Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Privacy. Show all posts

Mobdro Pro VPN Under Fire for Compromising User Privacy

 


A disturbing revelation that highlights the persistent threat that malicious software poses to Android users has been brought to the attention of cybersecurity researchers, who have raised concerns over a deceptive application masquerading as a legitimate streaming and VPN application. Despite the app's promise that it offers free access to online television channels and virtual private networking features—as well as the name Modpro IPTV Plus VPN—it hides a much more dangerous purpose.

It is known as Mobdro Pro IPTV Plus VPN. Cleafy conducted an in-depth analysis of this software program and found that, as well as functioning as a sophisticated Trojan horse laced with Klopatra malware, it is also able to compromise users' financial data, infiltrating devices, securing remote controls, and infecting devices with Klopatra malware. 

Even though it is not listed in Google Play, it has spread through sideloaded installations that appeal to users with the lure of free services, causing users to download it. There is a serious concern among experts that those who install this app may unknowingly expose their devices, bank accounts, and other financial assets to severe security risks. At first glance, the application appears to be an enticing gateway to free, high-quality IPTV channels and VPN services, and many Android users find the offer hard to refuse. 

It is important to note, however, that beneath its polished interface lies a sophisticated banking Trojan with a remote-access toolkit that allows cybercriminals to control almost completely infected devices through a remote access toolkit. When the malware was installed on the device, Klopatra, the malware, exploiting Android's accessibility features, impersonated the user and accessed banking apps, which allowed for the malicious activity to go unnoticed.

Analysts have described the infection chain in a way that is both deliberate and deceptive, using social engineering techniques to deceive users into downloading an app from an unverified source, resulting in a sideload process of the app. Once installed, what appears to be a harmless setup process is, in fact, a mechanism to give the attacker full control of the system. 

In analyzing Mobdro Pro IPTV Plus VPN further, the researchers have discovered that it has been misusing the popularity of the once popular streaming service Mobdro (previously taken down by Spanish authorities) to mislead users and gain credibility, by using the reputation of the once popular streaming service Mobdro. 

There are over 3,000 Android devices that have already been compromised by Klopatra malware, most of which have been in Italy and Spain regions, according to Cleafy, and the operation was attributed to a Turkish-based threat group. A group of hackers continue to refine their tactics and exploit public frustration with content restrictions and digital surveillance by using trending services, such as free VPNs and IPTV apps. 

The findings of Cleafy are supported by Kaspersky's note that there is a broader trend of malicious VPN services masquerading as legitimate tools. For example, there are apps such as MaskVPN, PaladinVPN, ShineVPN, ShieldVPN, DewVPN, and ProxyGate previously linked to similar attacks. In an effort to safeguard privacy and circumvent geo-restrictions online, the popularity of Klopatra may inspire an uproar among imitators, making it more critical than ever for users to verify the legitimacy of free VPNs and streaming apps before installing them. Virtual Private Networks (VPNs) have been portrayed for some time as a vital tool for safeguarding privacy and circumventing geo-restrictions. 

There are millions of internet users around the world who use them as a way to protect themselves from online threats — masking their IP addresses, encrypting their data traffic, and making sure their intercepted communications remain unreadable. But security experts are warning that this perception of safety can sometimes be false.

In recent years, it has become increasingly difficult to select a trustworthy VPN, even when downloading it directly from official sites, such as the Google Play Store, since many apps are allegedly compromising the very privacy they claim to protect, which has made the selection process increasingly difficult. In the VPN Transparency Report 2025, published by the Open Technology Fund, significant security and transparency issues were highlighted among several VPN applications that are widely used around the world. 

During the study, 32 major VPN services collectively used by over a billion people were examined, and the findings revealed opaque ownership structures, questionable operational practices, and the misuse of insecure tunnelling technologies. Several VPN services, which boasted over 100 million downloads each, were flagged as particularly worrying, including Turbo VPN, VPN Proxy Master, XY VPN, and 3X VPN – Smooth Browsing. 

Several providers utilised the Shadowsocks tunnelling protocol, which was never intended to be private or confidential, and yet was marketed as a secure VPN solution by researchers. It emphasises the importance of doing users' due diligence before choosing a VPN provider, urging users to understand who operates the service, how it is designed, and how their information is handled before making a decision. 

It is also strongly advised by cybersecurity experts to have cautious digital habits, including downloading apps from verified sources, carefully reviewing permission requests, installing up-to-date antivirus software, and staying informed on the latest cybersecurity developments through trusted cybersecurity publications. As malicious VPNs and fake streaming platforms become increasingly important gateways to malware such as Klopatra, awareness and vigilance have become increasingly important defensive tools in the rapidly evolving online security landscape. 

As Clearafy uncovered in its analysis of the Klopatra malware, the malware represents a new level of sophistication in Android cyberattacks, utilising several sophisticated mechanisms to help evade detection and resist reverse engineering. As opposed to typical smartphone malware, Klopatra permits its operators to fully control an infected device remotely—essentially enabling them to do whatever the legitimate user is able to do on the device. 

It has a hidden VNC mode, which allows attackers to access the device while keeping the screen black, making them completely unaware of any active activities going on in the device. This is one of the most insidious features of this malware. If malicious actors have access to such a level of access, they could open banking applications without any visible signs of compromise, initiate transfers, and manipulate device settings without anyone noticing.

A malware like Klopatra has strong defensive capabilities that make it very resilient. It maintains an internal watchlist of popular Android security applications and automatically attempts to uninstall them once it detects them, ensuring that it stays hidden from its victim. Whenever a victim attempts to uninstall a malicious application manually, they may be forced to trigger the system's "back" action, which prevents them from doing so. 

The code analysis and internal operator comments—primarily written in Turkish—led investigators to trace the malware’s origins to a coordinated threat group based in Turkey, where most of their activities were directed towards targeting Italian and Spanish financial institutions. Cleafy's findings also revealed that the third server infrastructure is carrying out test campaigns in other countries, indicating an expansion of the business into other countries in the future. 

With Klopatra, users can launch legitimate financial apps and a convincing fake login screen is presented to them. The screen gives the user the appearance of a legitimate login page, securing their credentials via direct operator intervention. The campaign evolved from a prototype created in early 2025 to its current advanced form in 2035. This information is collected and then used by the attackers in order to access accounts, often during the night when the device is idle, making suspicions less likely. 

A few documented examples illustrate that operators have left internal notes in the app's code in reference to failed transactions and victims' unlock patterns, which highlights the hands-on nature of these attacks. Cybersecurity experts warn that the best defence against malware is prevention - avoiding downloading apps from unverified sources, especially those that offer free IPTV or VPN services. Although Google Play Protect is able to identify and block many threats, it cannot detect every emerging threat. 

Whenever an app asks for deep system permissions or attempts to install secondary software, users are advised to be extremely cautious. According to Cleafy's research, curiosity about "free" streaming services or privacy services can all too easily serve as a gateway for full-scale digital compromise, so consumers need to be vigilant about these practices. In a time when convenience usually outweighs caution, threats such as Klopatra are becoming increasingly sophisticated.

