• Skip to main content
  • Skip to after header navigation
  • Skip to site footer
CyberInsider

CyberInsider

Reliable cybersecurity news and resources

General

  • Home
  • News
    • Android
    • Cloud
    • Data Breach
    • Hardware
    • IOS
    • Legal
    • Linux
    • Mac
    • Phishing
    • Privacy
    • Ransomware
    • Security
    • Software
    • Windows
  • Email
    • Secure Email
    • Proton Mail Review
    • Tuta Mail Review
    • Mailfence Review
    • Mailbox.org Review
    • StartMail Review
    • Best Encrypted Email
    • Alternatives to Gmail
    • Proton Mail vs StartMail
    • Proton Mail vs Tuta
  • Password
    • Best Password Managers
      • Best Windows Password Manager
      • Best Mac Password Manager
      • Best iPhone Password Manager
      • Best Android Password Manager
      • Best Family Password Manager
    • Comparisons
      • Bitwarden vs Proton Pass
      • NordPass vs 1Password
      • LastPass vs NordPass
      • RoboForm vs NordPass
      • Bitwarden vs NordPass
      • Proton Pass vs NordPass
      • 1Password vs Proton Pass
      • RoboForm vs Proton Pass
    • Proton Pass Review
    • NordPass Review
    • 1Password Review
    • KeePass Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Identity
    • Best Identity Theft Protection Services
    • Aura Review
    • Identity Guard Review
    • NordProtect Review
    • LifeLock Review
    • Experian IdentityWorks Review
    • IDShield Review
    • Aura vs LifeLock
    • Identity Guard vs Aura
  • VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark VPN Review
      • ExpressVPN Review
      • Proton VPN Review
      • Mullvad VPN Review
      • IPVanish Review
      • PIA Review
    • Best VPN Services
      • Best VPN for iPhone
      • Best VPN for Canada
      • Best VPN for China
      • VPN for Static IP
      • Best VPN for Firestick
      • Best VPN for Gaming
      • Best VPN for Netflix
      • Best VPN for Streaming
      • Best VPN for Torrenting
      • Best VPN for Mac
      • Best VPN for Windows
      • Best Free VPN
      • VPN with Antivirus
      • VPN with Ad Blocking
    • VPN Comparisons
      • NordVPN vs Surfshark
      • ExpressVPN vs NordVPN
      • NordVPN vs Proton VPN
      • Mullvad vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs Proton VPN
    • VPN Coupons
      • NordVPN Coupon
      • Proton VPN Coupon
      • Surfshark Coupon
    • Free Trial VPNs
    • Cheap VPNs
  • Data Removal
    • Best Data Removal Services
    • DeleteMe Review
    • Incogni Review
    • Optery Review
    • Comparisons
      • Incogni vs DeleteMe
      • Optery vs Incogni
      • Aura vs Incogni
    • Delete your Digital Footprint
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Best Password Managers
    • Secure Messaging Apps
    • Privacy Tools
  • Info
    • About
    • Newsletter
    • Contact

Latest News

  • Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking
  • Proton VPN vows to resist Canadian surveillance demands under Bill C-22
  • NordVPN wins early court victory against LaLiga’s VPN blocking campaign
  • McDonald’s France resets accounts after customer data breach

About

CyberInsider covers the latest news in the cybersecurity and data privacy world. In addition to news, we also publish in-depth guides and resources.
See our Mission >

