We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Latest News: Cybersecurity

Meta has released a report stating that cybercriminals are increasingly spreading malware via fake ChatGPT tools across Facebook, Instagram, and WhatsApp. Attackers are taking advantage of the popularity of the AI chatbot to lure unsuspecting users into downloading malicious browser extensions that

Keira Waddell Published on 5th May 2023

Google has obtained a temporary court order from a US District Court in a bid to disrupt the distribution of CryptBot, a Windows-based malware designed to steal sensitive information. The court order empowers the tech giant to disrupt the infrastructure and distribution network of CryptBot, which

Zane Kennedy Published on 2nd May 2023

A new macOS stealer malware is being sold to cybercriminals via the messaging service Telegram for the steep price of $1000. The malware is a 64-bit Go-based program designed to target macOS systems specifically. Its main purpose is to steal sensitive information, such as keychain passwords, local

Husain Parvez Published on 30th April 2023

Netwrix, the cybersecurity solutions provider, released its annual worldwide 2023 Hybrid Security Trends Report. According to the report, 68% of organizations faced a cyberattack within the last year. Among them, 16% estimated that the financial damage was at least $50,000, 40% faced unplanned

Husain Parvez Published on 27th April 2023

Russian hacking group APT28 has been exploiting a six-year-old vulnerability in Cisco routers to deploy malware and carry out surveillance on both individuals and organizations in the United States, Europe, and Ukraine. The state-sponsored group has been using an old vulnerability,

Zane Kennedy Published on 25th April 2023

GuidePoint Security has released the GuidePoint Research and Intelligence Team’s (GRIT) Q1 2023 Ransomware Report. Within it, GRIT tracked 849 publicly posted ransomware victims claimed by 29 different threat groups in Q1 2023, which is a 25% increase compared to Q4 2022. Manufacturing,

Husain Parvez Published on 23rd April 2023

NCR Global, the American software and technology company, has suffered an outage of its Aloha point-of-sale (POS) platform across several restaurants. After a few days of radio silence, NCR disclosed the outage was caused by a ransomware attack on a data center responsible for powering the service.

Husain Parvez Published on 19th April 2023

Cybercriminals are hacking websites to show fake Google Chrome errors that push users to install a malicious file to update. Initiated in November 2022, this campaign's intensity increased after February 2023, as NTT security analyst Rintaro Koike noted. The operation has since broadened its scope

Husain Parvez Published on 16th April 2023

Microsoft’s April 2023 Patch Tuesday released several security updates, which included a patch for a zero-day vulnerability affecting all supported Windows versions. This vulnerability in the Windows Common Log File System (CLFS) could give hackers access to an unpatched system. Microsoft confirmed

Keira Waddell Published on 14th April 2023