A growing number of cybercriminals are exploiting popular trends such as free streaming and VPN services to ensnare unsuspecting users into ensnaring them. As a result, it is becoming increasingly essential for each individual to take steps to protect themselves. Experts recommend that users adopt a multi-layered security approach – pairing a trusted VPN with an anti-malware tool and enabling multi-factor authentication on their financial accounts to minimise damage should their account be compromised. 

The regular review of system activity and app permissions can also assist in detecting anomalies before they occur. Additionally, users should cultivate a sense of scepticism when it comes to offers that seem too good to be true, particularly when they promise unrestricted access and “premium” services without charge. In addition, organisations need to increase awareness campaigns so consumers are able to recognise the warning signs of fraudulent apps. 

The cybersecurity incidents serve as a reminder that cybersecurity is not a one-time safeguard, but must remain constant through vigilance and informed decisions throughout the evolving field of mobile security. Awareness of threats remains the first and most formidable line of defence as the mobile security battlefield continues to evolve.

Cheung Sha Wan Wholesale Market Faces Major Data Breach Impacting Thousands

 


As part of an alarming incident that highlights the growing threat of cyberattacks on public sector systems, the Vegetable Marketing Organisation (VMO) reported that it was targeted by a ransomware attack that disrupted the Cheung Sha Wan Vegetable Wholesale Market's operations through a ransomware attack on a segment of its computer infrastructure. 

Upon discovering the breach on October 13, immediate suspension of network service was imposed as a precautionary measure to contain the intrusion and safeguard critical data. VMO announced on Wednesday that the affected servers were quickly isolated from external access and alerted the Hong Kong Police, the Hong Kong Computer Emergency Response Team Coordination Centre, and the Office of the Privacy Commissioner for Personal Data to the incident. 

A preliminary study suggests that the attack had a significant effect on the gate and accounting systems of the market, potentially exposing the personal information of approximately 7,000 registered users to the outside world. Founded in 1946 to ensure that local produce will be available continuously, the VMO, a non-profit organisation established to ensure this, has begun a comprehensive investigation into the extent of the data breach to determine whether any personal information has been compromised, and it has promised to inform individuals if any personal information is found to be at risk.

As of Thursday, the organisation's official website has remained inaccessible as a result of the ongoing disruption that the cyber incident has caused. After detecting the breach, Vegetable Marketing Organisation engaged an external contractor to assist them with restoring the system and supporting the ongoing investigation into the attack after the breach had been discovered. 

Although the core operations of the Cheung Sha Wan Vegetable Wholesale Market remain unaffected, the company has announced that it will temporarily utilise manual processes to manage invoicing and payment procedures, ensuring continuity of operations. Hong Kong's digital resilience has been questioned in the wake of a series of cybersecurity breaches that have struck numerous prominent institutions in the city in recent years. 

These have included Cyberport, the Consumer Council, and the Hong Kong Post, raising concerns about the city's digital resilience in general. There has been an increase in cyber threats over the past few years, which has led lawmakers to pass legislation to strengthen critical infrastructure security, including penalties of up to HK$5 million for lapses in cybersecurity compliance, resulting in an increase in cybersecurity threats. 

In a statement made by the VMO, it was noted that it would conduct a thorough review of the incident and that reinforced measures would be implemented to safeguard its systems from future attacks. The Vegetable Marketing Organisation has hired an external contractor to assist with restoring its systems, thereby accelerating the recovery process and facilitating the investigation.

It was acknowledged by the organisation that, despite continuing to operate daily, certain administrative functions, such as invoicing and payment processing, are being handled manually temporarily so that business continuity can be maintained. Hong Kong has been experiencing an increasing number of cybersecurity breaches in recent years, including Cyberport, the Consumer Council, and Hong Kong Post, which have put major institutions in a state of anxiety. 

As a result, critical infrastructure remains vulnerable to cyberattacks, which has been highlighted in recent months. Recently, the city's legislature approved a new measure aimed at bolstering defences against cyberattacks, with penalties of up to HK$5 million for non-compliance outlined in the legislation. VMO reiterated its commitment to digital security, and that it places a high level of importance on cybersecurity, and that a comprehensive review of the event would be conducted, along with enhancements to network safeguards to prevent similar events from recurring. 

Considering the recent incident at the Cheung Sha Wan Vegetable Wholesale Market, it has become increasingly apparent to me that Hong Kong's public and semi-public sectors need to strengthen cybersecurity resilience urgently.

The security experts have long warned that as digital systems are becoming increasingly integrated into key components of the services that consumers rely on, the effects of cyberattacks can quickly escalate from data breaches to disruptions in the regular functioning of processes and the public trust in them. Several industry observers believe that organisations like the VMO should go beyond enhancing only technical safeguards and make a concerted effort to train their staff regularly, to perform continuous vulnerability assessments, and to update their monitoring frameworks in real time to detect anomalies early. 

As a supplement to this, the establishment of cross-agency collaboration and information-sharing mechanisms could also enhance the city's overall preparedness to handle similar attacks in the future. Despite the VMO's quick response and transparency in handling the incident, it highlights a crucial national imperative-the strengthening of cyber hygiene and cultivation of a culture of sensitive information across all levels of governance and commerce in order to mitigate the immediate risks. 

The resilience of Hong Kong's institutions will be determined by how proactive vigilance is managed against cyber-attacks as much as it will be determined by their ability to defend themselves against technological disruption.

EU’s Child Sexual Abuse Regulation Risks Undermining Encryption and Global Digital Privacy

 

The European Union’s proposed Child Sexual Abuse Regulation (CSAR)—often referred to as Chat Control—is being criticized for creating an illusion of safety while threatening the very foundation of digital privacy. Experts warn that by weakening end-to-end encryption, the proposal risks exposing users worldwide to surveillance, exploitation, and cyberattacks. 

Encryption, which scrambles data to prevent unauthorized access, is fundamental to digital trust. It secures personal communications, financial data, and medical records, forming a critical safeguard for individuals and institutions alike. Yet, several democratic governments, including those within the EU, have begun questioning its use, framing strong encryption as an obstacle to law enforcement. This false dichotomy—between privacy and public safety—has led to proposals that inadvertently endanger both. 

At the center of the EU’s approach is client-side scanning, a technology that scans messages on users’ devices before encryption. Critics compare it to having someone read over your shoulder as you type a private letter. While intended to detect child sexual abuse material (CSAM), the system effectively eliminates confidentiality. Moreover, it can be easily circumvented—offenders can hide files by zipping, renaming, or converting them to other formats, undermining the entire purpose of the regulation. 

Beyond its inefficiency, client-side scanning opens the door to mass surveillance. Once such systems exist, experts fear they could be repurposed to monitor political dissent, activism, or journalism. By introducing backdoors—intentional weaknesses that allow access to encrypted data—governments risk repeating mistakes like those seen in the Salt Typhoon case, where a Chinese state-sponsored group exploited backdoors originally built for U.S. agencies. 

The consequences of weakened encryption are vast. Journalists would struggle to protect sources, lawyers could no longer guarantee client confidentiality, and businesses risk exposure of trade secrets. Even governments rely on encryption to protect national security. For individuals—especially victims of domestic abuse or marginalized groups—encrypted communication can literally be a matter of life and death. 

Ironically, encryption also protects children. Research from the UK’s Information Commissioner’s Office found that encrypted environments make it harder for predators to access private data for grooming. Weakening encryption, therefore, could expose children to greater harm rather than prevent it. 

Public opposition to similar policies has already shifted outcomes elsewhere. In Australia, controversial encryption laws passed in 2018 have yet to be enforced due to political backlash. In the UK, public resistance to the Online Safety Act led major tech companies to threaten withdrawal rather than compromise encryption.  

Within the EU, member states remain divided. Poland, Finland, the Netherlands, and the Czech Republic have opposed the CSAR for privacy and security reasons, while France, Denmark, and Hungary support it as a necessary tool against abuse. Whatever the outcome, the effects will extend globally—forcing tech companies to either weaken encryption standards or risk losing access to the European market. 

As the world marks Global Encryption Day, the debate surrounding CSAR highlights a broader truth: safeguarding the internet means preserving both safety and privacy. Rather than imposing blanket surveillance, policymakers should focus on targeted investigations, rapid CSAM takedown measures, and support for victims.  
Encryption remains the cornerstone of a secure, trustworthy, and free internet. If the EU truly aims to protect children and its citizens, it must ensure that this foundation remains unbroken—because once privacy is compromised, safety soon follows.

China’s DNA Data Bank Initiative Sparks Debate on Privacy and Surveillance

 


Xilinhot, Inner Mongolia, a northern city that has been subject to widespread scrutiny as a result of a police initiative that has reignited debate over privacy and government surveillance, has recently received widespread attention from the Chinese public. In an effort to reduce crime and enhance public safety, authorities have recently announced their intention to establish a DNA database by collecting blood samples from male residents.

The project is being presented as a modern tool to prevent crime and prevent crime-related deaths. A China Newsweek article published on September 23 stated that officials in China described the project as part of a broader effort to update the identification system for documents, like national ID cards and passports, which was a major initiative for China. 

It was also asserted by the police that this database would assist in finding missing elderly people and children, while emphasising that any personal information or biological material would remain strictly private. A number of privacy advocates, as well as citizens, are deeply concerned about the plan because they believe that it may lead to the expansion of state surveillance, posing the threat of overreach on behalf of the government.

In a national debate about privacy, consent, and state management of genetic data, the proposed initiative has triggered a national debate that has centred around enhancing identification systems and strengthening investigative capabilities. 

As China Newsweek reported, authorities in the Inner Mongolian city of Xilinhot announced their intention to collect blood samples for updating a database that is used for passports and national ID cards, which sparked controversy. 

According to officials, the initiative was promoted as a preventive measure to assist in the search for missing children and elderly people. They stressed that all personal data and biological information would remain confidential and would not be shared with anyone else. It has been reported that the official announcement vanished from the department's website and its social media accounts shortly after it was made, further fueling public suspicion.

During a subsequent interview with a police representative, he clarified that participation in the program was completely voluntary and that those who opted out would not face any repercussions. According to the investigators, the collected samples were intended to be added to a local DNA database for Y-chromosomes, commonly known as the "Y bank", which would help law enforcement to trace male lineages in criminal investigations.

In many countries across the globe, DNA databases have become a crucial aspect of crime governance and investigation, with over sixty countries now maintaining national databases, as well as numerous others developing similar programs. The Indian Government has, however, been struggling to go beyond the planning stage despite a number of drafts of its DNA Bill, which had been released to the public some time ago, despite ongoing efforts to set up a National DNA Database since 2003. Despite the numerous drafts, the project has still not reached operation. 

There have been a number of legal and academic experts arguing that this prolonged delay is due to the absence of transparent, inclusive, and participatory decision-making processes that could have incorporated key concerns related to privacy, ethics, and human rights into the decision-making process. 

As privacy has become an increasingly prominent issue in the global debate, the way in which India approaches the construction of its National DNA Database has also been challenged, which is regarded as being primarily driven by a technocratic and bureaucratic vision that fails to take social and legal safeguards into consideration.

It is argued, given India's status as a constitutional democracy, that a robust privacy governance framework has to be established before such a database can be fully implemented in order to ensure that technological advancements do not outpace the nation's commitments in regards to human rights and ethical practices. 

As an alternative to this, New Zealand’s approach to the forensic DNA collection process is a great example of how a successful, transparent system can be implemented. Having established a DNA Profile Databank (DPD) only a few years ago, New Zealand became the second country in the world to do so in the world. Managed by ESR on behalf of the New Zealand Police, the database compiles DNA profiles of both convicted offenders and voluntarily volunteered DNA profiles. 

The comprehensive database is based on two interconnected systems that are linked together - the Criminal Sample Databank, which stores genetic material that is gathered from unsolved crime scenes, and the DNA Profile Database, which contains profiles of individuals. A routine cross-reference of the databases, often daily, to identify potential matches between crime scene evidence and stored profiles is performed regularly, and the results are immediately communicated to law enforcement authorities. 

It has achieved impressive results in the field of DNA analysis by collecting over 200,000 samples as well as 40,000 DNA profiles, which have been taken from casework: approximately seventy per cent of all unsolved cases, which are added to the database, have been linked to individuals, while about thirty per cent have been linked to other crimes. New Zealand has established itself as one of the world's leading players in the use of DNA technology in criminal investigations thanks to its proactive and data-driven approach. 

Taking its name from the National DNA Data Bank, Canada's DNA database stands as the cornerstone of the modern forensic investigation field, consistently maintaining more than half a million DNA profiles that are vital to the pursuit of criminal justice and to the identification of remains. In addition to serving as an important tool for investigators who help them identify or exclude suspects, connect related crimes, and determine whether a serial offender might be involved, the databank is also under strict legal and ethical supervision. 

Besides contributing significantly to the investigation of criminal crimes, the database also aids in the identification of missing people and victims, which is an important component of humanitarian efforts. Through its comprehensive framework, the databank entails the development of collaboration between police, coroners, and medical examiners from all across Canada, enhancing Canada's role as one of the world's leading nations in the responsible use of genetic technology for the protection and justice of the public. 

The discussion revolves around a forensic technique referred to as Y-STR family screening, which enables authorities to narrow the potential suspects in investigations by analysing genetic markers shared among male relatives. In this method, investigators are able to trace a suspect's family members, even though they do not all possess a similar short tandem repeat on their Y chromosomes.

The method allows investigators to locate the suspect before applying additional tools to identify the particular suspect. Several cases involving high-profile people have been solved using the technology, including the notorious Baiyin serial killings that took place between 1988 and 2002 in Gansu province that resulting in the death of 11 women. 