  • Home
  • News
    • Android
    • Cloud
    • Data Breach
    • Hardware
    • IOS
    • Legal
    • Linux
    • Mac
    • Phishing
    • Privacy
    • Ransomware
    • Security
    • Software
    • Windows
  • Email
    • Secure Email
    • Proton Mail Review
    • Tuta Mail Review
    • Mailfence Review
    • Mailbox.org Review
    • StartMail Review
    • Best Encrypted Email
    • Alternatives to Gmail
    • Proton Mail vs StartMail
    • Proton Mail vs Tuta
  • Password
    • Best Password Managers
      • Best Windows Password Manager
      • Best Mac Password Manager
      • Best iPhone Password Manager
      • Best Android Password Manager
      • Best Family Password Manager
    • Comparisons
      • Bitwarden vs Proton Pass
      • NordPass vs 1Password
      • LastPass vs NordPass
      • RoboForm vs NordPass
      • Bitwarden vs NordPass
      • Proton Pass vs NordPass
      • 1Password vs Proton Pass
      • RoboForm vs Proton Pass
    • Proton Pass Review
    • NordPass Review
    • 1Password Review
    • KeePass Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Identity
    • Best Identity Theft Protection Services
    • Aura Review
    • Identity Guard Review
    • NordProtect Review
    • LifeLock Review
    • Experian IdentityWorks Review
    • IDShield Review
    • Aura vs LifeLock
    • Identity Guard vs Aura
  • VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark VPN Review
      • ExpressVPN Review
      • Proton VPN Review
      • Mullvad VPN Review
      • IPVanish Review
      • PIA Review
    • Best VPN Services
      • Best VPN for iPhone
      • Best VPN for Canada
      • Best VPN for China
      • VPN for Static IP
      • Best VPN for Firestick
      • Best VPN for Gaming
      • Best VPN for Netflix
      • Best VPN for Streaming
      • Best VPN for Torrenting
      • Best VPN for Mac
      • Best VPN for Windows
      • Best Free VPN
      • VPN with Antivirus
      • VPN with Ad Blocking
    • VPN Comparisons
      • NordVPN vs Surfshark
      • ExpressVPN vs NordVPN
      • NordVPN vs Proton VPN
      • Mullvad vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs Proton VPN
    • VPN Coupons
      • NordVPN Coupon
      • Proton VPN Coupon
      • Surfshark Coupon
    • Free Trial VPNs
    • Cheap VPNs
  • Data Removal
    • Best Data Removal Services
    • DeleteMe Review
    • Incogni Review
    • Optery Review
    • Comparisons
      • Incogni vs DeleteMe
      • Optery vs Incogni
      • Aura vs Incogni
    • Delete your Digital Footprint
  • Tools
    • Secure Browser
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Best Password Managers
    • Secure Messaging Apps
    • Privacy Tools
  • Info
    • About
    • Newsletter
    • Contact
Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking
News Privacy Software

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

May 22, 2026
Proton VPN vows to resist Canadian surveillance demands under Bill C-22
Legal News Privacy

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

NordVPN wins early court victory against LaLiga’s VPN blocking campaign
Legal News

NordVPN wins early court victory against LaLiga’s VPN blocking campaign

McDonald’s France resets accounts after customer data breach
Data Breach News

McDonald’s France resets accounts after customer data breach

Canadian arrested for operating KimWolf botnet tied to record DDoS attack
Legal News

Canadian arrested for operating KimWolf botnet tied to record DDoS attack

LATEST NEWS

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

May 22, 2026 by Bill Mann

A newly published technical review of Telegram’s MTProto protocol warns that the messaging platform exposes persistent device …

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

May 22, 2026 by Alex Lekander

Proton VPN General Manager David Peterson said the Swiss-based VPN provider will not comply with any Canadian surveillance …

NordVPN wins early court victory against LaLiga’s VPN blocking campaign

NordVPN wins early court victory against LaLiga’s VPN blocking campaign

May 22, 2026 by Alex Lekander

A Spanish court has rejected LaLiga’s request to fine NordVPN over alleged failures to comply with a controversial anti-piracy …

McDonald’s France resets accounts after customer data breach

McDonald’s France resets accounts after customer data breach

May 22, 2026 by Amar Ćemanović

McDonald’s France has confirmed that attackers accessed customer loyalty account information after a breach affecting partners …

Canadian arrested for operating KimWolf botnet tied to record DDoS attack

Canadian arrested for operating KimWolf botnet tied to record DDoS attack

May 22, 2026 by Alex Lekander

Canadian authorities have arrested a 23-year-old Ottawa man who is accused of operating the DDoS-for-hire KimWolf IoT botnet …

Google “Won’t Fix” API key staying active for 23 mins after deletion

Google “Won’t Fix” API key staying active for 23 mins after deletion

May 21, 2026 by Bill Mann

Deleted Google API keys remain valid for up to 23 minutes after revocation, potentially allowing attackers to continue …

Proton Pass adds new protections for AI agents with account access

Proton Pass adds new protections for AI agents with account access

May 21, 2026 by Alex Lekander

A new Proton Pass feature allows users to securely share credentials with AI agents via “AI access tokens,” aiming to reduce …

Trump Mobile exposes data of customers who ordered the T1 phone

Trump Mobile exposes data of customers who ordered the T1 phone

May 21, 2026 by Amar Ćemanović

Trump Mobile, the wireless carrier and smartphone brand tied to US President Donald Trump, is reportedly exposing sensitive …

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

May 21, 2026 by Bill Mann

Mullvad has published an official advisory confirming a fingerprinting issue in its VPN infrastructure that could allow online …

Europol dismantles ‘First VPN’ service used by ransomware gangs

Europol dismantles ‘First VPN’ service used by ransomware gangs

May 21, 2026 by Amar Ćemanović

European law enforcement agencies have dismantled a long-running VPN service allegedly used by ransomware gangs and …

Tor launches crowdfunding campaign to support internet freedom projects

Tor launches crowdfunding campaign to support internet freedom projects

May 20, 2026 by Alex Lekander

The Tor Project has launched a new cryptocurrency-based crowdfunding initiative aimed at supporting internet freedom and …

AI assistants can be hijacked and manipulated by inaudible sounds

AI assistants can be hijacked and manipulated by inaudible sounds

May 20, 2026 by Bill Mann

Hidden audio commands can hijack AI voice assistants and transcription tools without users hearing anything unusual, according …

Steam removes 'Beyond The Dark' horror game over malware reports

Steam removes ‘Beyond The Dark' horror game over malware reports

May 20, 2026 by Amar Ćemanović

A malicious game distributed through Steam has been removed from Valve’s platform after users discovered it was secretly …

GitHub confirms internal repository theft as TeamPCP claims attack

GitHub confirms internal repository theft as TeamPCP claims attack

May 20, 2026 by Alex Lekander

GitHub disclosed that it is investigating unauthorized access to its internal repositories after attackers compromised an …

macOS flaw allowed rogue apps to access chat and browser data

macOS flaw allowed rogue apps to access chat and browser data

May 19, 2026 by Bill Mann

Researchers at mobile privacy firm Mysk have disclosed details of a now-patched macOS vulnerability that could allow malicious …

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

May 19, 2026 by Amar Ćemanović

Mozilla has released Firefox 151, introducing new privacy-focused protections for Private Browsing Mode and stronger …

Microsoft’s legacy MSHTA tool heavily abused in malware attacks

Microsoft’s legacy MSHTA tool heavily abused in malware attacks

May 19, 2026 by Bill Mann

Microsoft’s legacy mshta.exe utility remains widely abused in malware campaigns despite the retirement of Internet Explorer and …

Discord enables E2EE by default for all voice and video communications

Discord enables E2EE by default for all voice and video communications

May 19, 2026 by Alex Lekander

Discord announced that all voice and video calls on its platform are now protected with end-to-end encryption (E2EE) by …

More News >

Reliable cybersecurity news and in-depth resources, written by industry experts.

About CyberInsider
Free Weekly Newsletter

security

Google “Won’t Fix” API key staying active for 23 mins after deletion

Google “Won’t Fix” API key staying active for 23 mins after deletion

Steam removes 'Beyond The Dark' horror game over malware reports

Steam removes ‘Beyond The Dark' horror game over malware reports

GitHub confirms internal repository theft as TeamPCP claims attack

GitHub confirms internal repository theft as TeamPCP claims attack

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

Security News >

Data breach

McDonald’s France resets accounts after customer data breach

McDonald’s France resets accounts after customer data breach

Trump Mobile exposes data of customers who ordered the T1 phone

Trump Mobile exposes data of customers who ordered the T1 phone

Instructure confirms Canvas user data exposed in cyberattack

Instructure confirms Canvas user data exposed in cyberattack

DigiCert suffers breach, stolen certificates used to sign malware

DigiCert suffers breach, stolen certificates used to sign malware

Data Breach News >

ransomware

ShinyHunters publishes remaining Odido customer data, exposing millions of ID numbers

ShinyHunters publishes remaining Odido customer data, exposing millions of ID numbers

