We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News: Cybersecurity

LinkedIn users are currently being targeted by hackers in a widespread attack. The recent offensive has resulted in many hijacked accounts, with frustrated users struggling to regain control. The attackers are using diverse tactics, including the use of stolen credentials from previous data

Keira Waddell Published on 18th August 2023

In an analysis, cybersecurity firm Hudson Rock found that hacking forum credentials associated with 120,000 computers were compromised by info-stealer malware. Researchers analyzed one hundred prominent cybercrime forums, and found within its intelligence database — which boasts data from more

Zane Kennedy Published on 16th August 2023

Proofpoint Inc. has released a report highlighting the surge in the popularity of EvilProxy, particularly in its use for targeting Microsoft 365 accounts of top-level executives within prominent companies. Cybercriminals favor these kits due to their minimal requirement for technical expertise or

Husain Parvez Published on 13th August 2023

Cybersecurity firm CYFIRMA has uncovered a sophisticated spear messaging campaign targeting WhatsApp users in South Asia. The attack involves leading users to install a malicious Android app named "SafeChat". The app then stealthily steals sensitive user data, including call logs, texts, and GPS

Zane Kennedy Published on 8th August 2023

Guardio Labs security researchers uncovered a new, unpatched exploit in Salesforce email servers that resulted in an advanced email phishing campaign. The vulnerability allowed hackers to craft phishing emails under the company's email servers and domain, which were then used to target Facebook

Husain Parvez Published on 7th August 2023

In a wave of cyber attacks that have sent shockwaves through the European banking sector, users of multiple financial institutions have fallen victim to the insidious SpyNote Android spyware. The notorious malware, traditionally known for espionage and data collection, has recently been repurposed

Zane Kennedy Published on 7th August 2023

Google's fourth annual year-in-review of zero-day exploits emphasized the concerning issue of n-days on Android acting as effective 0-days for threat actors. Due to long delays in distributing and incorporating patches, threat actors are able to exploit n-day vulnerabilities that have yet to be

Husain Parvez Published on 3rd August 2023

The cyber threat landscape has taken a sinister turn in recent weeks with the emergence of AI tools designed explicitly for malicious activities. According to recent findings by the Netenrich threat research team, a new generative AI-driven model known as “FraudGPT” has been making waves on the

Zane Kennedy Published on 1st August 2023

Cybersecurity researchers have discovered a new variant of the notorious AsyncRAT malware. Dubbed HotRat, the trojan is actively spreading through pirated versions of popular software, including video games, image and sound editing tools, and Microsoft Office. According to Avast security

Zane Kennedy Published on 26th July 2023