The recent initiative in Xilinhot to collect blood samples has prompted questions about proportionality, necessity, and transparency regarding the public's interest. The commentary in Nanfang Daily reported that the police had provided very limited information regarding the storage, use, or disposal of DNA data, but opinions among legal scholars differed as well: In his argument in South Reviews, Tian Fang, a law professor at Nanjing University, argued that the technology focuses only on non-coding DNA segments, which are not genetically associated with eye color or blood type, so that this technology does not constitute an invasion of privacy at all. 

Nevertheless, others, such as Chen Xuequan, a professor at the University of International Business and Economics in Beijing, spoke out against the system, warning that it could still raise issues related to the ethics of data security and privacy if there were no clear legal safeguards. With nations struggling to balance technological advancement with individual rights, China's DNA data bank initiative highlights the need for clear legal boundaries, ethical oversight, and transparent governance when it comes to the use of genetic information as a whole. 

Even though DNA database systems have proven to be very useful for solving crimes and reuniting families, these systems need to be managed within the framework of privacy, consent, and accountability. The establishment of independent regulatory bodies, the enforcement of strict data protection measures, and the encouragement of public dialogue could ensure that such initiatives serve justice while protecting fundamental freedoms without compromising them. 

In the end, the success of any national DNA database is not determined by the number of samples it collects. It is more important to ensure the integrity of its operation, as well as the trust of the citizens who will be protected by the database.

Satellites Found Broadcasting Sensitive Data Without Encryption

 



A recent academic study has revealed alarming security gaps in global satellite communications, exposing sensitive personal, corporate, and even military information to potential interception. Researchers from the University of California, San Diego, and the University of Maryland discovered that a large portion of geostationary satellites transmit unencrypted data, leaving them open to eavesdropping by anyone with inexpensive receiving equipment.

Over a three-year investigation, the research team assembled an $800 receiver setup using readily available components and placed it on the roof of a university building in La Jolla, California. By adjusting their dish toward various satellites visible from their location, the team intercepted streams of data routinely transmitted from orbit to ground-based receivers. To their surprise, much of this information was sent without any encryption or protective measures.

The intercepted traffic included mobile phone calls and text messages linked to thousands of users, in-flight Wi-Fi data from airlines, internal communications from energy and transportation systems, and certain military and law enforcement transmissions revealing positional details of personnel and assets. These findings demonstrate that many critical operations rely on satellite systems that fail to protect private or classified data from unauthorized access.

According to the researchers, nearly half of all geostationary satellite signals they analyzed carried unencrypted content. However, their setup could only access about 15 percent of the satellites in orbit, suggesting that the scale of exposure could be significantly higher. They presented their findings in a paper titled “Don’t Look Up,” which highlights how the satellite industry has long relied on the assumption that no one would actively monitor satellite traffic from Earth.

After identifying the vulnerabilities, the researchers spent months notifying affected organizations. Several companies, including major telecom providers, responded quickly by introducing encryption and tightening their satellite communications. Others, particularly operators of older or specialized systems, have yet to implement necessary protections.

Experts in cybersecurity have called the study a wake-up call for both industry and government agencies. They stress that satellite networks often act as the communication backbone for remote locations, from offshore platforms to rural cell towers, and unprotected data transmitted through these systems poses a serious privacy and security risk.

The findings underline the pressing need for standardized encryption protocols across satellite networks. As the reliance on space-based communication continues to grow, ensuring the confidentiality and integrity of transmitted data will be vital for national security, business operations, and personal privacy alike.




Data Breach at Bectu Exposes Members’ Information and Bank Details


 

Prospect, one of the UK's leading trade unions, has revealed that in June 2025, it was seriously affected by a cyberattack which had been discovered in the wake of a sophisticated cyberattack that had been launched against it. This underscores the sophistication and persistence of cyber attacks against professional bodies that are becoming ever more sophisticated. A significant part of the data that has been compromised is sensitive financial and personal data belonging to members of Prospect, the union affiliated with Prospect, and its member union, Bectu, a major representation body for professionals in the film and television industry in the country. 

Prospect, a national organisation of close to 160,000 engineers, scientists, managers, and specialists from companies including BT Group, Siemens, and BAE Systems, disclosed that the breach involved a considerable amount of confidential information from its members. Based on preliminary findings, it has been found that the attackers have accessed names, birthdates, contact information, bank account information, including sort codes, for over one year. 

Moreover, it has been suggested that data related to protected personal characteristics, including gender, race, religion, disability status, and employment status, may also have been compromised. A disclosure of this nature is not surprising considering that unions and membership-based organisations are increasingly relying on digital platforms for managing member records, communicating with members, and processing subscriptions – all of which make them attractive targets for cybercriminals who are looking for large quantities of personal information in bulk. 

Bectu Members Among the Most Affected

It is estimated that thousands of people, including Bectu, one of the largest unions in the UK representing professional workers in the film and television industries, as well as theatre and live entertainment, will be affected by this strike. The organisation, which operates under Prospect, acts as an important voice for screen and stage workers, from technicians to creative freelancers, as well as the production crew. A significant percentage of Bectu's approximately 40,000 members may have been affected by the breach, according to internal assessments. While it has not yet been officially confirmed how large a compromise was, early indications suggest that the attack may have exposed highly detailed personal information, leaving individuals open to the possibility that their data could be misused. There are several types of information that have been compromised in addition to bank account information and financial details, including addresses, phone numbers, and email accounts, as well as personal identifiers such as birth dates. The information, which includes diversity and equality statistics and individual case files - often used in representation and employment disputes - was also accessed in some instances. 

Timeline and Discovery of the Breach 

There was a report of a cyberattack that occurred in June 2025, however the full extent of the incident did not become apparent until a detailed forensic investigation of the incident in the months that followed. Prospect's General Secretary, Mike Clancy, formally notified members of the breach in October 2025 via email communications, explaining the nature of the breach, as well as the measures that were being taken to address it. After the incident occurred, Prospect has reported it to the Information Commissioner's Office (ICO), the police, and other relevant authorities. The company has also hired cybersecurity specialists to assist in the ongoing investigation, strengthen internal defences, and ensure that affected individuals receive information on how to safeguard their personal information. 

Prospect’s Official Response 

Michael Clancy, president of the company, issued an official statement addressing the incident in which he confirmed that internal investigations had confirmed that unauthorised access had been gained to the data of specific members. “This investigation is ongoing, but we have unfortunately identified that some member information was accessed during this incident. The evidence we have gathered has identified the members that we need to contact about an impact on their personal information. We have written to them with information on what this means for them and the support Prospect will provide to mitigate risk,” Clancy said.

Among the union's commitments to transparency and determination to assist affected members after the breach, the union stressed its commitment to transparency. Prospect will be offering a free 12-month credit and identity monitoring service as part of its response strategy to help safeguard members from potential financial fraud or identity theft caused by the stolen information as part of its response strategy. 

Cybersecurity Experts Warn of Growing Risks to Unions.  Several cybersecurity analysts have pointed out that trade unions, as well as professional associations, are becoming prime targets for data breaches due to the sheer amount of personal information they collect and store. Many unions, in contrast to corporations, do not have a lot of IT resources at their disposal, making them more vulnerable to sophisticated cyberattacks than other organisations. 

