Safety List 2025 - 2026 2025 2024 2023 2021 2020 2019 2018
DATE | NAME |
Info | CATEG. |
WEB |
| 23.11.25 | Avast Makes AI-Driven Scam Defense Available for Free Worldwide | Avast is rolling out Scam Guardian, a free AI-powered protection layer that analyzes websites, messages, and links to detect rising scam threats. Powered by Gen Threat Labs data, it reveals hidden dangers in code and adds 24/7 scam guidance through the Avast Assistant. | Safety | |
| 23.11.25 | GlobalProtect VPN portals probed with 2.3 million scan sessions | A major spike in malicious scanning against Palo Alto Networks GlobalProtect portals has been detected, starting on November 14, 2025. | Safety | |
| 14.11.25 | Mozilla Firefox gets new anti-fingerprinting defenses | Mozilla announced a major privacy upgrade in Firefox 145 that reduces even more the number of users vulnerable to digital fingerprinting. | Safety | |
| 14.11.25 | NAKIVO Introduces v11.1 with Upgraded Disaster Recovery and MSP Features | NAKIVO Backup & Replication v11.1 expands disaster recovery with real-time replication, enhanced Proxmox VE support, and granular physical backups. The update adds MSP Direct Connect for secure client management and a multilingual interface supporting seven languages. | Safety | |
| 8.11.25 | The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools | Attackers exploit web browsers' built-in behaviors to steal credentials, abuse extensions, and move laterall, slipping past traditional defenses. Learn from Keep Aware how browser-layer visibility and policy enforcement stop these hidden threats in real time. | Safety | |
| 3.10.25 | Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake | Microsoft on Tuesday unveiled the expansion of its Sentinel Security Incidents and Event Management solution (SIEM) as a unified agentic platform with the general availability of the | Safety | The Hacker News |
| 10.9.25 | Memory Integrity Enforcement: A complete vision for memory safety in Apple devices | Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort, spanning half a decade, that combines the unique strengths of Apple silicon hardware with our advanced operating system security to provide industry-first, | Safety | Apple.com/blog |
| 6.9.25 | Microsoft to enforce MFA for Azure resource management in October | Starting in October, Microsoft will enforce multi-factor authentication (MFA) for all Azure resource management actions to protect Azure clients from unauthorized access attempts. | Safety | |
| 23.8.25 | Why email security needs its EDR moment to move beyond prevention | Email security is stuck where antivirus was a decade ago—focused only on prevention. Learn from Material Security why it's time for an "EDR for email" mindset: visibility, post-compromise controls, and SaaS-wide protection. | Safety | |
| 15.6.25 | Cloudflare: Outage not caused by security incident, data is safe | Cloudflare has confirmed that the massive service outage yesterday was not caused by a security incident and no data has been lost. | Safety | |
| 14.6.25 | Designing Blue Team playbooks with Wazuh for proactive cyber defense | Designing Blue Team playbooks with Wazuh for proactive cyber defense | Safety | |
| 1.6.25 | Microsoft Authenticator now warns to export passwords before July cutoff | The Microsoft Authenticator app is now issuing notifications warning that the password autofill feature is being deprecated in July, suggesting users move to Microsoft Edge instead. | Safety | BleepingComputer |
| 18.5.24 | New Tor Oniux tool anonymizes any Linux app's network traffic | Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections. | Safety | |
| 11.5.24 | Doubling down: How Universal 2nd Factor (U2F) boosts online security | Passwords alone aren't cutting it—31% of breaches involve stolen credentials. Learn from Specops Software about how Universal 2nd Factor (U2F) and strong password policies can work together to keep your organization secure. | Safety | BleepingComputer |
| 10.4.25 | AWS rolls out ML-KEM to secure TLS from quantum threats | Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager, making TLS connections more secure. | Safety | |
| 5.4.25 | Google rolls out easy end-to-end encryption for Gmail business users | Google has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient. | Safety | |
| 2.4.25 | Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform | On the 21st birthday of Gmail , Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email | Safety | |
|
30.3.25 |
Vivaldi integrates Proton VPN into the browser to fight web tracking | Vivaldi has announced the integration of Proton VPN directly into its browser without requiring add-on downloads or plugin activations, allowing users to protect their data against 'Big Tech' surveillance for free. | Safety | |
| 14.3.25 | GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging | The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications | Safety | The Hacker News |
|
24.2.25 | Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats | Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service ( Cloud KMS ) for software-based keys as a way to | Safety | The Hacker News |
|
3.1.25 | Apple offers $95 million in Siri privacy violation settlement | Apple has agreed to pay $95 million to settle a class action lawsuit in the U.S. alleging that its Siri assistant recorded private conversations and shared them with third parties. | Safety | BleepingComputer |