Showing 325 to 336 of 2,462 results


Palantir Software Aids German Police, but Raises Privacy Concerns
German police use Palantir's Gotham software to analyze data from various sources, speeding investigations but raising privacy concerns due to data aggregation and Palantir's history with US intelligence.
Palantir Software Aids German Police, but Raises Privacy Concerns
German police use Palantir's Gotham software to analyze data from various sources, speeding investigations but raising privacy concerns due to data aggregation and Palantir's history with US intelligence.
Progress
44% Bias Score


CISA Warns of Microsoft Exchange Server Vulnerability; Microsoft Unveils AI-Powered Malware Defense
CISA issued a high-severity alert on August 6, 2025, regarding CVE-2025-53786, a Microsoft Exchange Server vulnerability allowing privilege escalation, prompting Microsoft to temporarily block Exchange Web Services traffic and introduce Project Ire, an AI-powered malware classification system.
CISA Warns of Microsoft Exchange Server Vulnerability; Microsoft Unveils AI-Powered Malware Defense
CISA issued a high-severity alert on August 6, 2025, regarding CVE-2025-53786, a Microsoft Exchange Server vulnerability allowing privilege escalation, prompting Microsoft to temporarily block Exchange Web Services traffic and introduce Project Ire, an AI-powered malware classification system.
Progress
40% Bias Score


BTK Halts In-Person E-Signature Applications After Fraud
Turkey's BTK halted in-person e-signature applications on October 10, 2024, after an e-signature fraud involving fake IDs; the BTK claims no system vulnerability but implemented enhanced security measures including mandatory SMS notifications and a six-hour delay before certificate issuance.
BTK Halts In-Person E-Signature Applications After Fraud
Turkey's BTK halted in-person e-signature applications on October 10, 2024, after an e-signature fraud involving fake IDs; the BTK claims no system vulnerability but implemented enhanced security measures including mandatory SMS notifications and a six-hour delay before certificate issuance.
Progress
52% Bias Score


Sensitive User Data from AI Chatbots Exposed Online
Millions of user conversations with AI chatbots, including sensitive data like banking details and personal information, have been archived online and are publicly accessible via Internet Archive, raising major privacy concerns.
Sensitive User Data from AI Chatbots Exposed Online
Millions of user conversations with AI chatbots, including sensitive data like banking details and personal information, have been archived online and are publicly accessible via Internet Archive, raising major privacy concerns.
Progress
48% Bias Score


Meta AI's WhatsApp Integration: Limited Access, Privacy Concerns Remain
Meta's new AI chatbot for WhatsApp, Meta AI, only accesses messages directly sent to it; a false claim circulated that it accesses all chats; users can enable advanced privacy settings.
Meta AI's WhatsApp Integration: Limited Access, Privacy Concerns Remain
Meta's new AI chatbot for WhatsApp, Meta AI, only accesses messages directly sent to it; a false claim circulated that it accesses all chats; users can enable advanced privacy settings.
Progress
56% Bias Score


Major Turkish Data Breach Exposes National Security Vulnerabilities
A data breach in Turkey exposed sensitive personal data from numerous government systems, including the e-Government system and MERNIS, raising serious national security concerns and highlighting vulnerabilities in Turkey's digital infrastructure; 16 suspects are on trial for allegedly selling the d...
Major Turkish Data Breach Exposes National Security Vulnerabilities
A data breach in Turkey exposed sensitive personal data from numerous government systems, including the e-Government system and MERNIS, raising serious national security concerns and highlighting vulnerabilities in Turkey's digital infrastructure; 16 suspects are on trial for allegedly selling the d...
Progress
44% Bias Score

Google Data Breach: ShinyHunters Steal Business Contact Information
On June 2025, hackers linked to the ShinyHunters ransomware group compromised a Google Salesforce database, stealing contact information—business names and details—of small and medium-sized businesses; Google confirmed the breach and stated that the stolen data was largely publicly available informa...

Google Data Breach: ShinyHunters Steal Business Contact Information
On June 2025, hackers linked to the ShinyHunters ransomware group compromised a Google Salesforce database, stealing contact information—business names and details—of small and medium-sized businesses; Google confirmed the breach and stated that the stolen data was largely publicly available informa...
Progress
40% Bias Score

AI's Nuanced Impact and Israel's Lagging AI Infrastructure
A new report reveals that while AI hasn't significantly impacted Israeli tech development roles, it has caused job losses in support functions, disproportionately affecting non-graduates and women, while a government committee highlights Israel's lagging AI infrastructure and proposes a massive inve...

AI's Nuanced Impact and Israel's Lagging AI Infrastructure
A new report reveals that while AI hasn't significantly impacted Israeli tech development roles, it has caused job losses in support functions, disproportionately affecting non-graduates and women, while a government committee highlights Israel's lagging AI infrastructure and proposes a massive inve...
Progress
48% Bias Score

Google Confirms Data Breach: ShinyHunters Group Steals Business Contact Information
In June 2025, hackers linked to the ShinyHunters ransomware group breached a Google Salesforce database, stealing contact information of small and medium-sized businesses; Google confirmed the theft of "basic and largely publicly available business information", including business names and contact ...

Google Confirms Data Breach: ShinyHunters Group Steals Business Contact Information
In June 2025, hackers linked to the ShinyHunters ransomware group breached a Google Salesforce database, stealing contact information of small and medium-sized businesses; Google confirmed the theft of "basic and largely publicly available business information", including business names and contact ...
Progress
48% Bias Score

Protect Your Business Data: Disable ChatGPT Model Training
Using ChatGPT for business exposes sensitive data for model training unless users disable the "Improve the model for everyone" setting; this setting, found in Data Controls, prevents conversations from being used to train the model and protects business information.

Protect Your Business Data: Disable ChatGPT Model Training
Using ChatGPT for business exposes sensitive data for model training unless users disable the "Improve the model for everyone" setting; this setting, found in Data Controls, prevents conversations from being used to train the model and protects business information.
Progress
56% Bias Score

Ethical Hackers Aid Small Water Utilities After Iranian Cyberattack
Following a November 2023 hack of the Aliquippa, Pennsylvania water system by Iranian-linked hackers, a group of ethical hackers is providing free cybersecurity support to smaller water utilities across the US, including Indiana, Oregon, Utah, and Vermont, to enhance network security and protect pub...

Ethical Hackers Aid Small Water Utilities After Iranian Cyberattack
Following a November 2023 hack of the Aliquippa, Pennsylvania water system by Iranian-linked hackers, a group of ethical hackers is providing free cybersecurity support to smaller water utilities across the US, including Indiana, Oregon, Utah, and Vermont, to enhance network security and protect pub...
Progress
24% Bias Score

Widespread Turkish E-Signature Fraud Exposes Systemic Vulnerabilities
A massive e-signature and mobile signature fraud scheme in Turkey has been exposed, exploiting vulnerabilities in the e-Government system and impacting numerous government services; investigations reveal the involvement of multiple GSM lines linked to single identities, highlighting systemic weaknes...

Widespread Turkish E-Signature Fraud Exposes Systemic Vulnerabilities
A massive e-signature and mobile signature fraud scheme in Turkey has been exposed, exploiting vulnerabilities in the e-Government system and impacting numerous government services; investigations reveal the involvement of multiple GSM lines linked to single identities, highlighting systemic weaknes...
Progress
52% Bias Score
Showing 325 to 336 of 2,462 results