It is important to note that unions store an enormous amount of sensitive information - from payroll information to contact information to equality and disciplinary records. In addition to this, cybercriminals are highly interested in these types of data and can exploit or sell it for financial or political gain. Although the motives behind the Prospect breach remain unclear, investigators have not yet officially identified any specific threat actor responsible for the attack, despite similar incidents occurring in recent years having been linked to organised cybercrime groups that extort organisations or sell stolen data via dark web marketplaces in an attempt to profit. 

Regulatory and Legal Implications 

The UK Data Protection Act 2018 and the UK GDPR require Prospect to report significant data breaches to the Information Commissioner (ICO) and inform affected individuals “without undue delay.” As part of its review of the case, the ICO will examine whether appropriate data protection measures had been implemented before the incident and whether additional sanctions or guidance should have been issued in the future. 

There may be substantial penalties imposed on organisations which fail to implement sufficient cybersecurity safeguards, including a fine of up to £17.5 million or 4% of the company's global annual turnover, whichever is greater. There is, however, a significant difference between Prospect and other unions, which are typically nonprofit organisations, and regulatory authorities may instead concentrate on remediation, accountability, and security governance reform. 

Industry Repercussions and Member Concerns 

Many members of both Bectu and Prospect have expressed concern about the incident, since they work in sectors already confronted with job insecurity and issues relating to data privacy. A number of people have expressed concerns about the misuse of financial information or the possibility of targeted phishing attacks following the breach. 

Bectu members, whose professional lives are often based on freelance or contractual work, should be aware that any compromise of personal or banking details could lead to serious consequences for them. According to the union, members should be vigilant, monitor their bank accounts regularly, and report suspicious activity to the financial institution as soon as possible. 

In the opinion of industry observers, the reputational impact could extend far beyond the unions themselves. Due to the waning confidence in digital record-keeping systems, organisations are being urged to invest in stronger encryption, zero-trust network frameworks, and regular security audits in order to avoid similar incidents from occurring again. 

A Wake-Up Call for the Sector

A breach like this serves as an important reminder for all professional organisations that handle large amounts of member or employee data regularly. In an increasingly digitalised world, in which sensitive information is exchanged and stored online, robust cybersecurity measures are no longer optional — they are essential to maintaining trust and operational integrity in the digital age. 

 There has been a clear commitment by Prospect and Bectu to assist affected members, strengthen their IT infrastructure, and prevent future breaches as investigations continue. The outcome of the ICO’s review, which is expected to be completed later this year, may serve as a guide for how similar incidents are handled across the UK's trade union landscape going forward.

CoMaps: The Open-Source, Privacy-Focused Google Maps Alternative You’ll Actually Want to Use

 

Google Maps may be convenient, but for some users, its constant tracking and battery drain are reason enough to look for an alternative. One such option is CoMaps, an open-source navigation app built for privacy and efficiency. Users frustrated by Google’s monthly location reports or the high battery consumption of Maps may find CoMaps to be a refreshing change. 

CoMaps is a fork of Organic Maps, which itself evolved from the earlier project MapsWithMe, later acquired by the Russian-based Maps.ru group. Like its predecessors, CoMaps uses OpenStreetMap data — a community-driven platform that emphasizes transparency and collaboration. The app, available for both Android and iOS, stands out for its offline usability and no-tracking policy. 

Unlike Google Maps, CoMaps collects no personal information, doesn’t serve ads, and doesn’t require a constant internet connection. It offers offline search, route planning, and voice-guided navigation while consuming far less battery power. Users can download regional maps, mark and save favorite spots, view subway maps, and even access offline Wikipedia articles for added context. Another standout feature is CoMaps’ outdoor mode, designed for hiking and biking. 

This mode highlights trails, campsites, points of interest, and even water sources — making it ideal for travelers and adventurers who prefer staying disconnected from the grid. The built-in map editor also lets users contribute directly to improving OpenStreetMap data, reinforcing the app’s community-driven philosophy. Setting up CoMaps is simple. Users can download only the maps they need, saving space and allowing seamless offline use. Once downloaded, navigation feels intuitive — nearly identical to Google Maps. 

Directions are clear, and the app supports distance measurements in both kilometers and miles, customizable through the settings. Since its release on the Google Play Store and Apple App Store in July, CoMaps has quickly gained attention as a reliable Google Maps replacement. Its focus on privacy, performance, and transparency appeals to users who are increasingly wary of data tracking. 

For those who value privacy and want a lighter, more ethical alternative to big tech navigation tools, CoMaps offers a balanced blend of simplicity, functionality, and digital independence. It’s free, open-source, and ready to use — without following you everywhere you go.

Danish Developer’s Website Sparks EU Debate on Online Privacy and Child Protection

 



In August, a 30-year-old developer from Aalborg, identified only as Joachim, built a platform called Fight Chat Control to oppose a proposed European Union regulation aimed at tackling the spread of child sexual abuse material (CSAM) online. The EU bill seeks to give law enforcement agencies new tools to identify and remove illegal content, but critics argue it would compromise encrypted communication and pave the way for mass surveillance.

Joachim’s website allows visitors to automatically generate and send emails to European officials expressing concerns about the proposal. What began as a weekend project has now evolved into a continent-wide campaign, with members of the European Parliament and national representatives receiving hundreds of emails daily. Some offices in Brussels have even reported difficulties managing the flood of messages, which has disrupted regular communication with advocacy groups and policymakers.

The campaign’s influence has extended beyond Brussels. In Denmark, a petition supported by Fight Chat Control gained more than 50,000 signatures, qualifying it for parliamentary discussion. Similar debates have surfaced across Europe, with lawmakers in countries such as Ireland and Poland referencing the controversy in national assemblies. Joachim said his website has drawn over 2.5 million visitors, though he declined to disclose his full name or employer to avoid associating his workplace with the initiative.

While privacy advocates applaud the campaign for sparking public awareness, others believe the mass email tactic undermines productive dialogue. Some lawmakers described the influx of identical messages as “one-sided communication,” limiting space for constructive debate. Child rights organisations, including Eurochild, have also voiced frustration, saying their outreach to officials has been drowned out by the surge of citizen emails.

Meanwhile, the European Union continues to deliberate the CSAM regulation. The European Commission first proposed the law in 2022, arguing that stronger detection measures are vital as online privacy technologies expand and artificial intelligence generates increasingly realistic harmful content. Denmark, which currently holds the rotating presidency of the EU Council, has introduced a revised version of the bill and hopes to secure support at an upcoming ministerial meeting in Luxembourg.

Danish Justice Minister Peter Hummelgaard maintains that the new draft is more balanced than the initial proposal, stating that content scanning would only be used as a last resort. However, several EU member states remain cautious, citing privacy concerns and the potential misuse of surveillance powers.

As European nations prepare to vote, the controversy continues to reflect a broader struggle: finding a balance between protecting children from online exploitation and safeguarding citizens’ right to digital privacy.



