
70,000+ Government IDs Leaked in Discord x Zendesk Breach
Data BreachStory summary: Customer support data tied to Discord was exposed after a Zendesk vendor account was compromised. Leaked items include uploaded documents and attachments, including government ID images for account appeals. Impact review is ongoing while Discord contacts affected users and rotate internal credentials. What’s next? Watch for official notices sent to your account email […]

The Most Common Scams on Facebook (2025)
CybersecurityFacebook feels personal. It is filled with familiar names, faces, and memories. That sense of comfort is exactly what scammers use to their advantage. Social engineering is not about hacking software. It is about manipulating people. If you trust what you see, you are more likely to click, share, or respond. That is why Facebook […]

Home Depot’s Facial Recognition Lawsuit Raises Alarming Privacy Questions
SurveillanceFacial recognition technology is spreading rapidly, showing up in airports, stores, and even our everyday devices. While it is often promoted as a tool for security and convenience, its quiet expansion into the private sector has sparked serious debate. The latest controversy centers around Home Depot, which is now facing a major lawsuit over its […]

Salesforce Breach: What the Google Hack Means for Your Data (June-August 2025)
GoogleHackers recently compromised one of Google’s Salesforce databases, exposing sensitive data from small and medium-sized businesses. The attackers used a maliciously modified Salesforce app to carry out their campaign, raising concerns not just about corporate cybersecurity but also the broader risks posed by social engineering attacks. Social Engineering: How the Google Breach Happened Social engineering […]

What Spotify’s Digital Age Verification Rules Really Mean for You
BlogSpotify is rolling out a strict new policy in the United Kingdom: if you don’t pass an age verification check, your account could be deactivated and eventually deleted. The change is part of a growing trend toward platform compliance with government safety regulations and it’s sparking concerns about privacy, access, and digital identity. Earlier this […]

How to Keep Your Child Safe Online – 2025 Digital Footprint Guide
Digital FootprintYour child is already building an online presence – whether you realize it or not. From their first baby photo on Instagram to their comments on YouTube, everything posted online becomes part of their digital footprint. That content can follow them for years. It could be seen by friends, schools, strangers, or even future employers. […]

Tea App Exposes Over a Million Messages in Second Leak
BusinessJust days after the Tea app made headlines for leaking thousands of personal images, the situation has worsened. A second breach has now exposed over 1.1 million private messages, including sensitive conversations and contact information, prompting Tea to take its direct messaging system offline. If you read our previous post on the Tea breach, you […]

Tea App Breach: What Happened and Why It Matters for Your Privacy
Data BreachThe recently viral Tea app has recklessly mishandled user data, endangering many of the women it claimed to protect. Tea is an app that gained fast popularity as a safety tool for women navigating dating. It allows users to anonymously share reviews and warnings about men they’ve dated or matched with. The concept is rooted […]

Major Data Breach Hits Women’s Dating Safety App Tea, Exposing Thousands of User Photos and IDs
Data PrivacyIn a significant blow to user privacy, the popular women’s dating safety app Tea has suffered a massive data breach, resulting in the leak of approximately 72,000 user images, including sensitive verification selfies and government-issued IDs. The breach, first reported in late July 2025, has raised serious concerns about the security of personal data on […]

VPN Logging Policies in 2025: Which ‘No-Logs’ Providers Pass the Test?
VPNVirtual Private Networks promise to cloak your traffic, but many privacy-savvy VPN users ignore the logging policies of their VPN providers. A single retained IP address or timestamp can de-anonymize everything you do online. Below, we dissect the latest audits, police raids and subpoena battles of the world’s biggest VPNs so you can see whose […]
You can select your cookie preferences here.