News

Hacker - Impersonation - Locks - Profiles - Handcuff

Key TakeawaysGuilty Plea Entered: Kyle Svara, 26, admitted to federal charges, including computer fraud and aggravated identity theft for phishing…

|
Published on February 5, 2026
USB - Cracked Digital Identity - Email - Phishing

Key TakeawaysRapid Escalation: In 2025, the frequency of malicious email attacks more than doubled, reaching a pace of one attack…

|
Published on February 5, 2026
data breach

Key TakeawaysSocial Engineering Vector: Attackers used social engineering tactics to breach Betterment's systems, resulting in the distribution of fraudulent cryptocurrency…

|
Published on February 5, 2026
NordVPN Passes No-Logs Audit for Sixth Time, Deloitte Confirms

Key TakeawaysNordVPN no-logs audit: Deloitte confirms NordVPN does not collect, store, or track user browsing data.Sixth independent verification: Audit follows…

|
Published on February 5, 2026

Key TakeawaysGlobal Scale: Silent Push analysts identified more than 10,000 unique IP addresses infected with SystemBC malware, with the highest…

|
Published on February 4, 2026
egypt_social_media

Key TakeawaysNew Legislation: The Spanish government will introduce legislation to ban children under 16 from accessing social media platforms.Mandatory Age…

|
Published on February 4, 2026
Office Search - Secret Documents

Key TakeawaysEspionage Allegations: A 60-year-old civilian employee of Poland's Ministry of National Defense has been detained on suspicion of spying…

|
Published on February 4, 2026

Key TakeawaysRecord Exposure: The ShinyHunters hacking group claims to have compromised more than 2.2 million records from Harvard University and…

|
Published on February 4, 2026
Amazon Cloud - Robot

Key TakeawaysRapid Escalation: Sysdig observed a threat actor escalate from initial access to administrative privileges in an AWS environment in…

|
Published on February 3, 2026
AI - Confused - Robot - Text - Image - Context - Question

Key TakeawaysContextual Manipulation: The DockerDash flaw enables the weaponization of image metadata, turning AI context into executable instructions for Docker's…

|
Published on February 3, 2026

Key TakeawaysEspionage Campaign: A suspected Chinese state-sponsored group selectively poisoned Notepad++ updates for six months in 2025.Malware Deployment: Attackers deployed…

|
Published on February 3, 2026
NSO Group VS WhatApp

Key TakeawaysReputation Whitewashing: Civil society groups accuse NSO Group of using the Pall Mall Process to rehabilitate its image.Diplomatic Rejection:…

|
Published on February 3, 2026

John Landry – SyncraSys John Landry has joined SyncraSys as chief operating officer, taking responsibility for operational readiness and organizational…

|
Published on February 2, 2026

Key TakeawaysGovernment Target: A Ministerio de Ciencia, Innovación y Universidades breach was claimed on a hacking forum.Flaw Exploitation: The actor…

|
Published on February 2, 2026
Protest - Excel - Persian Text

Key TakeawaysTargeted Lure: Weaponized Excel files disguised as lists of protesters killed during the Dey 1404 protests target investigators documenting…

|
Published on February 2, 2026
Glassworm - Credentials - Office - Executives

Key TakeawaysRegistry Infiltration: Threat actors successfully compromised a developer account on the Open VSX registry to publish malicious updates.Malware Deployment:…

|
Published on February 2, 2026
Hacker, Screen

Key TakeawaysSocial Engineering: Threat actors are leveraging vishing and victim-branded credential harvesting sites to compromise SSO credentials and MFA codes.Targeted…

|
Published on February 2, 2026
Office Staff - Laptop (1)

This week’s news shows cyber risk entering a more dangerous phase. In France, the Waltio breach demonstrated how leaked crypto…

|
Published on January 31, 2026
IPVanish Threat Protection Pro launches in Windows beta

Key TakeawaysIPVanish Threat Protection Pro: New beta feature blocks malware, phishing, trackers, harmful downloads even without VPNWindows beta availability: Feature…

|
Published on January 31, 2026

Key TakeawaysSignificant Degradation: Google's Threat Intelligence Group reduced the IPIDEA network's available devices by millions, used by over 550 distinct…

|
Published on January 30, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: