News

Deepfake, Face, AI

Teen deepfakes probe: A student in Valencia is suspected of creating deepfake nude images of female classmates for selling them.…

|
Published on July 28, 2025
Phone, Lock, Icons

Data breach: A significant cybersecurity incident involved the leak of user images from posts, comments, and direct messages. Tea acknowledgement:…

|
Published on July 28, 2025
Breachforums Dark Web Admin

BreachForums is reportedly back online under original admins, with all user data preserved They attribute the April outage to a…

|
Published on July 26, 2025
VPN Interest Spikes in the UK as Porn Site Age Checks Take Effect

VPN Searches Surge: UK VPN searches spike 700% after porn sites require strict age verification checks. New Age-Check Rules: Under…

|
Published on July 26, 2025
Chaos, Ransomware, Codes

New threat actor: A novel RaaS operation capitalizes on the Chaos name association with popular ransomware builder tool variants. TTPs…

|
Published on July 25, 2025
Dark web forum breach

Breach details: A significant, unprotected database exposed sensitive user information, primarily associated with the Leak Zone cybercrime forum. Database content:…

|
Published on July 25, 2025
Aviation, Microsoft, Laptop, Office Space

BEC scam: Fake Microsoft 365 login pages harvested credentials and finance-related emails from aviation executives. Scheme details: Hackers edited official…

|
Published on July 25, 2025
US Woman Aiding DPRK North Korea

DPRK-linked operation: An Arizona resident helped North Koreans pretend to be U.S.-based remote IT workers to trick 300 American companies.…

|
Published on July 25, 2025
How VP.Net Uses SGX to Redefine VPN Privacy Architecture

Hardware-Enforced Privacy: In VP.Net, traffic is decrypted inside SGX enclaves, inaccessible even to server administrators. No Linkable Logs: Enclave obfuscates,…

|
Last updated July 25, 2025
Windscribe Prepares for the Post-Quantum Future With New Encryption Standards

Quantum Ready: Windscribe prepares to add post-quantum encryption to VPN protocols Gradual Rollout: High-risk connections get early access to hybrid…

|
Published on July 25, 2025
Windscribe Blocks JET VPN

Blocked Again: Windscribe blocked JET VPN again for abusing its VPN infrastructure Google Abuse: Windscribe flagged fake reviews and account…

|
Published on July 24, 2025
Fake Zoom Call. Phishing, Scam

What happened: Attackers exploit user trust in legitimate brands like Zoom to obtain workplace login credentials. How it works: Phishing…

|
Published on July 24, 2025
Police, Arrest, Skull

What happened: The alleged admin of the notorious Russian-speaking crime forum XSS was arrested in Europe. Accusations: The suspect reportedly…

|
Published on July 24, 2025
FBI Operation Grayskull CSAM

What happened: Authorities dismantled four dark web platforms dedicated to images and videos containing CSAM. Arrests made: The operation resulted…

|
Published on July 24, 2025
SharePoint, Government Building, Data

Impacted entities: Several government entities have reportedly been compromised, among which may be the DHS. Chinese involvement: The global Microsoft…

|
Published on July 24, 2025
Screen Codes Coyote Malware

What happened: Cybersecurity researchers have confirmed the first-ever case of UIA abuse in the wild. Why it matters: Behind the…

|
Published on July 24, 2025
Russia Enacts VPN Law, Signals Possible WhatsApp Ban

What transpired: A new law was approved in Russia that criminalizes searching for specific online information and restricts the use…

|
Published on July 24, 2025
Surfshark Releases 2024 Impact Report, Highlights Environmental and Social Progress

What happened: Surfshark released its 2024 Impact Report, detailing significant turning points in user privacy, social responsibility, and sustainability. Why…

|
Published on July 24, 2025
Browser Data

What happened: A new report shows how easily a website can trick the browser into filling in hidden fields with…

|
Published on July 24, 2025
Department of Education Cybercrime

The Target: Phishing sites are impersonating the U.S. Department of Education’s G5 portal to steal login credentials The Culprit: Attackers…

|
Published on July 23, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: