Showing 229 to 240 of 1,730 results


Japan Enacts Law for Preemptive Cyberdefense
Japan's parliament passed a law authorizing preemptive cyberdefense measures, including communication data monitoring and server neutralization, to counter cyberattacks and enhance national cybersecurity by 2027, while addressing privacy concerns.
Japan Enacts Law for Preemptive Cyberdefense
Japan's parliament passed a law authorizing preemptive cyberdefense measures, including communication data monitoring and server neutralization, to counter cyberattacks and enhance national cybersecurity by 2027, while addressing privacy concerns.
Progress
36% Bias Score


Japan's New Security Clearance System Raises Privacy Concerns
Japan launched a new security clearance system on Friday, expanding classified information to include economic security data such as critical infrastructure and semiconductors, prompting privacy concerns due to extensive background checks on thousands of public and private sector employees.
Japan's New Security Clearance System Raises Privacy Concerns
Japan launched a new security clearance system on Friday, expanding classified information to include economic security data such as critical infrastructure and semiconductors, prompting privacy concerns due to extensive background checks on thousands of public and private sector employees.
Progress
36% Bias Score


AI-Powered Cyberattacks Surge, Causing $40 Billion in Annual Losses by 2027
AI-powered cyberattacks targeting Gmail and Outlook users surged in 2025, using sophisticated phishing and automated malware delivery, resulting in a 32% increase in losses to $40 billion annually by 2027, according to Deloitte, requiring stronger security measures beyond passwords and 2FA.
AI-Powered Cyberattacks Surge, Causing $40 Billion in Annual Losses by 2027
AI-powered cyberattacks targeting Gmail and Outlook users surged in 2025, using sophisticated phishing and automated malware delivery, resulting in a 32% increase in losses to $40 billion annually by 2027, according to Deloitte, requiring stronger security measures beyond passwords and 2FA.
Progress
52% Bias Score


Ransomware-as-a-Service Fuels Surge in UK Cyberattacks
The UK faces a surge in cyberattacks due to the rise of "ransomware-as-a-service," allowing less-skilled hackers to utilize powerful tools; recent high-profile attacks on M&S, Dior, and near misses at other retailers highlight the scale of the threat, potentially affecting tens of thousands of busin...
Ransomware-as-a-Service Fuels Surge in UK Cyberattacks
The UK faces a surge in cyberattacks due to the rise of "ransomware-as-a-service," allowing less-skilled hackers to utilize powerful tools; recent high-profile attacks on M&S, Dior, and near misses at other retailers highlight the scale of the threat, potentially affecting tens of thousands of busin...
Progress
48% Bias Score


Hackers Shift Focus to US Retailers After UK Attacks
A group of hackers responsible for cyberattacks against major UK retailers, including Marks & Spencer and the Co-op Group, are now targeting major American retail brands, according to Google's Threat Intelligence Group, raising concerns about data breaches and operational disruptions.
Hackers Shift Focus to US Retailers After UK Attacks
A group of hackers responsible for cyberattacks against major UK retailers, including Marks & Spencer and the Co-op Group, are now targeting major American retail brands, according to Google's Threat Intelligence Group, raising concerns about data breaches and operational disruptions.
Progress
36% Bias Score


Fancy Bear Bypasses Security to Target Ukrainian Arms Suppliers
The Russian hacking group Fancy Bear, also known as Sednit or APT28, launched 'Operation RoundPress', exploiting vulnerabilities in webmail software (Roundcube, Zimbra, Horde, MDaemon) to target arms manufacturers supplying Ukraine, compromising sensitive information despite two-factor authenticatio...
Fancy Bear Bypasses Security to Target Ukrainian Arms Suppliers
The Russian hacking group Fancy Bear, also known as Sednit or APT28, launched 'Operation RoundPress', exploiting vulnerabilities in webmail software (Roundcube, Zimbra, Horde, MDaemon) to target arms manufacturers supplying Ukraine, compromising sensitive information despite two-factor authenticatio...
Progress
24% Bias Score

Three Hackers Exploit Windows 11 Vulnerabilities at Pwn2Own
At the Pwn2Own Berlin 2025 hackathon on May 15th, three hackers exploited vulnerabilities in Windows 11, earning a total of $75,000 in prize money; the vulnerabilities, a use-after-free and integer overflow, an out-of-bounds memory write, and a type confusion vulnerability, could enable complete sys...

