Showing 1,285 to 1,296 of 2,462 results


ePrice Data Breach Exposes 6.8 Million Customer Records
On March 29th, Italian e-commerce site ePrice confirmed a data breach exposing approximately 6.8 million customer records, including personal information, email addresses, order details, and phone numbers, but not financial data, to a group known as Alcxtraze on the BreachForum dark web forum.
ePrice Data Breach Exposes 6.8 Million Customer Records
On March 29th, Italian e-commerce site ePrice confirmed a data breach exposing approximately 6.8 million customer records, including personal information, email addresses, order details, and phone numbers, but not financial data, to a group known as Alcxtraze on the BreachForum dark web forum.
Progress
36% Bias Score


Five Key Business Tech Developments This Week
This week's business tech news covers OpenAI's viral image generator, LinkedIn's marketing updates, the underreporting of cyberattacks, Otter.ai's meeting agent, and HoneyBook's AI innovations, each impacting businesses in distinct ways.
Five Key Business Tech Developments This Week
This week's business tech news covers OpenAI's viral image generator, LinkedIn's marketing updates, the underreporting of cyberattacks, Otter.ai's meeting agent, and HoneyBook's AI innovations, each impacting businesses in distinct ways.
Progress
28% Bias Score


Dutch Public Prosecution Service Investigates Major IT Outage
The Dutch Public Prosecution Service (OM) suffered a major IT outage on Friday, temporarily shutting down its internet access due to a persistent system disruption; an internal investigation ruled out a cyberattack, but the exact cause remains undisclosed, highlighting ongoing systemic IT challenges...
Dutch Public Prosecution Service Investigates Major IT Outage
The Dutch Public Prosecution Service (OM) suffered a major IT outage on Friday, temporarily shutting down its internet access due to a persistent system disruption; an internal investigation ruled out a cyberattack, but the exact cause remains undisclosed, highlighting ongoing systemic IT challenges...
Progress
36% Bias Score


Starlink's Geopolitical Impact: Ukraine, Funding, and Global Dependencies
Starlink, SpaceX's satellite internet network, provides global internet access via 7,000 satellites, funded by subscriptions and government contracts (potentially $10-20 billion from the US). Its use in Ukraine, including by the military and civilians, has created geopolitical dependencies and confl...
Starlink's Geopolitical Impact: Ukraine, Funding, and Global Dependencies
Starlink, SpaceX's satellite internet network, provides global internet access via 7,000 satellites, funded by subscriptions and government contracts (potentially $10-20 billion from the US). Its use in Ukraine, including by the military and civilians, has created geopolitical dependencies and confl...
Progress
44% Bias Score


Journalist Added to White House Secret Chat Discussing Yemen Attack
President Trump's national security team used the encrypted messaging app Signal to discuss a planned attack on Yemen, inadvertently including Atlantic journalist Jeffrey Goldberg; this led to a week-long evolving explanation from the President, shifting blame from a low-level staffer to National Se...
Journalist Added to White House Secret Chat Discussing Yemen Attack
President Trump's national security team used the encrypted messaging app Signal to discuss a planned attack on Yemen, inadvertently including Atlantic journalist Jeffrey Goldberg; this led to a week-long evolving explanation from the President, shifting blame from a low-level staffer to National Se...
Progress
44% Bias Score


CoffeeLoader Malware Uses GPUs for Evasion and Credential Theft
CoffeeLoader, a new infostealer malware family, uses system GPUs to evade detection, download second-stage payloads (infostealers), compromise user credentials, and facilitate password trading on the dark web; this was detailed in a March 26 report by Zscaler.
CoffeeLoader Malware Uses GPUs for Evasion and Credential Theft
CoffeeLoader, a new infostealer malware family, uses system GPUs to evade detection, download second-stage payloads (infostealers), compromise user credentials, and facilitate password trading on the dark web; this was detailed in a March 26 report by Zscaler.
Progress
40% Bias Score

Signal Downloads Surge After US Military Secrets Leak
Following a leak of US military secrets via a Signal group chat including VP JD Vance and Atlantic editor Jeffrey Goldberg, global downloads of the Signal messaging app surged 28%, with US downloads rising 45% and Yemen downloads increasing by 42% on Monday, highlighting its secure encryption.

