Specialized Cyber Security Search
Expert-tuned relevance
4CyberSecurity is a focused search engine built for people who need precise, relevant results about Cyber Security. It aggregates multiple specialized indexes, expert-ranked signals, and AI-driven summaries so you can find CVE entries, vendor guidance, tools, research papers, and related services without sifting through general web noise. Part of the 4SEARCH network of topic specific search engines.
Why vulnerability reports stall inside shared hosting companies
10+ min ago (742+ words) Security teams keep sending vulnerability notifications, and the same pattern keeps repeating. Many alerts land, few lead to fixes. A new qualitative study digs into what happens after those reports arrive and explains why remediation so often stops short. The research comes from the Center for Information Security Saarbr'cken and is based on in depth interviews with 24 hosting provider organizations across shared hosting, VPS services, and web agencies. The researchers focused on how providers receive, process, and act on vulnerability notifications, rather than testing new notification formats or channels. Most hosting providers in the study knew what vulnerability notifications were and said they receive them regularly. Only three of the 24 interviewees were unfamiliar with the concept. WHOIS records, abuse mailboxes, and provider portals remain the main entry points for these reports. Providers reported that notifications usually make it to the…...
Pornhub hit by huge security breach as 200 million users' search history stolen
15+ min ago (304+ words) The adult site has reached out to more than 200 million premium users PORNHUB has been hacked in a major security breach " with premium users warned their data could have been stolen. Hacking group ShinyHunters claimed to have accessed sensitive information such as email addresses, search history and activity. Pornhub has since reached out to more than 200 million premium users, warning their data may have been stolen during the breach. Hackers are said to be blackmailing the pornography platform after search and watch history was reportedly stolen. Issuing a statement, the adult site confirmed "unauthorised access" had been gained through a third party data company. It said: "We recently learned that an unauthorised party gained unauthorised access to analytics data stored with Mixpanel, a third-party data analytics service provider. "The unauthorised party was able to use this unauthorised access to extract…...
Microsoft could be making it harder for you to stay on Windows 10
20+ min ago (465+ words) It's no secret that Microsoft ended support for Windows 10 back in October. The decade-old software launched in 2015 is no longer receiving any sort of security updates, meaning it is technically now less safe to be using it. Microsoft offers Windows 11 as a free update for anyone with a Windows 10 PC, but some older machines may not be powerful enough to run the new version, which is partly why Microsoft is also offering a year of extra security updates via its Extended Security Updates programme. But some PC users just want to stay on Windows 10. According to the latest data from Statcounter, 53.8 percent of Windows users globally are on Windows 11, but a huge 42.6 percent are still running Windows 10. Some prefer the look and feel, some are worried about Windows 11 running on their computers, and others don't like being forced to update…...
Apple Confirms iPhone Users Must Upgrade iOS 18 To iOS 26.2 Now
27+ min ago (420+ words) It was the killer question for millions of iPhone users " has the time finally come when iOS 18 is no longer an option. You must update your iPhone " that is clear. Apple has warned devices are now under attack. But iOS 18.7.3 also fixed the vulnerabilities, and it seemed users would have a choice. But that's not the case. The general release of iOS 18.7.3 has now confirmed what many users feared. It is for the "iPhone XS, iPhone XS Max and iPhone XR" only. That means just for phones still eligible for support but not capable of running the newer iOS 26 release. This is a huge risk. Millions of iPhone users have been holding off upgrading to iOS 26, perhaps given storage or an acute dislike of the new UI, including Liquid Glass. But now is not the time to make a point....
Firewall and governance for your LLM usage
32+ min ago (70+ words) [manikant92] PromptShield AI " An AI Cost & Risk Firewall Built with Xano Manikant Kella " Dec 14 #devchallenge #xanochallenge #ai #backend Xano AI-Powered Backend Challenge: Public API Submission Templates let you quickly answer FAQs or store snippets for re-use. Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink. Hide child comments as well...
