A newly disclosed Windows zero-day vulnerability dubbed “RedSun” is being actively exploited in the wild, allowing attackers to gain SYSTEM privileges...
Inditex, the owner of Zara, has disclosed a data breach linked to a former technology provider, stating that no customer data was exposed. However, th...
Brave has introduced “Brave Origin” in its Nightly builds, a minimalist version of the browser focused on core privacy protections, with additional fe...
The Tor Project has published the results of a third-party security audit of its upcoming Tor VPN for Android, confirming that its core privacy archit...
Amtrak is the latest organization to have a major dataset added to the Have I Been Pwned (HIBP) database, following claims by the ShinyHunters hacking...
The European Commission has unveiled its official age-verification app, presenting it as a privacy-preserving, open-source solution to protect minors ...
A newly uncovered malware campaign is leveraging fake Proton VPN websites, alongside gaming mods and utility tools, to distribute a Windows infosteale...
Tuta has launched an invite-only beta for Tuta Drive, a new end-to-end encrypted cloud storage service designed with post-quantum cryptography. The re...
A data breach affecting education publisher McGraw Hill has resulted in the exposure of 13.5 million user records. The incident, which occurred earlie...
The Electronic Frontier Foundation (EFF) has filed complaints with California and New York authorities accusing Google of deceptive practices, allegin...
Google has announced an update to its Search spam policies that explicitly targets “back button hijacking,” a deceptive browsing manipulation techniqu...
Fiverr appears to have exposed user-uploaded files through publicly accessible Cloudinary URLs, with many assets indexed by Google search results. The...
Microsoft has released its April 2026 Patch Tuesday updates for Windows 11 versions 24H2 and 25H2, to fix security bugs across the operating system. T...
Proton has rolled out a set of updates to its Proton Drive service, introducing significant speed improvements, new mobile capabilities, and expanded ...
A malicious “Ledger Live” app briefly listed on Apple’s Mac App Store has been linked to at least $9.5 million in cryptocurrency theft, affecting more...
108 Chrome extensions have been harvesting user identities, hijacking sessions, and silently backdooring users’ web browsers. The activity was identif...
Rockstar Games has confirmed that it suffered a data breach incident that exposed internal analytics data. Earlier today, the ShinyHunters threat grou...
Booking.com has notified customers of a security incident involving unauthorized access to reservation data, warning that personal and booking-related...
Surfshark has announced a new proprietary VPN protocol named “Dausos,” claiming it delivers significantly faster speeds and improved security compared...
Researchers have demonstrated that standard fiber-optic internet cables can be covertly repurposed into highly sensitive listening devices, capable of...
A newly surfaced dataset tied to Hallmark has been added to the Have I Been Pwned (HIBP) breach notification service. The leaked data exposed the pers...
A little-known surveillance platform called Webloc can track hundreds of millions of people worldwide by repurposing data harvested from mobile apps a...
The Session Technology Foundation (STF) confirmed that it has raised approximately $65,000 in donations, enough to keep essential infrastructure onlin...
Signal is preparing to roll out version 8.7 in beta, introducing a new plaintext export feature that allows users to save their messaging data in a mo...
Users attempting to download HWMonitor and CPU-Z from the official CPUID website are reportedly being served malware-laced installers, in what appears...
Google has announced the public rollout of Device Bound Session Credentials (DBSC) in Chrome 146 for Windows, introducing a hardware-backed mechanism ...
The FBI was able to recover copies of Signal messages from a suspect’s iPhone even after the app had been deleted, by extracting data stored in Apple’...
A newly uncovered zero-day vulnerability in Adobe Reader is being actively exploited in the wild via malicious PDFs, allowing attackers to fingerprint...
The Tor Project is experimenting with stateless, diskless relay systems designed to leave no recoverable data behind, aiming to protect operators and ...
Bitcoin Depot disclosed that attackers breached its corporate systems and stole roughly $3.66 million in Bitcoin after compromising credentials tied t...