Signal Downloads Surge After US Military Secrets Leak
Following a leak of US military secrets via a Signal group chat including VP JD Vance and Atlantic editor Jeffrey Goldberg, global downloads of the Signal messaging app surged 28%, with US downloads rising 45% and Yemen downloads increasing by 42% on Monday, highlighting its secure encryption.
Progress
44% Bias Score

Trump Administration's Signal Leak Sparks Security Concerns
Senator Mark Warner criticized the Trump administration's use of Signal for sharing potentially classified information regarding a planned military operation in Yemen, an action he deemed "inappropriate and sloppy." The leak, revealed by the Atlantic's editor-in-chief, included details about the ope...

Trump Administration's Signal Leak Sparks Security Concerns
Senator Mark Warner criticized the Trump administration's use of Signal for sharing potentially classified information regarding a planned military operation in Yemen, an action he deemed "inappropriate and sloppy." The leak, revealed by the Atlantic's editor-in-chief, included details about the ope...
Progress
40% Bias Score

Medusa Ransomware Exploits 'Time-Travel' Hacking Technique
The Medusa ransomware attacks, targeting at least 300 critical infrastructure systems, exploited a time-travel hacking technique by changing system dates to validate expired 2012 security certificates, bypassing security controls; the FBI advises immediate mitigation.

Medusa Ransomware Exploits 'Time-Travel' Hacking Technique
The Medusa ransomware attacks, targeting at least 300 critical infrastructure systems, exploited a time-travel hacking technique by changing system dates to validate expired 2012 security certificates, bypassing security controls; the FBI advises immediate mitigation.
Progress
48% Bias Score

SignalGate Exposes Systemic Cybersecurity Failures Among US Officials
High-ranking US officials accidentally leaked classified information about military operations in Yemen through a Signal group chat that included a journalist, revealing widespread failures in cybersecurity practices among government officials and exposing vulnerabilities from public Venmo accounts ...

SignalGate Exposes Systemic Cybersecurity Failures Among US Officials
High-ranking US officials accidentally leaked classified information about military operations in Yemen through a Signal group chat that included a journalist, revealing widespread failures in cybersecurity practices among government officials and exposing vulnerabilities from public Venmo accounts ...
Progress
52% Bias Score

Judge Orders Preservation of Messages in US Military Strike Security Breach
A US federal judge ordered the preservation of Signal messages discussing planned US military strikes against Yemeni Houthis after a journalist was mistakenly added to a group chat including top officials like Pentagon chief Pete Hegseth and Vice President J. D. Vance, prompting a lawsuit and concer...

Judge Orders Preservation of Messages in US Military Strike Security Breach
A US federal judge ordered the preservation of Signal messages discussing planned US military strikes against Yemeni Houthis after a journalist was mistakenly added to a group chat including top officials like Pentagon chief Pete Hegseth and Vice President J. D. Vance, prompting a lawsuit and concer...
Progress
40% Bias Score

U.S. Security Breach: No Dismissals After Signal Chat Leak
A journalist was mistakenly added to a Signal group chat where top U.S. officials, including Vice President J.D. Vance, discussed upcoming strikes on Yemeni Houthi rebels; despite calls for resignations, no one was dismissed, though the incident sparked political controversy and raised questions abo...

U.S. Security Breach: No Dismissals After Signal Chat Leak
A journalist was mistakenly added to a Signal group chat where top U.S. officials, including Vice President J.D. Vance, discussed upcoming strikes on Yemeni Houthi rebels; despite calls for resignations, no one was dismissed, though the incident sparked political controversy and raised questions abo...
Progress
40% Bias Score
Showing 1,285 to 1,296 of 2,462 results