Photo: Glen Carrie News Polish Authorities Arrest Russian National on Cybercrime Charges Polish cybercrime units arrest a Russian citizen suspected of hacking an e-commerce system. Investigation into potential links to broader attacks ongoing. Editorial Team • 1 min read
Photo: julien Tromeur Threat Horizon Beyond Text: Why Bi-Modal Adversarial Attacks Are the New Threat to AI Safety New research exposes a critical flaw in VLM defenses: the Bi-Modal Adversarial Prompt (BAP) attack. Learn how this compromises AI safety. Editorial Team • 4 min read
Photo: Growtika Skills Lab Digital Sovereignty: The Definitive Guide to Self-Hosting an Encrypted DNS Server The era of passive trust is over. Deploying your own encrypted DNS server using the DNSCrypt project is the essential first step toward securing your network metadata and achieving digital sovereignty. Editorial Team • 6 min read
Illustration - WhatsApp ban in Russia GeoSphere Russia Threatens WhatsApp Ban: What Users Need to Know Russia's Roskomnadzor threatens complete WhatsApp block over alleged security violations. 96M users face potential ban. Editorial Team • 3 min read
Bangladesh data protection (Illustration) GeoSphere Bangladesh Enacts Data Protection Law with Localization Rules Bangladesh has joined the growing number of nations implementing comprehensive data protection legislation. On November 6, 2025, the country's president formally enacted the Personal Data Protection Ordinance (PDPO), establishing a regulatory framework that borrows from European models while incorporating distinctive requirements tailored to local priorities. The ordinance took Editorial Team • 6 min read
News London Councils Hit by Major Cyber Attack Inadequate security leads to breaches. Breaches drain resources through recovery costs and regulatory penalties. Editorial Team • 4 min read
North Korean Military Personnel Inside an AI Server Operations Room (Ilustration) GeoSphere North Korea's AI Arsenal: Military-Grade Tech Revealed The INSS report recommends systematic monitoring of North Korean image and voice-based AI research, coupled with policy measures to constrain military and cyber applications of these emerging technologies. Editorial Team • 3 min read
TSMC News Taiwan Prosecutors Raid Homes in Escalating TSMC Trade Secret Case Taiwanese prosecutors have dramatically escalated the legal confrontation between global chip behemoths TSMC and Intel, confirming raids on the homes of a former top TSMC executive accused of misappropriating highly sensitive intellectual property. The executive, Lo Wei-jen, who was instrumental in developing the contract manufacturer's most advanced chip Editorial Team • 2 min read
News Official Announcement: Welcome to the New Security Land! We've completed a major platform upgrade prioritizing lightning-fast speed and security. Click to see the new changes, then subscribe for free updates and upgrade your status to Member for free. Editorial Team • 2 min read
Cyber Watch Critical Vulnerability Discovered in FortiWeb - Active Attacks Detected A severe security vulnerability has been discovered in FortiWeb, Fortinet’s web application firewall (WAF) solution. The company has confirmed that the flaw is already being actively exploited and is urging all users to take immediate action. Security Advisory Details Fortinet released a security advisory on November 14, 2025, disclosing Editorial Team • 1 min read
Swiss Cyber Storm 2025 (Photo: Security.land, reader submission) Business Shield Swiss Cyber Storm 2025 Kicks Off: “Resilience in a Mad, Mad World” Sets the Tone The cybersecurity community converges in Bern this morning as Swiss Cyber Storm 2025 kicks off at Kursaal Bern. Under the compelling theme “Resilience in a Mad, Mad World,” this year’s edition marks a significant evolution for Switzerland’s premier IT security conference, introducing fresh formats alongside its signature analytical Editorial Team • 2 min read
News Global Experts to Gather in Tokyo for Cyber Intelligence Summit 2025 As cyber threats grow more advanced and borderless, organizations face a critical challenge: how to acquire, analyze, and act on threat intelligence effectively. Addressing this issue, Machina Record will host the Cyber Intelligence Summit 2025 in Tokyo from November 5–7, 2025 — bringing together top domestic and international experts to Editorial Team • 1 min read
Cyber Watch U.S. Authorities Warn of Zimbra Vulnerability Exploited in Zero-Day Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a newly discovered vulnerability affecting the Zimbra Collaboration Suite (ZCS) — a widely used email and collaboration platform developed by Synacor. According to CISA’s October 7, 2025 update, the flaw has been actively exploited in the Editorial Team • 1 min read
Business Shield Gartner Predicts Shift to Preemptive Cybersecurity by 2030 Gartner has outlined a bold vision for the future of cybersecurity in the era of generative AI. According to its latest announcement on September 18, 2025, the traditional model of detection and response (DR) will give way to preemptive security as the new global standard. By 2030, Gartner forecasts that Editorial Team • 2 min read
News Tor Project Joins the Rust Foundation as an Associate Member The Tor Project, known worldwide for advancing privacy and digital rights, has officially joined the Rust Foundation as an Associate Member. This move reflects Tor’s deepening investment in Rust, particularly through Arti, its next-generation Tor client written entirely in the Rust programming language. Welcoming New Rust Foundation Members Alongside Editorial Team • 1 min read
GeoSphere Belgium Strengthens Cyber Defense with Strategic RMA–Cyber Command Partnership Belgium has taken another major step in reinforcing its national cyber defense. Following the Protocol of Agreement signed on June 26, 2023, the Royal Military Academy (RMA) in Brussels and the Cyber Command of the General Intelligence and Security Service (SGRS/ADIV) have formalized an implementation agreement to boost collaboration Editorial Team • 2 min read