Thousands of Government IDs at Risk Following Breach Involving Discord’s Verification Partner


Currently, one of the threats associated with digital identity verification can often be found in the form of cyberattacks targeting third-party service providers linked to Discord, with the result that sensitive personal data belonging to nearly 70,000 users may have been exposed. 

There has been a growing concern over the growing vulnerabilities surrounding databases created in compliance with online safety laws, which aim to protect minors, following the incident which affected a company responsible for managing customer support and mandatory age verification on behalf of the popular chat platform. 

A number of cybersecurity experts claim that this incident is part of a larger surge in attacks exploiting these newly developed compliance-driven data repositories that have been discovered in recent years. The company has confirmed that Discord's infrastructure and systems are secure. 

However, the compromised data is said to include government-issued ID documents like passports and driver's licenses, as well as names, email addresses, and limited credit card information, among others. While the company maintains that no payment information or account passwords have been accessed, some customer support communications have been exposed as well. 

During the past several months, a major cybersecurity breach has revealed a lack of trust on the part of third-party providers who are assigned the responsibility of protecting identity data -- a dependencies that continue to become a critical point of failure in today's interconnected digital ecosystems. 

In addition to government ID images, a further investigation into the breach has revealed that the attackers may have been able to access much more personal data beyond the images of government IDs, including the names of users, emails, contact information, IP addresses, and even correspondence with Discord's customer service representatives, among other things. 

Individuals familiar with the matter have reported that the perpetrators attempted to extort the company and demanded a ransom in exchange for the information they had stolen. Discord has confirmed that no credit card information or account passwords were compromised as a result of the incident.

In spite of the fact that the breach was initially disclosed last week, new information released on Wednesday suggests that up to 70,000 photo ID documents may have been exposed as a result. In a recent interview with a spokesperson for the Information Commissioner’s Office (ICO), the UK’s independent regulator responsible for handling data protection and privacy issues, it was confirmed that it had received a report from Discord and that they are currently reviewing the information provided. 

There has been an increase in the number of compromised photographs as a result of users submitting their identity to Discord's contracted customer service provider during age verification and account recovery appeals. These appeals are designed to ensure compliance with regulations restricting access to online services to individuals under the age of 18. 

As a result of the incident, we are reminded how extensive the consequences can be when consumer-facing digital platforms are compromised. A once-exclusive platform for gaming communities, Discord has now grown into one of the biggest communication platforms with over 200 million users daily, including businesses that use it to maintain customer relationships and community engagement, as well as manage customer interactions and engagement with customers. 

Originally named Scattered Lapsu$ Hunters (SLH), the group responsible for this attack originally identified itself as a group that was allegedly connected to several notorious cybercrime networks. Even though BleepingComputer reported that SLH had revised its account, directing suspicion towards another group with whom it is allegedly collaborating, after confirming the claim. 

It has been noted by experts that this type of overlapping affiliation is quite common among cybercriminal networks since they tend to share techniques, switch alliances, and interchangeable members in ways that blur attribution efforts. As Rescancharacterised it, SLH is a coalition that draws its tactics from Scattered Spider, Lapsu$, Sand hiHiny Hunters, well known for launching attacks on third parties, exploiting social engineering as a method of attacking vendors rather than deploying conventional malware. 

In almost two weeks, Discord released the news about the breach after revoking access to its support partner's systems and engaging the services of an external cybersecurity expert. The company has since notified affected users, emphasised that all official communication regarding the incident will be issued solely through its verified address, noreply@discord.com, reiterating that it will never contact users via phone calls or unsolicited messages. 

SLH (Scattered Lapsu$ Hunters) were reportedly responsible for the infiltration of the Zendesk instance on Discord starting on September 20, 2025, allegedly maintaining unauthorised access for roughly 58 hours. According to the hackers, the intrusion was triggered by a compromised account belonging to an outsourced business process provider's support agent—an incident that highlights the continuing threats that exist in third-party systems that have weak or stolen credentials. 

In the course of the attack, it has been reported that around 1.6 terabytes of data were stolen, including customer support tickets, partial payment records, and images used to verify identity. While the attacker initially demanded a ransom of $5 million, it was later dropped to $3.5 million, a negotiation tactic commonly used when victims refuse to comply with the attacker's demands. 

According to cybersecurity analysts, the breach demonstrates organisations can be exposed to significant vulnerabilities inadvertently by third-party vendors even if they maintain robust internal security defences. In many cases, attacks target external supply chains and support partners as their security protocols may differ from those of the primary organisation, so attackers often take advantage of those weaknesses. 

According to experts, the compromised dataset in this case contains sensitive identifiers, billing information, and private message exchanges - data that users normally regard as highly confidential. Experts have emphasised that this isn't the only incident associated with Discord in recent years. As a result of another support agent's credentials being compromised, the platform disclosed a similar breach in March 2023, exposing emails and attachments submitted by customers through support tickets. 

The recurrence of such events has prompted stronger vendor management policies to be established, as well as multifactor authentication for all contractor accounts, as well as stricter scrutiny on the access of sensitive information by third parties. Even a well-established platform like Discord remains vulnerable to cyberattacks if trust is extended beyond its digital walls. This is the lesson that has been learned from the Discord breach. 

A cybersecurity expert emphasised that the urgent need for companies to review their reliance on external vendors to handle sensitive verification data is becoming increasingly apparent as the investigation continues. To safeguard user privacy, it has become essential to strengthen contractual security obligations, implement strict credential management, and conduct periodic third-party audits. These steps are now seen as non-negotiable steps. 

As a result of this incident, individuals are reminded how crucial it is to take proactive measures such as enabling multi-factor authentication, verifying the authenticity of official communications, and monitoring their financial and identity activities for potential irregularities. With cyberattacks becoming more sophisticated and opportunistic, it is becoming increasingly crucial to use both vigilance on the part of individuals as well as corporate responsibility to prevent them. 

Ultimately, the Discord case illustrates a broader truth about the current digital landscape-security is no longer restricted to the company's own systems, but extends to all partners, platforms, and processes that are connected to them. The organisations must continue to balance compliance, convenience, and consumer trust, but the strength of the entire chain will ultimately depend on how well they can secure the weakest link.

Oura Users Express Concern Over Pentagon Partnership Amid Privacy Debates

 



Oura, the Finnish company known for its smart health-tracking rings, has recently drawn public attention after announcing a new manufacturing facility in Texas aimed at meeting the needs of the U.S. Department of Defense (DoD). The partnership, which has existed since 2019, became more widely discussed following the August 27 announcement, leading to growing privacy concerns among users.

The company stated that the expansion will allow it to strengthen its U.S. operations and support ongoing defense-related projects. However, the revelation that the DoD is Oura’s largest enterprise customer surprised many users. Online discussions on Reddit and TikTok quickly spread doubts about how user data might be handled under this partnership.

