News

Jammu and Kashmir Implements VPN Ban in Several Districts

Key TakeawaysJammu and Kashmir VPN ban: Authorities suspend VPN services in multiple districts citing public order and security risksLegal enforcement:…

|
Published on January 2, 2026
Malaysia Social Media Regulations and Privacy Changes in 2026

Key TakeawaysMalaysia social media ban 2026: Under-16 users barred; major platforms must follow licensing and age verification rules your first…

|
Published on January 2, 2026
Earth – Floating Servers – Space

Key TakeawaysBreach Confirmed: The ESA has confirmed a cybersecurity incident involving external servers outside its primary corporate network.Data Exfiltration: Threat…

|
Published on December 31, 2025

Key TakeawaysSanctions: The Trump administration has lifted sanctions on three executives previously designated over links to the Intellexa spyware consortium.Official…

|
Published on December 31, 2025
Hacker – icons – Bank - University - Airlines

Key TakeawaysData Exposure: The University of Phoenix has disclosed that a breach of its Oracle EBS system may have compromised…

|
Published on December 31, 2025
Cat Eyes - Office Staff

Key TakeawaysInsider Threat Confirmed: Two industry professionals admitted to orchestrating ALPHV/BlackCat ransomware attacks while employed in trusted incident response roles.Significant…

|
Published on December 31, 2025
Server Racks – Data Breach - Investigation - Documents

Key TakeawaysSupply Chain Vulnerability: A ransomware attack on third-party vendor Marquis Software compromised dozens of financial institutions and thousands of…

|
Published on December 30, 2025
Smartphone - SMS – Cash

Key TakeawaysSecurity Failures: Korea Telecom femtocells were deployed with security oversights, recent discoveries say.Customer Impact: Flaws allowed attackers to clone…

|
Published on December 30, 2025
Cryptojacking

Key TakeawaysInternational Arrest: A Lithuanian national has been arrested in Georgia and extradited to South Korea for operating a massive…

|
Published on December 30, 2025
Office - Police Files - Handcuffs

Key TakeawaysInsider Threat: Authorities in India have arrested a former customer service agent for allegedly facilitating unauthorized access to Coinbase's…

|
Published on December 30, 2025
Cyber Job Moves 29 December

Ashish Gupta – Jammu and Kashmir Government Ashish Gupta has been designated as Chief Information Security Officer for the Department…

|
Published on December 29, 2025
Hacker Camera Map Surveillance

Key TakeawaysEvolved Tactics: The HoneyMyte APT group now uses a kernel-mode rootkit driver signed with a stolen digital certificate to…

|
Published on December 29, 2025
IoT - Pet Food - Feeder - Laptop - Phone

Key TakeawaysCritical Authentication Bypass: A major flaw could allow complete account takeover for any user with a Google login, as…

|
Published on December 29, 2025
Data center - Server racks - Man - Monitor

Key TakeawaysCritical vulnerability: A significant security flaw has been identified in MongoDB, allowing attackers to read uninitialized heap memory from…

|
Published on December 29, 2025
Riverbank – Laptop – Investigators – Evidence bags

Key TakeawaysMassive compensation: Coupang announced $1.2 billion compensation plan for the 33.7 million customers initially said to be affected by…

|
Published on December 29, 2025
Workstations - Laptop - Login - Industrial Water Treatment Corridor - Pipes

We see a recurring pattern across recent cybersecurity incidents where trust, and identity controls are being exploited across government systems,…

|
Published on December 27, 2025
Man - Laptop

Key TakeawaysVersion-specific incident: Only Trust Wallet Browser Extension version 2.68 is affected.Immediate mitigation: Users are urged to disable the extension…

|
Published on December 26, 2025
Firewall - Server Racks - Lock - Hacker

Key TakeawaysActive exploitation: Fortinet says attackers are abusing a long-standing SSL VPN flaw.Authentication protections: Misconfigurations can allow logins without completing…

|
Published on December 26, 2025
Espionage Map Binoculars

Key TakeawaysSophisticated TTPs: The Evasive Panda APT utilizes advanced techniques, including DNS poisoning and adversary-in-the-middle (AitM) attacks.Geographic focus: The campaign…

|
Published on December 24, 2025
Angry RAT - Laptop - GitHub Repo

Key TakeawaysDeceptive distribution: The WebRAT malware is being distributed through GitHub repositories disguised as PoC exploits for high-severity flaws.Targeted audience:…

|
Published on December 24, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: