Showing 361 to 372 of 1,207 results


FBI Warns of Ghost Ransomware Exploiting Software Vulnerabilities
A joint FBI and CISA advisory warns of the Ghost ransomware group, originating from China, exploiting unpatched vulnerabilities in software and firmware across 70+ countries, impacting various sectors, and highlighting the need for improved security practices.
FBI Warns of Ghost Ransomware Exploiting Software Vulnerabilities
A joint FBI and CISA advisory warns of the Ghost ransomware group, originating from China, exploiting unpatched vulnerabilities in software and firmware across 70+ countries, impacting various sectors, and highlighting the need for improved security practices.
Progress
44% Bias Score


China, Iran Exploit AI for Disinformation Campaigns: OpenAI Report
OpenAI's report details how China and Iran-linked actors misused AI models for covert influence operations, including generating anti-U.S. articles published in Latin American news outlets and comments attacking Chinese dissidents; OpenAI banned the accounts involved.
China, Iran Exploit AI for Disinformation Campaigns: OpenAI Report
OpenAI's report details how China and Iran-linked actors misused AI models for covert influence operations, including generating anti-U.S. articles published in Latin American news outlets and comments attacking Chinese dissidents; OpenAI banned the accounts involved.
Progress
40% Bias Score


Houston Teens Arrested in School Attack Plot
Two teenage girls in Houston were arrested for allegedly plotting a school attack involving pipe bombs and guns; law enforcement acted swiftly, apprehending the suspects within 30 minutes of receiving a tip through an anonymous reporting system, highlighting the increasing role of such systems in pr...
Houston Teens Arrested in School Attack Plot
Two teenage girls in Houston were arrested for allegedly plotting a school attack involving pipe bombs and guns; law enforcement acted swiftly, apprehending the suspects within 30 minutes of receiving a tip through an anonymous reporting system, highlighting the increasing role of such systems in pr...
Progress
36% Bias Score


Microsoft's Majorana 1 Chip Advances Quantum Computing
Microsoft announced its Majorana 1 quantum chip on February 20, 2025, a palm-sized device utilizing Majorana fermions to potentially overcome reliability issues in quantum computing, based on research published in Nature.
Microsoft's Majorana 1 Chip Advances Quantum Computing
Microsoft announced its Majorana 1 quantum chip on February 20, 2025, a palm-sized device utilizing Majorana fermions to potentially overcome reliability issues in quantum computing, based on research published in Nature.
Progress
40% Bias Score


Rotterdam Port Faces Trade War Risks, but Shows Resilience
The Port of Rotterdam, Europe's largest seaport, faces potential significant impacts from a US-China-Europe trade war, along with challenges from high energy costs, overregulation, and increased cyberattacks; however, it showed resilience in 2023 with container transport growth of almost 3 percent a...
Rotterdam Port Faces Trade War Risks, but Shows Resilience
The Port of Rotterdam, Europe's largest seaport, faces potential significant impacts from a US-China-Europe trade war, along with challenges from high energy costs, overregulation, and increased cyberattacks; however, it showed resilience in 2023 with container transport growth of almost 3 percent a...
Progress
36% Bias Score


UK Forces Apple to Disable End-to-End Encryption for iCloud
The UK government compelled Apple to disable its Advanced Data Protection (ADP) for iCloud in the UK, undermining end-to-end encryption for all users and potentially setting a global precedent for government access to encrypted data.
UK Forces Apple to Disable End-to-End Encryption for iCloud
The UK government compelled Apple to disable its Advanced Data Protection (ADP) for iCloud in the UK, undermining end-to-end encryption for all users and potentially setting a global precedent for government access to encrypted data.
Progress
44% Bias Score

Apple Disables UK Data Encryption Feature After Government Demand
Apple has stopped offering its Advanced Data Protection encryption feature in the UK after the government reportedly demanded backdoor access to user data under the Investigatory Powers Act of 2016, raising concerns about user privacy and global data security.

Apple Disables UK Data Encryption Feature After Government Demand
Apple has stopped offering its Advanced Data Protection encryption feature in the UK after the government reportedly demanded backdoor access to user data under the Investigatory Powers Act of 2016, raising concerns about user privacy and global data security.
Progress
48% Bias Score

Damage to Baltic Sea Cable: Third Incident in Three Months
The C-Lion1 submarine cable, connecting Helsinki and Rostock, suffered damage near Gotland on February 21st, 2025, marking the third such incident in three months, prompting investigations into potential causes and security concerns in the Baltic Sea.

Damage to Baltic Sea Cable: Third Incident in Three Months
The C-Lion1 submarine cable, connecting Helsinki and Rostock, suffered damage near Gotland on February 21st, 2025, marking the third such incident in three months, prompting investigations into potential causes and security concerns in the Baltic Sea.
Progress
48% Bias Score

Poland Proposes EU Cybersecurity Declaration Amidst Rising Threats
Poland is proposing an EU cybersecurity declaration to be signed by member states in early March in Warsaw, focusing on preparedness for incidents and enhanced cooperation; this follows recent incidents targeting undersea cables in the Baltic Sea and slow implementation of the NIS2 directive.

Poland Proposes EU Cybersecurity Declaration Amidst Rising Threats
Poland is proposing an EU cybersecurity declaration to be signed by member states in early March in Warsaw, focusing on preparedness for incidents and enhanced cooperation; this follows recent incidents targeting undersea cables in the Baltic Sea and slow implementation of the NIS2 directive.
Progress
24% Bias Score

Suspected Sabotage of Baltic Sea Undersea Cable Prompts Investigation
Swedish authorities are investigating the damage to an undersea cable linking Finland and Germany near Gotland Island in the Baltic Sea, suspecting sabotage and highlighting the ongoing security concerns in the region.

Suspected Sabotage of Baltic Sea Undersea Cable Prompts Investigation
Swedish authorities are investigating the damage to an undersea cable linking Finland and Germany near Gotland Island in the Baltic Sea, suspecting sabotage and highlighting the ongoing security concerns in the region.
Progress
48% Bias Score

Zero Day: A Cyberattack Thriller
Zero Day," a six-episode Netflix thriller, depicts the aftermath of a devastating US cyberattack investigated by former President George Mullen, highlighting the challenges of cybersecurity and national response to such threats.

Zero Day: A Cyberattack Thriller
Zero Day," a six-episode Netflix thriller, depicts the aftermath of a devastating US cyberattack investigated by former President George Mullen, highlighting the challenges of cybersecurity and national response to such threats.
Progress
36% Bias Score

New Phishing Campaign Exploits "@ Gap" in URLs to Steal Microsoft 365 Credentials
Check Point researchers discovered a new phishing campaign exploiting the "@ gap" in URLs to steal Microsoft 365 credentials, sending over 200,000 emails targeting a wide range of organizations and individuals, with 75% aimed at US users.

New Phishing Campaign Exploits "@ Gap" in URLs to Steal Microsoft 365 Credentials
Check Point researchers discovered a new phishing campaign exploiting the "@ gap" in URLs to steal Microsoft 365 credentials, sending over 200,000 emails targeting a wide range of organizations and individuals, with 75% aimed at US users.
Progress
24% Bias Score
Showing 361 to 372 of 1,207 results