Showing 37 to 48 of 1,295 results


Tax Deadline Phishing Attack Targets Microsoft Accounts
Cybercriminals are using phishing emails with malicious QR codes disguised as tax return reminders to steal Microsoft account credentials before the April 15th US tax deadline, leveraging the urgency of the deadline to increase the success rate of their attacks.
Tax Deadline Phishing Attack Targets Microsoft Accounts
Cybercriminals are using phishing emails with malicious QR codes disguised as tax return reminders to steal Microsoft account credentials before the April 15th US tax deadline, leveraging the urgency of the deadline to increase the success rate of their attacks.
Progress
44% Bias Score


AI-Powered Scam Calls Triple in Netherlands
Fraudulent phone calls tripling in the Netherlands; almost 10,000 reports in Q1 2024 to Fraudehelpdesk, primarily due to AI-powered tools making it easy for criminals to create realistic scams.
AI-Powered Scam Calls Triple in Netherlands
Fraudulent phone calls tripling in the Netherlands; almost 10,000 reports in Q1 2024 to Fraudehelpdesk, primarily due to AI-powered tools making it easy for criminals to create realistic scams.
Progress
28% Bias Score


AI-Powered Tax Fraud: A Growing Threat
AI-powered tax fraud is rapidly increasing, enabling criminals to create convincing fake tax documents and claim inflated refunds; the IRS faces challenges in verification due to volume and staff cuts, necessitating proactive individual protections and long-term system upgrades.
AI-Powered Tax Fraud: A Growing Threat
AI-powered tax fraud is rapidly increasing, enabling criminals to create convincing fake tax documents and claim inflated refunds; the IRS faces challenges in verification due to volume and staff cuts, necessitating proactive individual protections and long-term system upgrades.
Progress
24% Bias Score


Taiwan Prepares Civilian Defense Strategy Using Convenience Stores Amidst China Threat
Faced with potential Chinese aggression, Taiwan is preparing a civilian defense strategy utilizing its extensive convenience store network for essential supply distribution and communication, alongside improved disaster relief centers, while addressing vulnerabilities in energy, communications, and ...
Taiwan Prepares Civilian Defense Strategy Using Convenience Stores Amidst China Threat
Faced with potential Chinese aggression, Taiwan is preparing a civilian defense strategy utilizing its extensive convenience store network for essential supply distribution and communication, alongside improved disaster relief centers, while addressing vulnerabilities in energy, communications, and ...
Progress
44% Bias Score


Microsoft Ends Windows 10 Support, Urges 750 Million Users to Upgrade
Microsoft will end Windows 10 support on October 14, 2024, prompting 750 million users to upgrade to Windows 11 to avoid critical security vulnerabilities like CVE-2025-29824, which is actively exploited globally; Microsoft offers a free upgrade for eligible hardware.
Microsoft Ends Windows 10 Support, Urges 750 Million Users to Upgrade
Microsoft will end Windows 10 support on October 14, 2024, prompting 750 million users to upgrade to Windows 11 to avoid critical security vulnerabilities like CVE-2025-29824, which is actively exploited globally; Microsoft offers a free upgrade for eligible hardware.
Progress
52% Bias Score


China Admits to Cyberattacks on U.S. Infrastructure
Chinese officials admitted responsibility for cyberattacks on U.S. infrastructure, including ports, airports, and utilities, during a December meeting, linking the attacks to U.S. support for Taiwan, as revealed by the Wall Street Journal.
China Admits to Cyberattacks on U.S. Infrastructure
Chinese officials admitted responsibility for cyberattacks on U.S. infrastructure, including ports, airports, and utilities, during a December meeting, linking the attacks to U.S. support for Taiwan, as revealed by the Wall Street Journal.
Progress
60% Bias Score

AI Security Graphs: Addressing the Cybersecurity Visibility Crisis
The cybersecurity industry faces a visibility crisis due to complex hybrid and multi-cloud environments, necessitating AI-powered solutions like Illumio Insights which map all workloads and connections to enable faster threat response and surgical containment.

AI Security Graphs: Addressing the Cybersecurity Visibility Crisis
The cybersecurity industry faces a visibility crisis due to complex hybrid and multi-cloud environments, necessitating AI-powered solutions like Illumio Insights which map all workloads and connections to enable faster threat response and surgical containment.
Progress
52% Bias Score

Netherlands Invests €41 Million to Protect Vulnerable North Sea Cables
The Netherlands is investing €41 million to protect its North Sea infrastructure, including crucial underwater cables vital for energy and internet, after suspected sabotage incidents and vulnerabilities to fishing activities. This includes deeper burial, rock-bedding, and advanced surveillance tech...

Netherlands Invests €41 Million to Protect Vulnerable North Sea Cables
The Netherlands is investing €41 million to protect its North Sea infrastructure, including crucial underwater cables vital for energy and internet, after suspected sabotage incidents and vulnerabilities to fishing activities. This includes deeper burial, rock-bedding, and advanced surveillance tech...
Progress
44% Bias Score

Microsoft Warns Against Deleting Unexplained Inetpub Folder Created by Security Update
Microsoft's April 8 Patch Tuesday update fixed CVE-2025-21204, a critical Windows Update Stack vulnerability, but unexpectedly created an empty \%systemdrive%\inetpub folder on all Windows systems; Microsoft warns users not to delete it.

Microsoft Warns Against Deleting Unexplained Inetpub Folder Created by Security Update
Microsoft's April 8 Patch Tuesday update fixed CVE-2025-21204, a critical Windows Update Stack vulnerability, but unexpectedly created an empty \%systemdrive%\inetpub folder on all Windows systems; Microsoft warns users not to delete it.
Progress
36% Bias Score

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.
Progress
48% Bias Score

AI-Driven Job Scams Surge in the U.S., Posing a Major Cybersecurity Threat
AI-driven job scams are surging in the U.S., with Gartner predicting that by 2028, one in four global job candidates could be fraudulent, resulting in millions of dollars in financial losses for companies and data breaches. Scammers use AI to create convincing fake identities, bypassing traditional ...

AI-Driven Job Scams Surge in the U.S., Posing a Major Cybersecurity Threat
AI-driven job scams are surging in the U.S., with Gartner predicting that by 2028, one in four global job candidates could be fraudulent, resulting in millions of dollars in financial losses for companies and data breaches. Scammers use AI to create convincing fake identities, bypassing traditional ...
Progress
52% Bias Score

Phishing Leads Bank Card Fraud in Russia
VTB reports phishing as the leading method for bank card fraud in Russia, followed by social engineering and NFC cloning; attackers use fake online stores and impersonation tactics to steal financial data.

Phishing Leads Bank Card Fraud in Russia
VTB reports phishing as the leading method for bank card fraud in Russia, followed by social engineering and NFC cloning; attackers use fake online stores and impersonation tactics to steal financial data.
Progress
24% Bias Score
Showing 37 to 48 of 1,295 results