Showing 1,429 to 1,440 of 2,462 results


Online Network 'The Com' Manipulates Children into Violence
An online network called 'The Com' is manipulating British boys aged 11-17 into committing violent and sexual acts, prompting concern from the National Crime Agency (NCA) and the Home Secretary. The network uses encrypted platforms and exploits vulnerable children for content that can be sold, highl...
Online Network 'The Com' Manipulates Children into Violence
An online network called 'The Com' is manipulating British boys aged 11-17 into committing violent and sexual acts, prompting concern from the National Crime Agency (NCA) and the Home Secretary. The network uses encrypted platforms and exploits vulnerable children for content that can be sold, highl...
Progress
56% Bias Score


AI Agents Now Autonomously Conduct Phishing Attacks
Symantec's new research reveals that AI agents can now independently perform phishing attacks, autonomously identifying targets and creating malicious emails; this marks a significant escalation in AI-enabled threats, prompting urgent calls for robust security updates and proactive defense strategie...
AI Agents Now Autonomously Conduct Phishing Attacks
Symantec's new research reveals that AI agents can now independently perform phishing attacks, autonomously identifying targets and creating malicious emails; this marks a significant escalation in AI-enabled threats, prompting urgent calls for robust security updates and proactive defense strategie...
Progress
56% Bias Score


FBI Warns of Ransomware, Gmail Users Report Widespread Account Hacks
The FBI warns of a dangerous ransomware campaign targeting webmail, while numerous Gmail users report account hacks resulting in complete account lockouts; Google offers a seven-day recovery window if users act quickly.
FBI Warns of Ransomware, Gmail Users Report Widespread Account Hacks
The FBI warns of a dangerous ransomware campaign targeting webmail, while numerous Gmail users report account hacks resulting in complete account lockouts; Google offers a seven-day recovery window if users act quickly.
Progress
36% Bias Score


30,000 Websites Hacked Daily: Impacts and Recovery Strategies
Daily, 30,000 websites globally are hacked, impacting small businesses the most; consequences include data breaches, reputational harm, and ransomware demands; recovery involves taking the site offline, resetting passwords, removing malware, restoring backups, contacting the hosting provider, regula...
30,000 Websites Hacked Daily: Impacts and Recovery Strategies
Daily, 30,000 websites globally are hacked, impacting small businesses the most; consequences include data breaches, reputational harm, and ransomware demands; recovery involves taking the site offline, resetting passwords, removing malware, restoring backups, contacting the hosting provider, regula...
Progress
32% Bias Score


FBI Issues Urgent Warning on Medusa Ransomware Attacks
The FBI and CISA issued a joint cybersecurity advisory on March 12, 2025, warning of Medusa ransomware attacks exploiting software vulnerabilities and social engineering, impacting at least 300 critical infrastructure organizations since June 2021; the FBI recommends enabling 2FA for webmail and VPN...
FBI Issues Urgent Warning on Medusa Ransomware Attacks
The FBI and CISA issued a joint cybersecurity advisory on March 12, 2025, warning of Medusa ransomware attacks exploiting software vulnerabilities and social engineering, impacting at least 300 critical infrastructure organizations since June 2021; the FBI recommends enabling 2FA for webmail and VPN...
Progress
44% Bias Score


FBI Warns of Malware-Spreading Document Converter Scam
The FBI issued a warning about a malicious scam involving free online document converter tools that spread malware, leading to ransomware and identity theft, affecting both desktop and smartphone users.
FBI Warns of Malware-Spreading Document Converter Scam
The FBI issued a warning about a malicious scam involving free online document converter tools that spread malware, leading to ransomware and identity theft, affecting both desktop and smartphone users.
Progress
36% Bias Score

AI-Powered Tax Scams Surge, Exceeding \$37 Billion in Losses
In 2023, over \$37 billion in tax-related financial crimes were identified by the IRS; however, AI-generated phishing emails, deepfakes, and voice clones are making these scams increasingly realistic and difficult to detect, impacting individuals, businesses, and tax professionals.

AI-Powered Tax Scams Surge, Exceeding \$37 Billion in Losses
In 2023, over \$37 billion in tax-related financial crimes were identified by the IRS; however, AI-generated phishing emails, deepfakes, and voice clones are making these scams increasingly realistic and difficult to detect, impacting individuals, businesses, and tax professionals.
Progress
24% Bias Score

AI-Driven Cybersecurity: Transforming Threat Detection and Prevention
AI is revolutionizing cybersecurity by enabling faster, more efficient threat detection and response, automating incident handling, and proactively identifying vulnerabilities to prevent breaches before they occur, significantly enhancing organizational security postures.

AI-Driven Cybersecurity: Transforming Threat Detection and Prevention
AI is revolutionizing cybersecurity by enabling faster, more efficient threat detection and response, automating incident handling, and proactively identifying vulnerabilities to prevent breaches before they occur, significantly enhancing organizational security postures.
Progress
40% Bias Score

MassJacker Malware Steals $300,000 in Cryptocurrency
CyberArk researchers discovered MassJacker, a cryptojacking malware targeting users who search for pirated software; it replaces cryptocurrency wallet addresses in the clipboard, resulting in at least $300,000 stolen from one identified wallet among 750,000 unique addresses.

MassJacker Malware Steals $300,000 in Cryptocurrency
CyberArk researchers discovered MassJacker, a cryptojacking malware targeting users who search for pirated software; it replaces cryptocurrency wallet addresses in the clipboard, resulting in at least $300,000 stolen from one identified wallet among 750,000 unique addresses.
Progress
52% Bias Score

Business Tech News: Affordable Laptops, AI Accounting, and Voice Cloning Risks
This week's business tech news covers affordable Windows laptops under $700, discounted Microsoft Office training, concerns over AI voice cloning, and a new AI-powered accounting platform from Digits challenging QuickBooks and Xero.

Business Tech News: Affordable Laptops, AI Accounting, and Voice Cloning Risks
This week's business tech news covers affordable Windows laptops under $700, discounted Microsoft Office training, concerns over AI voice cloning, and a new AI-powered accounting platform from Digits challenging QuickBooks and Xero.
Progress
28% Bias Score

Sophisticated Microsoft 365 Phishing Campaign Bypasses Email Security
A new phishing attack exploits legitimate Microsoft 365 infrastructure to deliver malicious emails that bypass security measures by leveraging trusted Microsoft domains and misconfigured tenants, enabling credential harvesting and account takeovers.

Sophisticated Microsoft 365 Phishing Campaign Bypasses Email Security
A new phishing attack exploits legitimate Microsoft 365 infrastructure to deliver malicious emails that bypass security measures by leveraging trusted Microsoft domains and misconfigured tenants, enabling credential harvesting and account takeovers.
Progress
48% Bias Score

Black Basta Ransomware Group Automates VPN and Firewall Attacks with New Brute-Force Tool
The Black Basta ransomware group uses a new automated brute-force tool, Bruted, targeting enterprise VPNs and firewalls from vendors like Cisco, Palo Alto, and Citrix, automating credential stuffing attacks to gain initial access for ransomware deployment.

Black Basta Ransomware Group Automates VPN and Firewall Attacks with New Brute-Force Tool
The Black Basta ransomware group uses a new automated brute-force tool, Bruted, targeting enterprise VPNs and firewalls from vendors like Cisco, Palo Alto, and Citrix, automating credential stuffing attacks to gain initial access for ransomware deployment.
Progress
20% Bias Score
Showing 1,429 to 1,440 of 2,462 results