We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News

Proofpoint researchers have unveiled a sophisticated phishing campaign orchestrated by the notorious hacking group TA547, which uses a malicious PowerShell script that seems to be AI-written. The campaign, which specifically targeted German organizations, attempted to deliver Rhadamanthys malware,

Husain Parvez Published on 14th April 2024

Greylock McKinnon Associates, Inc. (GMA), a Boston consulting firm, experienced a data breach that exposed the Medicare information of 341,650 individuals. Originally detected on May 30, 2023, the breach resulted from a sophisticated cyberattack targeting sensitive data. Notifications regarding

Hendrik Human Published on 13th April 2024

Change Healthcare, an affiliate of UnitedHealth Group, is once again grappling with a ransomware threat. This development follows a recent incident where UnitedHealth Group allegedly shelled out $22 million to the Alphv/BlackCat gang to resolve a previous ransomware attack, as detailed in an

Husain Parvez Published on 11th April 2024

Over 14 million internet browser cookies linked to UK consumers have been leaked onto the dark web. A recent study from NordVPN revealed the leak. This disclosure is part of a larger global issue, with more than 54 billion cookies found leaked worldwide, impacting users in 244

Keira Waddell Published on 9th April 2024

On the 1st of February 2024, the popular survey platform, SurveyLama, suffered a data breach, compromising 4.4 million users’ information. The information implicated in the breach includes users’ email addresses, names, passwords, and more. The creator of Have I Been Pwned, Troy Hunt, was

Hendrik Human Published on 7th April 2024

The Indian government's cloud service, S3WaaS, has exposed the sensitive personal information of its citizens for years. As reported by TechCrunch, security researcher Sourajeet Majumder discovered the issue, revealing that Aadhaar numbers, COVID-19 vaccination data, and passport details were among

Husain Parvez Published on 6th April 2024

The video game publisher Activision is currently investigating a sophisticated malware campaign designed to steal login credentials from gamers, particularly affecting players of its flagship title, Call of Duty. The malware, which also targets cryptocurrency wallets, has been implicated in the

Husain Parvez Published on 4th April 2024

AT&T has confirmed a data breach affecting over 73 million of its current and former customers. This breach, which saw sensitive customer information leaked onto the dark web, has prompted the telecommunications giant to reset the passcodes of millions of customer accounts in a bid to secure

Keira Waddell Published on 2nd April 2024

A recent report by HUMAN's Satori team uncovered 28 free VPN applications available on Google Play that are covertly transforming devices into residential proxies. In other words, it allows malicious threat actors to route third-party traffic through user’s devices without their knowledge or

Hendrik Human Published on 31st March 2024