank - University - Airlines

Key TakeawaysData Exposure: The University of Phoenix has disclosed that a breach of its Oracle EBS system may have compromisedโ€ฆ

|
Published on December 31, 2025
Cat Eyes - Office Staff

Key TakeawaysInsider Threat Confirmed: Two industry professionals admitted to orchestrating ALPHV/BlackCat ransomware attacks while employed in trusted incident response roles.Significantโ€ฆ

|
Published on December 31, 2025
Server Racks โ€“ Data Breach - Investigation - Documents

Key TakeawaysSupply Chain Vulnerability: A ransomware attack on third-party vendor Marquis Software compromised dozens of financial institutions and thousands ofโ€ฆ

|
Published on December 30, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: