Bug Bounty for VPN 0-day exploits: NordVPN, ExpressVPN, Surfshark

“These vulnerabilities could just as easily be abused to violate countless people’s privacy who are using VPN services for legitimate purposes,”

(PDF) THE ANATOMY OF RUSSIAN INFORMATION WARFARE THE CRIMEAN OPERATION, A CASE STUDY

This text is an attempt to provide an interpretation of information warfare with the background of Russian geopolitical theory and practice.

VPN Exposes Data for 1M Users, Leading to Researcher Questioning | Threatpost

Free virtual private network (VPN) service Quickfox, which provides access to Chinese websites from outside the country, exposed the personally identifiable information (PII) of more than a million users in just the latest high-profile VPN security failure. Threatpost

Bugs in our Pockets:The Risks of Client-Side Scanning

“The only electronic security in the age of computers is not having any computers.” from 'Victoria' by William S. Lind.

Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries – The Grayzone

“the objective of Cognitive Warfare is to harm societies and not only the military.”

Ongoing Cyber Threats to U.S. Water and Wastewater Systems | CISA

This activity—which includes attempts to compromise system integrity via unauthorized access—threatens the ability of WWS facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities.CISA