Showing 133 to 144 of 1,730 results


Crypto Entrepreneur Arrested for Alleged Kidnapping and Torture
A 37-year-old cryptocurrency entrepreneur, John Woeltz, and 24-year-old Beatrice Folchi were arrested in Manhattan for allegedly kidnapping and torturing a 28-year-old Italian man from May 6th to May 19th in a \$30,000-per-month apartment to steal his bitcoin; the victim escaped and reported the cri...
Crypto Entrepreneur Arrested for Alleged Kidnapping and Torture
A 37-year-old cryptocurrency entrepreneur, John Woeltz, and 24-year-old Beatrice Folchi were arrested in Manhattan for allegedly kidnapping and torturing a 28-year-old Italian man from May 6th to May 19th in a \$30,000-per-month apartment to steal his bitcoin; the victim escaped and reported the cri...
Progress
28% Bias Score


Optus CEO Emphasizes AI's Role in Telecoms, Reports Strong Subscriber Growth
Optus reported 238,000 new mobile subscribers in FY2025, recovering from a data breach and outage; new CEO Stephen Rue plans to integrate AI for improved customer service and efficiency, maintaining a human-centric approach.
Optus CEO Emphasizes AI's Role in Telecoms, Reports Strong Subscriber Growth
Optus reported 238,000 new mobile subscribers in FY2025, recovering from a data breach and outage; new CEO Stephen Rue plans to integrate AI for improved customer service and efficiency, maintaining a human-centric approach.
Progress
36% Bias Score


19 Billion Passwords Leaked, Exposing Cybersecurity Vulnerabilities
Over 19 billion passwords leaked between April 2024 and April 2025 from nearly 200 data breaches, with 94% being reused or predictable, highlighting the weakness of password-based security and emphasizing the need for stronger authentication methods.
19 Billion Passwords Leaked, Exposing Cybersecurity Vulnerabilities
Over 19 billion passwords leaked between April 2024 and April 2025 from nearly 200 data breaches, with 94% being reused or predictable, highlighting the weakness of password-based security and emphasizing the need for stronger authentication methods.
Progress
56% Bias Score


Millions of Passwords and PINs Leaked: Urgent Security Warning
A recent report revealed the 20 most frequently used passwords and 50 common PIN codes, highlighting a serious security vulnerability and emphasizing the need for users to change their credentials immediately due to the ease with which these can be hacked, especially with AI tools.
Millions of Passwords and PINs Leaked: Urgent Security Warning
A recent report revealed the 20 most frequently used passwords and 50 common PIN codes, highlighting a serious security vulnerability and emphasizing the need for users to change their credentials immediately due to the ease with which these can be hacked, especially with AI tools.
Progress
56% Bias Score


NYC Crypto Investor Arrested for Kidnapping, Torture
A cryptocurrency investor, John Woeltz, and a 24-year-old woman, Beatrice Folchi, were arrested in NYC after allegedly kidnapping and torturing Woeltz's 28-year-old former Italian business partner for two weeks in a SoHo townhouse to steal cryptocurrency passwords; the victim escaped and called the ...
NYC Crypto Investor Arrested for Kidnapping, Torture
A cryptocurrency investor, John Woeltz, and a 24-year-old woman, Beatrice Folchi, were arrested in NYC after allegedly kidnapping and torturing Woeltz's 28-year-old former Italian business partner for two weeks in a SoHo townhouse to steal cryptocurrency passwords; the victim escaped and called the ...
Progress
44% Bias Score


Nova Scotia Power Confirms Ransomware Attack, Refuses to Pay Ransom
Nova Scotia Power confirmed a ransomware attack around March 19th, resulting in the theft of customer data including credit histories, social insurance numbers, and bank account data; the company refused to pay the ransom, citing sanctions laws and law enforcement guidance, and is providing affected...
Nova Scotia Power Confirms Ransomware Attack, Refuses to Pay Ransom
Nova Scotia Power confirmed a ransomware attack around March 19th, resulting in the theft of customer data including credit histories, social insurance numbers, and bank account data; the company refused to pay the ransom, citing sanctions laws and law enforcement guidance, and is providing affected...
Progress
32% Bias Score

Bremen Police Outage Highlights Growing Cyberattack Threat in Germany
On February 12th, a DDoS attack by Russian hackers caused a two-hour outage of Bremen's police services due to 18,000 internet connections per minute overwhelming their servers, highlighting Germany's growing vulnerability to cyberattacks and the need for improved cybersecurity measures.

