Author: HackWatchit

Split tunnel vs full tunnel VPN: What’s the difference? The type of VPN tunnel you choose affects your VPN security and VPN performance. The good news? Understanding VPN tunnels is easy. A full tunnel VPN encrypts all internet traffic. Full tunnel sends traffic from all apps to a secure VPN server. A split tunnel VPN lets you control how you encrypt traffic. With split tunneling enabled, you can choose which apps or websites use the VPN. So, when should you use split tunneling versus full tunneling? That depends on whether you need system-wide privacy, flexible access, strong public Wi-Fi security, or…

Read More

Something interesting happened last week. A programmer by the name of Matthew Garrett gained access to the lighting and window controls to nearly every room of a hotel he was staying in. (You can read his post here:http://mjg59.dreamwidth.org/40505.html#cmt1611577) This made me think about network connected devices and home network security. I, too, have smart lights, and call me paranoid, but I don’t want someone gaining access to my systems. Apart from the annoyance of them being “funny” and changing my lights randomly, it could give them insight to when I’m awake, and when I’m home. (Granted, if they sat in…

Read More

The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. The commissioner, Meike Kamp, alleges that DeepSeek’s owner, Hangzhou DeepSeek Artificial Intelligence, based in Beijing, unlawfully collects data from German users and transfers them for processing in servers in China. As per the GDPR and Article 46 (1) specifically, any personal data collected from individuals in the European Union must be protected according to the standards upheld by the regulatory act. However, China has very lax data protection regulations and a history of excessive data…

Read More

Denmark moves to protect personal identity from deepfakes with new copyright law Pierluigi Paganini June 30, 2025 Denmark plans to let citizens copyright their face, body, and voice to combat deepfakes under a new law strengthening personal digital rights. Denmark plans to amend its copyright law to give individuals rights over their body, face, and voice, to combat AI-generated deepfakes. Believed to be the first law of its kind in Europe, the proposal has broad political support and will be submitted for consultation before summer, with a formal amendment expected in the autumn. “The Danish government is to clamp down…

Read More

Nearly three out of four European IT and cybersecurity professionals say staff are already using generative AI at work, up ten points in a year, but just under a third of organizations have put formal policies in place, according to new ISACA research. The use of AI is becoming more prevalent within the workplace, and so regulating its use is best practice. Yet 31% of organizations have a formal, comprehensive AI policy in place, highlighting a disparity between how often AI is used versus how closely it’s regulated in workplaces. Policies work twofold to enhance activity and protect businesses AI…

Read More

Artificial intelligence (AI) is a present-day force that’s being exploited by threat actors to scale attacks, manipulate perception, and erode trust with a precision and speed that simply wasn’t possible five years ago. With everything from deepfake-enabled fraud to multilingual phishing campaigns and jailbroken Large Language Models (LLMs), malicious innovation is rapidly advancing, and organizations must outpace it. Between January 1 and May 30, 2025, threat intelligence analysts from Flashpoint observed more than two and a half million AI-related posts: jailbreak prompts, deepfake service ads, phishing toolkits, and bespoke language models built for fraud and cybercrime.  The firm has just released a new report titled…

Read More

In the world of cryptocurrency, where exchanges can appear and vanish in the blink of an eye, a decade of continuous operation is more than a milestone, it’s a testament to resilience, security, and trust. BTCC, founded in the nascent days of Bitcoin in 2011, is one of these rare veterans. But in today’s hyper-competitive market, does this pioneer still have what it takes to serve the modern trader and investor? To find out, we embarked on a comprehensive, hands-on review of the BTCC platform. This isn’t just a summary of features, we used demo capital, 100,000 USDT to be…

Read More

What you need to know about SCA tools Quick Answer: The top SCA tools in 2025 are Mend.io (best for automated remediation and proactive SCA), Sonatype Lifecycle (known for enterprise policy management), Snyk (known for developer experience), and Checkmarx SCA (known for comprehensive coverage). According to industry reports, organizations using SCA tools can reduce vulnerability remediation time by up to 80%. Key Statistics: 96% of applications contain open-source components 85% of software projects contain at least one outdated open source component  Codebases contain at least one known vulnerability Supply chain attacks have become a significant threat to organizations According to…

Read More

Darin Roberts // ADVISORY: The techniques and tools referenced within this blog post may be outdated and do not apply to current situations. However, there is still potential for this blog entry to be used as an opportunity to learn and to possibly update or integrate into modern tools and techniques. According to the Identity Theft Resource Center, there were 781 data breaches tracked in 2015.  That is, on average, over 2 per day.  And that represents only the data breaches that were reported by legal requirements or that were reported by news media.  This is the second highest year…

Read More