Search TorWire
Find cybersecurity guides and research articles
Human Written
Proudly human-made (research, written, verified by humans). Because security demands accountability. Learn more.
Breaking internet security reports on the latest data breaches, ransomware campaigns, critical vulnerabilities, and global threat intelligence.
At TorWire, our editorial standards ensure every claim is verified with primary sources and expert input. We are transparent about authorship, corrections, and funding—because your trust requires no less.
Hungarian Government Email Breach Exposes 795 Credentials Across 12 Ministries
Jordan Vector
Last Updated: April 14, 2026
795 government email and password combos leaked across 12 of 13 ministries in…
Read More
Mozilla Slams Microsoft for Forcing Copilot on Windows Users Without Consent
Morgan Cipher
Last Updated: April 14, 2026
Mozilla argues Microsoft forced Copilot on Windows users without real consent. Microsoft admits…
Read More
FBI Atlanta Takes Down Global $20M Phishing Network
Jordan Vector
Last Updated: April 12, 2026
The FBI’s Atlanta field office and Indonesian police jointly dismantled one of the…
Read More
Dark Web Ransomware Gangs Now Use AI to Scale Up Attacks Worldwide
Jordan Vector
Last Updated: April 10, 2026
Criminals are making use of generative AI attack strategies that will significantly improve…
Read More
Hacker Claims Data Breach Affecting One Million Sterling Bank Customers Under Investigation in Nigeria
Morgan Cipher
Last Updated: April 10, 2026
A threat actor claimed they stole personal information on about 1 million customers…
Read More
Suspected Hack-for-Hire Campaign Targets MENA Journalists in Multi-Year Phishing Operation
Morgan Cipher
Last Updated: April 9, 2026
A hire-for-hack campaign orchestrated by a threat actor who allegedly has ties to…
Read More
Hacker Claims Theft of 373,000 Records From IMO360, Demands Ransom
Jordan Vector
Last Updated: April 9, 2026
A malicious actor has listed an alleged database from IMO360, a Spanish health…
Read More
Alleged Stealer Log Leak Claims Data From Apple, Google and Dozens of Global Firms
Jordan Vector
Last Updated: April 9, 2026
An alleged stealer log compromise has hit dozens of global giants including Samsung,…
Read More
North Korean Hackers Plant Malicious Packages Across Open-Source Ecosystems, Researchers Warn
Morgan Cipher
Last Updated: April 8, 2026
North Korean bad actors plant more than 1,700 vicious packages all over five…
Read More
Hacker Claims Theft of 10 Petabytes of Data From China’s Supercomputing Center
Jordan Vector
Last Updated: April 8, 2026
A hacker allegedly hit the National Supercomputing Center of China in Tianjin, moving…
Read More