Concerns escalated further when users noticed that Palantir Technologies, a software company known for its government data contracts, was listed as a technology partner in Oura’s enterprise infrastructure. Some users interpreted this connection as a potential risk to personal privacy, particularly those using Oura rings to track reproductive health and menstrual cycles through its integration with the FDA-approved Natural Cycles app.

In response, Oura’s CEO Tom Hale issued a clarification, stating that the partnership does not involve sharing individual user data with the DoD or Palantir. According to the company, the defense platform uses a separate system, and only data from consenting service members can be accessed. Oura emphasized that consumer data and enterprise data are stored and processed independently.

Despite these assurances, some users remain uneasy. Privacy advocates and academics note that health wearables often operate outside strict medical data regulations, leaving gaps in accountability. Andrea Matwyshyn, a professor of law and engineering at Penn State, explained that wearable data can sometimes be repurposed in ways users do not anticipate, such as in insurance or legal contexts.

For many consumers, especially women tracking reproductive health, the issue goes beyond technical safeguards. It reflects growing mistrust of how private companies and governments may collaborate over sensitive biometric data. The discussion also highlights the shifting public attitude toward data privacy, as more users begin to question who can access their most personal information.

Oura maintains that it is committed to protecting user privacy and supporting health monitoring “for all people, including service members.” Still, the controversy serves as a reminder that transparency and accountability remain central to consumer trust in an age where personal data has become one of the most valuable commodities.



Meta to Use AI Chat Data for Targeted Ads Starting December 16

 

Meta, the parent company of social media giants Facebook and Instagram, will soon begin leveraging user conversations with its AI chatbot to drive more precise targeted advertising on its platforms. 

Starting December 16, Meta will integrate data from interactions users have with the generative AI chat tool directly into its ad targeting algorithms. For instance, if a user tells the chatbot about a preference for pizza, this information could translate to seeing additional pizza-related ads, such as Domino's promotions, across Instagram and Facebook feeds.

Notably, users do not have the option to opt out of this new data usage policy, sparking debates and concerns over digital privacy. Privacy advocates and everyday users alike have expressed discomfort with the increasing granularity of Meta’s ad targeting, as hyper-targeted ads are widely perceived as intrusive and reflective of a broader erosion of personal privacy online. 

In response to these growing concerns, Meta claims there are clear boundaries regarding what types of conversational data will be incorporated into ad targeting. The company lists several sensitive categories it pledges to exclude: religious beliefs, political views, sexual orientation, health information, and racial or ethnic origin. Despite these assurances, skepticism remains about how effectively Meta can prevent indirect influences on ad targeting, since related topics might naturally slip into AI interactions even without explicit references.

Industry commentators have highlighted the novelty and controversial nature of Meta’s move, referring to it as marking a 'new frontier in digital privacy.' Some users are openly calling for boycotts of Meta’s chat features or responding with jaded irony, pointing out that Meta's business model has always relied on user data monetization.

Meta's policy will initially exclude the United Kingdom, South Korea, and all countries in the European Union, likely due to stricter privacy regulations and ongoing scrutiny by European authorities. The new initiative fits into Meta CEO Mark Zuckerberg’s broader strategy to capitalize on AI, with the company planning a massive $600 billion investment in AI infrastructure over the coming years. 

With this policy shift, over 3.35 billion daily active users worldwide—except in the listed exempted regions—can expect changes in the nature and specificity of the ads they see across Meta’s core platforms. The change underscores the ongoing tension between user privacy and tech companies’ drive for personalized digital advertising.

Moving Toward a Quantum-Safe Future with Urgency and Vision


It is no secret that the technology of quantum computing is undergoing a massive transformation - one which promises to redefine the very foundations of digital security worldwide. Quantum computing, once thought to be nothing more than a theoretical construct, is now beginning to gain practical application in the world of computing. 

A quantum computer, unlike classical computers that process information as binary bits of zeros or ones, is a device that enables calculations to be performed at a scale and speed previously deemed impossible by quantum mechanics, leveraging the complex principles of quantum mechanics. 

In spite of their immense capabilities, this same power poses an unprecedented threat to the digital safeguards underpinning today's connected world, since conventional systems would have to solve problems that would otherwise require centuries to solve. 

 The science of cryptography at the heart of this looming challenge is the science of protecting sensitive data through encryption and ensuring its confidentiality and integrity. Although cryptography remains resilient to today's cyber threats, experts believe that a sufficiently advanced quantum computer could render these defences obsolete. 

Governments around the world have begun taking decisive measures in recognition of the importance of this threat. In 2024, the U.S. National Institute of Standards and Technology (NIST) released three standards on postquantum cryptography (PQC) for protecting against quantum-enabled threats in establishing a critical benchmark for global security compliance. 

Currently, additional algorithms are being evaluated to enhance post-quantum encryption capabilities even further. In response to this lead, the National Cyber Security Centre of the United Kingdom has urged high-risk systems to adopt PQC by 2030, with full adoption by 2035, based on the current timeline. 

As a result, European governments are developing complementary national strategies that are aligned closely with NIST's framework, while nations in the Asia-Pacific region are putting together quantum-safe roadmaps of their own. Despite this, experts warn that these transitions will not happen as fast as they should. In the near future, quantum computers capable of compromising existing encryption may emerge years before most organisations have implemented quantum-resistant systems.

Consequently, the race to secure the digital future has already begun. The rise of quantum computing is a significant technological development that has far-reaching consequences that extend far beyond the realm of technological advancement. 

Although it has undeniable transformative potential - enabling breakthroughs in sectors such as healthcare, finance, logistics, and materials science - it has at the same time introduced one of the most challenging cybersecurity challenges of the modern era, a threat that is not easily ignored. Researchers warn that as quantum research continues to progress, the cryptographic systems safeguarding global digital infrastructure may become susceptible to attack. 

A quantum computer that has sufficient computational power may render public key cryptography ineffective, rendering secure online transactions, confidential communications, and data protection virtually obsolete. 

By having the capability to decrypt information that was once considered impenetrable, these hackers could undermine the trust and security frameworks that have shaped the digital economy so far. The magnitude of this threat has caused business leaders and information technology leaders to take action more urgently. 

Due to the accelerated pace of quantum advancement, organisations have an urgent need to reevaluate, redesign, and future-proof their cybersecurity strategies before the technology reaches critical maturity in the future. 

It is not just a matter of adopting new standards when trying to move towards quantum-safe encryption; it is also a matter of reimagining the entire architecture of data security in the long run. In addition to the promise of quantum computing to propel humanity into a new era of computational capability, it is also necessary to develop resilience and foresight in parallel.

There will be disruptions that are brought about by the digital age, not only going to redefine innovation, but they will also test the readiness of institutions across the globe to secure the next frontier of the digital age. The use of cryptography is a vital aspect of digital trust in modern companies. It secures communication across global networks, protects financial transactions, safeguards intellectual property, and secures all communications across global networks. 

Nevertheless, moving from existing cryptographic frameworks into quantum-resistant systems is much more than just an upgrade in technology; it means that a fundamental change has been made to the design of the digital trust landscape itself. With the advent of quantum computing, adversaries have already begun using "harvest now, decrypt later" tactics, a strategy which collects encrypted data now with the expectation that once quantum computing reaches maturity, they will be able to decrypt it. 

It has been shown that sensitive data with long retention periods, such as medical records, financial archives, or classified government information, can be particularly vulnerable to retrospective exposure as soon as quantum capabilities become feasible on a commercial scale. Waiting for a definitive quantum event to occur before taking action may prove to be perilous in a shifting environment. 

Taking proactive measures is crucial to ensuring operational resilience, regulatory compliance, as well as the protection of critical data assets over the long term. An important part of this preparedness is a concept known as crypto agility—the ability to move seamlessly between cryptographic algorithms without interrupting business operations. 

Crypto agility has become increasingly important for organisations operating within complex and interconnected digital ecosystems rather than merely an option for technical convenience. Using the platform, enterprises are able to keep their systems and vendors connected, maintain robust security in the face of evolving threats, respond to algorithmic vulnerabilities quickly, comply with global standards and remain interoperable despite diverse systems and vendors.

There is no doubt that crypto agility forms the foundation of a quantum-secure future—and is an essential attribute that all organisations must possess for them to navigate the coming era of quantum disruption confidently and safely. As a result of the transition from quantum cryptography to post-quantum cryptography (PQC), it is no longer merely a theoretical exercise, but now an operational necessity. 

Today, almost every digital system relies heavily on cryptographic mechanisms to ensure the security of software, protect sensitive data, and authenticate transactions in order to ensure that security is maintained. When quantum computing capabilities become available to malicious actors, these foundational security measures could become ineffective, resulting in the vulnerability of critical data around the world to attack and hacking. 

Whether or not quantum computing will occur is not the question, but when. As with most emerging technologies, quantum computing will probably begin as a highly specialised, expensive, and limited capability available to only a few researchers and advanced enterprises at first. Over the course of time, as innovation accelerates and competition increases, accessibility will grow, and costs will fall, which will enable a broader adoption of the technology, including by threat actors. 

A parallel can be drawn to the evolution of artificial intelligence. The majority of advanced AI systems were confined mainly to academic or industrial research environments before generative AI models like ChatGPT became widely available in recent years. Within a few years, however, the democratisation of these capabilities led to increased innovation, but it also increased the likelihood of malicious actors gaining access to powerful new tools that could be used against them. 

The same trajectory is forecast for quantum computing, except with stakes that are exponentially higher than before. The ability to break existing encryption protocols will no longer be limited to nation-states or elite research groups as a result of the commoditization process, but will likely become the property of cybercriminals and rogue actors around the globe as soon as it becomes commoditised. 

In today's fast-paced digital era, adapting to a secure quantum framework is not simply a question of technological evolution, but of long-term survival-especially in the face of catastrophic cyber threats that are convergent at an astonishing rate. A transition to post-quantum cryptography (PQC), or post-quantum encryption, is expected to be seamless through regular software updates for users whose digital infrastructure includes common browsers, applications, and operating systems. 

As a result, there should be no disruption or awareness on the part of users as far as they are concerned. The gradual process of integrating PQC algorithms has already started, as emerging algorithms are being integrated alongside traditional public key cryptography in order to ensure compatibility during this transition period. 

As a precautionary measure, system owners are advised to follow the National Cyber Security Centre's (NCSC's) guidelines to keep their devices and software updated, ensuring readiness once the full implementation of the PQC standards has taken place. While enterprise system operators ought to engage proactively with technology vendors to determine what their PQC adoption timelines are and how they intend to integrate it into their systems, it is important that they engage proactively. 

In organisations with tailored IT or operational technology systems, risk and system owners will need to decide which PQC algorithms best align with the unique architecture and security requirements of these systems. PQC upgrades must be planned now, ideally as part of a broader lifecycle management and infrastructure refresh effort. This shift has been marked by global initiatives, including the publication of ML-KEM, ML-DSA, and SLH-DSA algorithms by NIST in 2024. 

It marks the beginning of a critical shift in the development of quantum-resistant cryptographic systems that will define the next generation of cybersecurity. In the recent surge of scanning activity, it is yet another reminder that cyber threats are continually evolving, and that maintaining vigilance, visibility, and speed in the fight against them is essential. 

Eventually, as reconnaissance efforts become more sophisticated and automated, organisations will not only have to depend on vendor patches but also be proactive in integrating threat intelligence, continuously monitoring, and managing attack surfaces as a result of the technological advancements. 

The key to improving network resilience today is to take a layered approach, which includes hardening endpoints, setting up strict access controls, deploying timely updates, and utilising behaviour analytics-based intelligent anomaly detection to monitor the network infrastructure for anomalies from time to time. 

Further, security teams should take an active role in safeguarding the entire network against attacks that can interfere with any of the exposed interfaces by creating zero-trust architectures that verify every connection that is made to the network. Besides conducting regular penetration tests, active participation in information-sharing communities can help further detect early warning signs before adversaries gain traction.

Attackers are playing the long game, as shown by the numerous attacks on Palo Alto Networks and Cisco infrastructure that they are scanning, waiting, and striking when they become complacent. Consistency is the key to a defender's edge, so they need to make sure they know what is happening and keep themselves updated.

Meta's Platforms Rank Worst in Social Media Privacy Rankings: Report

Meta’s Instagram, WhatsApp, and Facebook have once again been flagged as the most privacy-violating social media apps. According to Incogni’s Social Media Privacy Ranking report 2025, Meta and TikTok are at the bottom of the list. Elon Musk’s X (formerly Twitter) has also received poor rankings in various categories, but has done better than Meta in a few categories.

Discord, Pinterest, and Quora perform well

The report analyzed 15 of the most widely used social media platforms globally, measuring them against 14 privacy criteria organized into six different categories: AI data use, user control, ease of access, regulatory transgressions, transparency, and data collection. The research methodology focused on how an average user could understand and control privacy policies.

Discord, Pinterest, and Quora have done best in the 2025 ranking. Discord is placed first, thanks to its stance on not giving user data for training of AI models. Pinterest ranks second, thanks to its strong user options and fewer regulatory penalties. Quora came third thanks to its limited user data collection.

Why were Meta platforms penalized?

But the Meta platforms were penalized strongly in various categories. Facebook was penalized for frequent regulatory fines, such as GDPR rules in Europe, and penalties in the US and other regions. Instagram and WhatsApp received heavy penalties due to policies allowing the collection of sensitive personal data, such as sexual orientation and health. X faced penalties for vast data collection

Penalties against X

X was penalized for vast data collection and privacy fines from the past, but it still ranked above Meta and TikTok in some categories. X was among the easiest platforms to delete accounts from, and also provided information to government organizations at was lower rate than other platforms. Yet, X allows user data to be trained for AI models, which has impacted its overall privacy score.

“One of the core principles motivating Incogni’s research here is the idea that consent to have personal information gathered and processed has to be properly informed to be valid and meaningful. It’s research like this that arms users with not only the facts but also the tools to inform their choices,” Incogni said in its blog.