SmarterTools suffers security breach by the Warlock ransomware group

SmarterTools suffers security breach by the Warlock ransomware group

RansomHouse leaks allegedly Apple-linked data from supplier Luxshare

RansomHouse leaks allegedly Apple-linked data from supplier Luxshare

US cybersecurity experts plead guilty to orchestrating ALPHV ransomware attacks

US cybersecurity experts plead guilty to orchestrating ALPHV ransomware attacks

Ransomware News >

privacy

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

Tor launches crowdfunding campaign to support internet freedom projects

Tor launches crowdfunding campaign to support internet freedom projects

Privacy News >

legal

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

Proton VPN vows to resist Canadian surveillance demands under Bill C-22

NordVPN wins early court victory against LaLiga’s VPN blocking campaign

NordVPN wins early court victory against LaLiga’s VPN blocking campaign

Canadian arrested for operating KimWolf botnet tied to record DDoS attack

Canadian arrested for operating KimWolf botnet tied to record DDoS attack

Europol dismantles ‘First VPN’ service used by ransomware gangs

Europol dismantles ‘First VPN’ service used by ransomware gangs

Legal News >

Software

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

Telegram’s MTProto protocol leaks persistent identifiers enabling user tracking

Proton Pass adds new protections for AI agents with account access

Proton Pass adds new protections for AI agents with account access

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

Mullvad confirms VPN fingerprinting flaw, says fix is on the way

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

Mozilla hardens Firefox against fingerprinting, adds one-click session wipe

Software News >

Explore news topics

Android category

Android

Cloud

Data Breach

hardware category

Hardware

IOS category

IOS

Legal category

Legal

Phishing

Privacy

Ransomware

Security

software category

Software

windows category

Windows

Cyberinsider resources

how to

  • How to Delete Your Digital Footprint
  • How to Encrypt Email
  • How to Protect Yourself Against Identity Theft
  • How to Unblock Websites
  • How to Create Strong Passwords
  • How to Test Your VPN

Secure email

  • Proton Mail Review
  • StartMail Review
  • Mailfence Review
  • Tuta Review
  • Secure Email Providers
  • Encrypted Email Providers

Cloud Storage

  • Proton Drive Review
  • NordLocker Review
  • Sync.com Review
  • pCloud Review
  • IDrive Review
  • Best Cloud Storage Services

Password manageR

  • Best Password Managers
  • NordPass Review
  • Proton Pass Review
  • 1Password Review
  • LastPass Review
  • NordPass vs 1Password
  • NordPass vs LastPass

Data removal

  • Best Data Removal Services
  • DeleteMe Review
  • Incogni Review
  • Optery Review
  • Incogni vs DeleteMe
  • Optery vs Incogni
  • Aura vs Incogni

Identity theft

  • Best Identity Theft Protection
  • Aura Review
  • LifeLock Review
  • Identity Guard Review
  • LifeLock vs Aura
  • Aura vs Identity Guard
  • Cheap Identity Theft Protection

VPN Reviews

  • Proton VPN Review
  • NordVPN Review
  • Surfshark VPN Review
  • ExpressVPN Review
  • Mullvad Review
  • Private Internet Access Review
  • CyberGhost Review

VPN comparisons

  • Proton VPN vs Mullvad
  • NordVPN vs ExpressVPN
  • Surfshark vs NordVPN
  • Surfshark vs ExpressVPN
  • NordVPN vs Proton VPN
  • CyberGhost vs NordVPN
  • Surfshark vs IPVanish

VPN Guides

  • Best VPN Services
  • Cheap VPNs
  • No Logs VPNs
  • Free Trial VPNs
  • VPNs with Dedicated IP
  • VPNs for Firestick
  • VPN Coupons

Connect

About Us

Contact

Newsletter
  • X
  • Facebook
  • LinkedIn
  • YouTube

news topics

  • Security
  • Data Breach
  • Ransomware
  • Legal
  • Software
  • Windows
  • Privacy
  • Hardware
  • Android
  • iOS
  • Phishing
  • Cloud

Reviews

  • Secure Email Services
  • Password Managers
  • Secure Browsers
  • Best VPN Services
  • Identity Theft Protection
  • Private Search Engines
  • Best Data Removal Services

Copyright © 2026 · CyberInsider.com · All Rights Reserved · Privacy Policy ·  Terms of Use · Contact