Showing 481 to 492 of 1,811 results


AIVD: Russia's 2024 Escalation of Aggression Against Europe
The Dutch AIVD's 2024 annual report details a surge in Russian aggression against European nations, including espionage, cyberattacks, and sabotage of critical infrastructure, such as undersea cables and attacks on infrastructure in Poland and Germany, potentially amounting to state terrorism.
AIVD: Russia's 2024 Escalation of Aggression Against Europe
The Dutch AIVD's 2024 annual report details a surge in Russian aggression against European nations, including espionage, cyberattacks, and sabotage of critical infrastructure, such as undersea cables and attacks on infrastructure in Poland and Germany, potentially amounting to state terrorism.
Progress
52% Bias Score


Russian Espionage Targets German Eastern Europe Research Organizations
The Academic Network Eastern Europe (Akno) in Berlin has experienced increased espionage from suspected Russian intelligence, including break-ins and cyberattacks, reflecting a broader pattern of Russian repression targeting organizations and individuals critical of the Kremlin since December 2023.
Russian Espionage Targets German Eastern Europe Research Organizations
The Academic Network Eastern Europe (Akno) in Berlin has experienced increased espionage from suspected Russian intelligence, including break-ins and cyberattacks, reflecting a broader pattern of Russian repression targeting organizations and individuals critical of the Kremlin since December 2023.
Progress
28% Bias Score


EU Equips Staff with Secure Devices Amidst Heightened Geopolitical Tensions
The European Commission is equipping staff traveling to the US and other high-surveillance countries with disposable phones and secure laptops due to escalating geopolitical tensions and concerns about data security, mirroring similar restrictions on TikTok, Telegram, and other technologies.
EU Equips Staff with Secure Devices Amidst Heightened Geopolitical Tensions
The European Commission is equipping staff traveling to the US and other high-surveillance countries with disposable phones and secure laptops due to escalating geopolitical tensions and concerns about data security, mirroring similar restrictions on TikTok, Telegram, and other technologies.
Progress
36% Bias Score


Manifest Secures $15M to Secure Software and AI Supply Chains
Manifest, a technology transparency platform, raised $15M in Series A funding to address the surging software supply chain attacks (up 1300% in three years) by automating Software Bills of Materials (SBOMs) and AI Bills of Materials (AIBOMs), securing over $100B in defense software procurement.
Manifest Secures $15M to Secure Software and AI Supply Chains
Manifest, a technology transparency platform, raised $15M in Series A funding to address the surging software supply chain attacks (up 1300% in three years) by automating Software Bills of Materials (SBOMs) and AI Bills of Materials (AIBOMs), securing over $100B in defense software procurement.
Progress
56% Bias Score


Generative AI Poses Significant Security Risks to Banks, Eroding Consumer Trust
Accenture research highlights generative AI's security risks in banking, citing deepfakes as the top threat, leading to increased consumer fraud costing JPMorgan Chase $500 million last year and eroding consumer trust; banks struggle to keep pace with attackers' AI adoption.
Generative AI Poses Significant Security Risks to Banks, Eroding Consumer Trust
Accenture research highlights generative AI's security risks in banking, citing deepfakes as the top threat, leading to increased consumer fraud costing JPMorgan Chase $500 million last year and eroding consumer trust; banks struggle to keep pace with attackers' AI adoption.
Progress
44% Bias Score


CrowdStrike Launches Falcon Privileged Access to Combat Identity-Based Attacks
CrowdStrike's new Falcon Privileged Access addresses the rising threat of identity-based attacks, revealed in their 2025 Global Threat Report showing 80% of breaches use valid credentials, by offering just-in-time privileged access management integrated with its existing security platform.
CrowdStrike Launches Falcon Privileged Access to Combat Identity-Based Attacks
CrowdStrike's new Falcon Privileged Access addresses the rising threat of identity-based attacks, revealed in their 2025 Global Threat Report showing 80% of breaches use valid credentials, by offering just-in-time privileged access management integrated with its existing security platform.
Progress
44% Bias Score

Google Messages Adds AI-Powered Sensitive Content Warnings, Sparking Privacy Debate
Google Messages' new AI feature, enabled by default for children and optional for adults, uses on-device scanning to blur nude images and warn users, raising privacy concerns despite assurances that no data is sent to Google.

Google Messages Adds AI-Powered Sensitive Content Warnings, Sparking Privacy Debate
Google Messages' new AI feature, enabled by default for children and optional for adults, uses on-device scanning to blur nude images and warn users, raising privacy concerns despite assurances that no data is sent to Google.
Progress
56% Bias Score

Dutch Intelligence Service Reports Rise in Sophisticated Criminal Intelligence Gathering
The Dutch intelligence service AIVD's 2024 annual report reveals a significant increase in sophisticated criminal intelligence gathering targeting officials, politicians, journalists, and lawyers, utilizing advanced technology and tactics comparable to those of law enforcement, often involving bribe...

Dutch Intelligence Service Reports Rise in Sophisticated Criminal Intelligence Gathering
The Dutch intelligence service AIVD's 2024 annual report reveals a significant increase in sophisticated criminal intelligence gathering targeting officials, politicians, journalists, and lawyers, utilizing advanced technology and tactics comparable to those of law enforcement, often involving bribe...
Progress
20% Bias Score

Rapid Software Exploitation Demands Runtime Application Protection
The average time to exploit software vulnerabilities has dropped from 63 hours to 22 minutes, highlighting the inadequacy of traditional patching methods and prompting a shift towards runtime application protection for real-time threat detection and blocking.

Rapid Software Exploitation Demands Runtime Application Protection
The average time to exploit software vulnerabilities has dropped from 63 hours to 22 minutes, highlighting the inadequacy of traditional patching methods and prompting a shift towards runtime application protection for real-time threat detection and blocking.
Progress
48% Bias Score

IEA Summit Highlights Europe's Vulnerable Electrical Grid
An IEA summit in London highlighted Europe's weak energy security, particularly the vulnerability of its electrical grid, as seen in a London substation failure that shut down Heathrow Airport for a day. The summit urged governments to prioritize electrical security and called for diversification, p...

IEA Summit Highlights Europe's Vulnerable Electrical Grid
An IEA summit in London highlighted Europe's weak energy security, particularly the vulnerability of its electrical grid, as seen in a London substation failure that shut down Heathrow Airport for a day. The summit urged governments to prioritize electrical security and called for diversification, p...
Progress
36% Bias Score

China Reports Three Major Personal Data Breaches
Chinese police reported three cases of personal data breaches involving malware, e-commerce platforms, and fake job postings, resulting in financial losses and compromised information for numerous individuals and companies.

China Reports Three Major Personal Data Breaches
Chinese police reported three cases of personal data breaches involving malware, e-commerce platforms, and fake job postings, resulting in financial losses and compromised information for numerous individuals and companies.
Progress
24% Bias Score

EU Seeks Access to Encrypted Data Amid Rise in Youth Gang Crime
Organized crime is increasingly using smartphones and encrypted apps to recruit children and young people to commit violent crimes across borders in Europe, prompting governments to seek ways to access encrypted communications, causing a clash between security and privacy.

EU Seeks Access to Encrypted Data Amid Rise in Youth Gang Crime
Organized crime is increasingly using smartphones and encrypted apps to recruit children and young people to commit violent crimes across borders in Europe, prompting governments to seek ways to access encrypted communications, causing a clash between security and privacy.
Progress
64% Bias Score
Showing 481 to 492 of 1,811 results