News

US Woman Aiding DPRK North Korea

DPRK-linked operation: An Arizona resident helped North Koreans pretend to be U.S.-based remote IT workers to trick 300 American companies.…

|
Published on July 25, 2025
How VP.Net Uses SGX to Redefine VPN Privacy Architecture

Hardware-Enforced Privacy: In VP.Net, traffic is decrypted inside SGX enclaves, inaccessible even to server administrators. No Linkable Logs: Enclave obfuscates,…

|
Last updated July 25, 2025
Windscribe Prepares for the Post-Quantum Future With New Encryption Standards

Quantum Ready: Windscribe prepares to add post-quantum encryption to VPN protocols Gradual Rollout: High-risk connections get early access to hybrid…

|
Published on July 25, 2025
Windscribe Blocks JET VPN

Blocked Again: Windscribe blocked JET VPN again for abusing its VPN infrastructure Google Abuse: Windscribe flagged fake reviews and account…

|
Published on July 24, 2025
Fake Zoom Call. Phishing, Scam

What happened: Attackers exploit user trust in legitimate brands like Zoom to obtain workplace login credentials. How it works: Phishing…

|
Published on July 24, 2025
Police, Arrest, Skull

What happened: The alleged admin of the notorious Russian-speaking crime forum XSS was arrested in Europe. Accusations: The suspect reportedly…

|
Published on July 24, 2025
FBI Operation Grayskull CSAM

What happened: Authorities dismantled four dark web platforms dedicated to images and videos containing CSAM. Arrests made: The operation resulted…

|
Published on July 24, 2025
SharePoint, Government Building, Data

Impacted entities: Several government entities have reportedly been compromised, among which may be the DHS. Chinese involvement: The global Microsoft…

|
Published on July 24, 2025
Screen Codes Coyote Malware

What happened: Cybersecurity researchers have confirmed the first-ever case of UIA abuse in the wild. Why it matters: Behind the…

|
Published on July 24, 2025
Russia Enacts VPN Law, Signals Possible WhatsApp Ban

What transpired: A new law was approved in Russia that criminalizes searching for specific online information and restricts the use…

|
Published on July 24, 2025
Surfshark Releases 2024 Impact Report, Highlights Environmental and Social Progress

What happened: Surfshark released its 2024 Impact Report, detailing significant turning points in user privacy, social responsibility, and sustainability. Why…

|
Published on July 24, 2025
Browser Data

What happened: A new report shows how easily a website can trick the browser into filling in hidden fields with…

|
Published on July 24, 2025
Department of Education Cybercrime

The Target: Phishing sites are impersonating the U.S. Department of Education’s G5 portal to steal login credentials The Culprit: Attackers…

|
Published on July 23, 2025
VPN Scam

The Claim: JET VPN allegedly tapped into Windscribe’s servers without a formal agreement The Discovery: The app appeared to rely…

|
Published on July 23, 2025
Woman in Phone, drones, eyes

What happened: Cyber threats and digital repression in Iran increased amid wartime conditions. Mercenary espionage: A new cybersecurity report highlights…

|
Published on July 23, 2025
Help Desk Impersonation

What happened: Clorox alleges that hackers obtained passwords from Cognizant two years ago by simply asking. Clorox lawsuit: The company…

|
Published on July 23, 2025
US Nuclear Weapons Hacking Agency

What happened: Sources say the U.S. NNSA was breached in the Microsoft SharePoint hack. Why it matters: The Energy Department…

|
Published on July 23, 2025
Google Sues Botnet

What happened: The BadBox 2.0 botnet operators are being sued by Google in a lawsuit. Infected devices: Millions of Android…

|
Published on July 22, 2025
SharePoint Vulnerability

What happened: A new SharePoint RCE vulnerability chain exploit affected almost 100 entities. Victim impact: Most victims were in the…

|
Published on July 22, 2025
CyberGhost VPN Q2 Transparency Report Covers DMCA, Security, Data Requests

CyberGhost Q2 report shows that it received 97,887 DMCA complaints, but no user data was shared due to no-logs policy.…

|
Published on July 22, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: