
Proton is privacy by default. Welcome to a better internet where privacy and freedom come first. Our encrypted services help you fight for a better internet that is secure and private by default.
Is ChatGPT Atlas safe? What you should know before you download it
OpenAI’s ChatGPT Atlas brings AI directly into your browser — but at what cost? Here’s what researchers say about privacy and security risks.
AWS outage takes down half the internet. Here’s how we fix it.
An AWS outage is disrupting Alexa, Slack, and other major platforms. Here's what it shows on our reliance on Big Tech and how to respond.
Introducing Lumo 1.2 with dark mode and customized chats
Lumo 1.2 offers customization without selling your data or ingesting it into its model. And dark mode! Find out more.
70,000 government IDs leaked in Discord data breach
A huge ID photo breach at Discord shows that age verification laws should not be enforced until robust privacy protections are in place.
The hidden risks of AI chat logs and what you’re really giving away
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
This streamer got deepfaked. Then the men showed up at her door.
Sweet Anita, one of Twitch’s most recognizable streamers, took all the right precautions. Then she got deepfaked.
How to get to inbox zero: Privacy-first inbox organization tips
The inbox zero method still works. Here's how to organize your inbox, simplify your workflow, and free up time for your most important tasks.
A complete guide to the new 2025 NIST password guidelines
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
Built for speed and the future: Introducing Proton Mail’s brand new mobile apps
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
How to send a follow-up email after an interview (templates included)
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.

⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen accounts to fake job (…)
27 October

Qubes OS 4.3.0-rc3 is available for testing
We’re pleased to announce that the third release candidate (RC) for Qubes OS 4.3.0 is now available for testing. This minor release includes many new (…)
27 October

Medusa Ransomware Leaks 834 GB of Comcast Data After $1.2M Demand
Medusa ransomware leaks 186 GB of Comcast data, claiming 834 GB stolen after a $1.2M ransom demand apparently went unpaid.
23 October

The Future of SOCs in Enterprise Cybersecurity
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Oct. 21, 2025 – Read the full story from Cloud Security Alliance (…)
21 October