Bremen Police Outage Highlights Growing Cyberattack Threat in Germany
On February 12th, a DDoS attack by Russian hackers caused a two-hour outage of Bremen's police services due to 18,000 internet connections per minute overwhelming their servers, highlighting Germany's growing vulnerability to cyberattacks and the need for improved cybersecurity measures.
Progress
28% Bias Score

UK's Top Security Threat: Domestic Terrorism, Says Tugendhat
Former UK Security Minister Tom Tugendhat warns that the greatest terrorist threat to the UK is domestic, with examples of far-right and Islamist groups being manipulated by Russia, while advocating for a shift in national security strategy and defense spending to counter evolving threats.

UK's Top Security Threat: Domestic Terrorism, Says Tugendhat
Former UK Security Minister Tom Tugendhat warns that the greatest terrorist threat to the UK is domestic, with examples of far-right and Islamist groups being manipulated by Russia, while advocating for a shift in national security strategy and defense spending to counter evolving threats.
Progress
36% Bias Score

Widespread Panic in Israel After Coordinated Disinformation Calls
On Saturday, Israelis received numerous calls from local numbers featuring recordings of alleged hostages, accompanied by sounds of explosions and sirens; the calls, originating from a limited set of numbers, were confirmed by authorities to be attempts to incite public panic.

Widespread Panic in Israel After Coordinated Disinformation Calls
On Saturday, Israelis received numerous calls from local numbers featuring recordings of alleged hostages, accompanied by sounds of explosions and sirens; the calls, originating from a limited set of numbers, were confirmed by authorities to be attempts to incite public panic.
Progress
44% Bias Score

Fake Captcha Attacks Exploit Windows Run Dialog for Malware and Password Theft
Trend Micro reports a surge in fake Captcha attacks tricking Windows users into executing malicious commands via the Run dialog, resulting in malware infections (Lumma Stealer, etc.) and password theft; Microsoft recommends enhanced security practices and mitigation strategies.

Fake Captcha Attacks Exploit Windows Run Dialog for Malware and Password Theft
Trend Micro reports a surge in fake Captcha attacks tricking Windows users into executing malicious commands via the Run dialog, resulting in malware infections (Lumma Stealer, etc.) and password theft; Microsoft recommends enhanced security practices and mitigation strategies.
Progress
52% Bias Score

Fake Australian Online Stores Defraud Consumers
Australian consumers are losing money to fake online stores impersonating major clothing brands like Blue Illusion and Sussan, using Facebook ads and platforms such as Shopify and PayPal; one consumer lost \$79.99, another \$13.

Fake Australian Online Stores Defraud Consumers
Australian consumers are losing money to fake online stores impersonating major clothing brands like Blue Illusion and Sussan, using Facebook ads and platforms such as Shopify and PayPal; one consumer lost \$79.99, another \$13.
Progress
28% Bias Score

Common Smartphone PINs Pose Significant Security Risk
Analysis of 29 million PINs from data breaches revealed the 50 most commonly used codes, highlighting the security risks of easily guessable four-digit PINs and emphasizing the need for stronger authentication methods.

Common Smartphone PINs Pose Significant Security Risk
Analysis of 29 million PINs from data breaches revealed the 50 most commonly used codes, highlighting the security risks of easily guessable four-digit PINs and emphasizing the need for stronger authentication methods.
Progress
36% Bias Score
Showing 133 to 144 of 1,730 results