Three Hackers Exploit Windows 11 Vulnerabilities at Pwn2Own
At the Pwn2Own Berlin 2025 hackathon on May 15th, three hackers exploited vulnerabilities in Windows 11, earning a total of $75,000 in prize money; the vulnerabilities, a use-after-free and integer overflow, an out-of-bounds memory write, and a type confusion vulnerability, could enable complete sys...
Progress
60% Bias Score

\$44 Billion Cyberscam Industry Thrives in Southeast Asia Despite Crackdowns
A UN report reveals that Asian crime syndicates' cyberscam operations in Southeast Asia generate an estimated \$44 billion annually, impacting Laos, Cambodia, and Myanmar significantly, despite crackdowns and the freeing of thousands of human trafficking victims.

\$44 Billion Cyberscam Industry Thrives in Southeast Asia Despite Crackdowns
A UN report reveals that Asian crime syndicates' cyberscam operations in Southeast Asia generate an estimated \$44 billion annually, impacting Laos, Cambodia, and Myanmar significantly, despite crackdowns and the freeing of thousands of human trafficking victims.
Progress
40% Bias Score

Data Brokers Fuel Hacker Attacks: How to Protect Yourself
Data brokers compile and sell personal information, including sensitive details like addresses and financial data, increasing vulnerability to hackers; this unregulated industry lacks federal oversight, necessitating proactive data removal services.

Data Brokers Fuel Hacker Attacks: How to Protect Yourself
Data brokers compile and sell personal information, including sensitive details like addresses and financial data, increasing vulnerability to hackers; this unregulated industry lacks federal oversight, necessitating proactive data removal services.
Progress
52% Bias Score

Swiss e-ID Relaunch: Balancing Convenience and Privacy Concerns
Switzerland's planned 2026 e-ID launch faces public scrutiny over cost (CHF 180 million), privacy, and potential surveillance, despite the success of similar systems in countries like Estonia; a Euronews debate on May 22nd will discuss these issues.

Swiss e-ID Relaunch: Balancing Convenience and Privacy Concerns
Switzerland's planned 2026 e-ID launch faces public scrutiny over cost (CHF 180 million), privacy, and potential surveillance, despite the success of similar systems in countries like Estonia; a Euronews debate on May 22nd will discuss these issues.
Progress
36% Bias Score

Hackers Shift Focus from UK to US Retailers in Cyberattack Campaign
Hackers responsible for cyberattacks against major UK retailers, including Marks & Spencer and the Co-op Group, are now targeting major US retailers, prompting warnings from Google's Threat Intelligence Group and the National Retail Federation.

Hackers Shift Focus from UK to US Retailers in Cyberattack Campaign
Hackers responsible for cyberattacks against major UK retailers, including Marks & Spencer and the Co-op Group, are now targeting major US retailers, prompting warnings from Google's Threat Intelligence Group and the National Retail Federation.
Progress
36% Bias Score

Fancy Bear Targets Ukrainian Arms Suppliers in 'Operation RoundPress'
The Russian hacking group Fancy Bear, known as APT28, launched "Operation RoundPress," targeting arms manufacturers supplying Ukraine and exploiting webmail vulnerabilities to bypass two-factor authentication and steal data.

Fancy Bear Targets Ukrainian Arms Suppliers in 'Operation RoundPress'
The Russian hacking group Fancy Bear, known as APT28, launched "Operation RoundPress," targeting arms manufacturers supplying Ukraine and exploiting webmail vulnerabilities to bypass two-factor authentication and steal data.
Progress
40% Bias Score
Showing 229 to 240 of 1,730 results