About CyberHappenings

What is CyberHappenings?

CyberHappenings is a news aggregator and wiki for tracking cybersecurity events, or as our founder calls it, “happenings.” Each happening collects all related news articles in one place, ordered by their release. This makes it easier to follow how details develop over time.

Every happening has a short summary and a list of key information with direct links back to the source articles. The summaries are there for quick browsing, but the real value is in the sourcing, and you can always go straight to the original articles for full context.

Who is it for?

CyberHappenings is for security pros, researchers, threat intelligence and SOC analysts, incident responders, and anyone who wants a clear, sourced view of how cyber events unfold. It also helps teams find IOCs covered in the news and browse happenings with filters like source and victim country, along with many others.

How to use it?

On the front page, the News Summary shows the most notable happenings from the last 48 hours or last week. It gives you a quick catch up on what is happening in cyberspace right now.

You can also browse individual happenings on the Browse page, filter them as you like, and list them across longer time periods.

What makes it different?
  • Event-first timelines instead of scattered headlines
  • Direct sourcing and key information with links to originals
  • Powerful filters like source and victim country
  • Fast, lightweight pages that respect your device
  • No invasive ads and no tracking
Why was CyberHappenings built?

We started CyberHappenings because we were frustrated with how scattered and repetitive cybersecurity news can be. Multiple outlets often cover the same story, and it’s hard to keep track of what’s actually new.

When large language models emerged, we realized we could use them for natural language classification to categorize and merge multiple stories into one happening and show how details evolve across coverage.

Where is it going?

CyberHappenings is constantly being updated and improved. We have a few ideas for making it better, and we also appreciate feedback and new ideas from users. New sources, CVE tracking, threat actor specific pages, and much more are on the way. For now, we are focusing on adding more sources.

Got a suggestion? Send your ideas to the email provided on the contact page.

Privacy & use policy

There are no invasive ads or analytics on this site. We only keep standard network request logs, for example page fetches, needed for basic operations and security. We also use Cloudflare for CDN delivery and protection purposes.

You are free to browse and use the information on this website. Scraping or other automated use by companies is not allowed without asking first. Please reach out via the contact page for permission.

Thank you for visiting CyberHappenings. We hope you enjoy it!