32+ min ago (343+ words) While the full scale of the breach remains under investigation, early reports suggest the stolen information includes highly sensitive behavioral data, such as search histories, video viewing habits, and download logs. The claims first surfaced via the cybersecurity news site Bleeping Computer, which reported that the hackers had begun sending extortion demands to Pornhub. To support their claims, ShinyHunters provided a sample of the data to several news outlets. Coupang Data Breach: E-Commerce Giant Admits Personal Information of 33.7 Million Customers Compromised, Says Report. The origin of the data has become a point of contention between Pornhub and its service providers. In a statement issued on December 12, Pornhub disclosed that a security incident at third-party analytics provider Mixpanel had exposed "a limited set of analytics events" for some Premium users. Pornhub emphasized that its own core systems were not breached and…...
⚡Is Your Pornhub Data Leaked? ShinyHunters Target Premium Subscribers in New Breach
34+ min ago (119+ words) Read Latest World News Quickly Here | Hackers from the ShinyHunters group claim to have stolen sensitive data from millions of Pornhub Premium users. While Pornhub attributes the leak to a third-party analytics provider, experts warn of severe privacy risks, including extortion and doxxing. The breach exposes viewing habits and emails, though financial data remains secure. " Is Your Pornhub Data Leaked? ShinyHunters Target Premium Subscribers in New Breach. Hackers from the ShinyHunters group claim to have stolen sensitive data from millions of Pornhub Premium users. While Pornhub attributes the leak to a third-party analytics provider, experts warn of severe privacy risks, including extortion and doxxing. The breach exposes viewing habits and emails, though financial data remains secure....
37+ min ago (801+ words) Your first successful project on the AWS Cloud, perhaps a cloud r'sum' or a static website, marks a significant milestone. Yet, deployment is only half the battle. To fortify this new public endpoint, integrating a Web Application Firewall (WAF) isn't just an option; it is the standard best practice for maintaining a defensible security posture from day one. WAF is an AWS security tool that helps protect your endpoints from web attacks. Through Web ACLs(Access Control List)/Protection packs, you can define rules by which traffic will be filtered before accessing your resources. In this article, I walk you through setting up your first web ACL in the AWS environment. Let's get started! AWS Shield is a subscription service from Amazon that protects your resources against denial of service (DOS) attacks. You will not use AWS Shield in this....
Banks built rules for yesterday's crime and RegTech is trying to fix that
39+ min ago (486+ words) RegTech refers to digital tools that support compliance functions such as monitoring, reporting, and identity checks. The paper describes it as technology that strengthens oversight through data driven processes instead of manual review. It outlines a shift from after the fact controls to systems that operate during activity, which changes how institutions manage risk. The authors add that these tools place more responsibility on institutions to detect suspicious conduct and move them into a more active compliance role. The study draws on 33 papers published between 2020 and 2024 and maps how researchers have examined RegTech across customer due diligence, transaction monitoring, reporting automation, information sharing, and cost trends. The authors explain that the goal is to track how technology is reshaping the structure of compliance, not only to measure accuracy gains. They describe RegTech as a "paradigm shift in regulation and the…...
40+ min ago (162+ words) December 17, 2025 1:30 AM EST | Source: Aegis Critical Energy Defence Corp. Under the NDA, Aegis and CiTech will explore areas of mutual interest that may include: Secure and resilient energy systems Digital platforms, data, and systems integration The Confidentiality Agreement does not commit either party to a transaction or partnership but enables structured discussions while protecting proprietary and sensitive information, to allow the completion of an MOU. "This agreement enables both organizations to evaluate how our respective capabilities may align across secure energy and digital domains," said Paul Dickson, CEO of Aegis. "It represents an important step in responsibly exploring collaboration opportunities within regulated and critical infrastructure environments." Source: Aegis Critical Energy Defence Corp. 2025-12-17 1:30 AM EST Aegis Critical Energy Defence Appoints Chief Maritime Officer & Grants RSUs 2025-12-16 8:00 AM EST Aegis Critical Energy Defence Announces Commencement of OTCQB Trading Under New Symbol "QESSF" 2025-12-05 8:00 AM…...