

Smart Home Cameras: Privacy Risks Revealed by New Study
A Surfshark study found outdoor smart home camera apps collect an average of 12 data points, including sensitive personal information, 50% more than other smart home devices; indoor apps collect 9, raising significant privacy concerns.
Smart Home Cameras: Privacy Risks Revealed by New Study
A Surfshark study found outdoor smart home camera apps collect an average of 12 data points, including sensitive personal information, 50% more than other smart home devices; indoor apps collect 9, raising significant privacy concerns.
Progress
48% Bias Score


Low Solve Rate for Sextortion Cases in Saxony-Anhalt
In Saxony-Anhalt, only 5 of 470 reported sextortion cases were solved by October 2024, revealing a low solve rate despite a slight decrease in cases compared to 2023. Most cases were attempts, with 80% of victims being male, including minors.
Low Solve Rate for Sextortion Cases in Saxony-Anhalt
In Saxony-Anhalt, only 5 of 470 reported sextortion cases were solved by October 2024, revealing a low solve rate despite a slight decrease in cases compared to 2023. Most cases were attempts, with 80% of victims being male, including minors.
Progress
44% Bias Score


2025 Cybercrime Trends: Data Breaches, Service Disruptions, and Enhanced Defenses
Cybercriminals in 2025 will focus on stealing data from corporate networks, disrupting critical services, and targeting individuals, prompting a shift towards stronger national cybersecurity using next-generation firewalls, AI, and import substitution.
2025 Cybercrime Trends: Data Breaches, Service Disruptions, and Enhanced Defenses
Cybercriminals in 2025 will focus on stealing data from corporate networks, disrupting critical services, and targeting individuals, prompting a shift towards stronger national cybersecurity using next-generation firewalls, AI, and import substitution.
Progress
40% Bias Score


Sabotage Suspected in Damage to Estonia-Finland Undersea Cable
On Wednesday, the 170-kilometer undersea cable Estlink 2 connecting Estonia and Finland was damaged, with Finnish authorities suspecting sabotage by the oil tanker "Eagle S", allegedly part of Russia's sanctions-evading shadow fleet. Further incidents involving undersea cables in the Baltic Sea have...
Sabotage Suspected in Damage to Estonia-Finland Undersea Cable
On Wednesday, the 170-kilometer undersea cable Estlink 2 connecting Estonia and Finland was damaged, with Finnish authorities suspecting sabotage by the oil tanker "Eagle S", allegedly part of Russia's sanctions-evading shadow fleet. Further incidents involving undersea cables in the Baltic Sea have...
Progress
60% Bias Score


Scotland's Rail Network Vulnerable to Cyberattacks Amidst Digital Transition
Network Rail in Scotland faces significant cybersecurity vulnerabilities due to its insufficient preparedness for the transition to digital signaling, raising concerns about potential disruptions and financial losses, as evidenced by a recent cyberattack and the TfL incident.
Scotland's Rail Network Vulnerable to Cyberattacks Amidst Digital Transition
Network Rail in Scotland faces significant cybersecurity vulnerabilities due to its insufficient preparedness for the transition to digital signaling, raising concerns about potential disruptions and financial losses, as evidenced by a recent cyberattack and the TfL incident.
Progress
56% Bias Score


Finland Seizes Ship Suspected of Severing Undersea Cables
Finnish authorities seized the Eagle S, a Cook Islands-registered ship suspected of severing undersea cables between Finland and Estonia on December 25th, causing power outages and internet disruptions; the ship is believed to be part of a Russian shadow fleet evading sanctions.
Finland Seizes Ship Suspected of Severing Undersea Cables
Finnish authorities seized the Eagle S, a Cook Islands-registered ship suspected of severing undersea cables between Finland and Estonia on December 25th, causing power outages and internet disruptions; the ship is believed to be part of a Russian shadow fleet evading sanctions.
Progress
60% Bias Score

Chrome Extension Attacks Bypass Two-Factor Authentication
Between December 24th and 26th, hackers exploited a vulnerability in Google's authorization flow to publish a malicious Chrome extension, potentially allowing them to steal cookies and bypass MFA despite the employee having Google Advanced Protection enabled. Cyberhaven was affected, and attackers p...

Chrome Extension Attacks Bypass Two-Factor Authentication
Between December 24th and 26th, hackers exploited a vulnerability in Google's authorization flow to publish a malicious Chrome extension, potentially allowing them to steal cookies and bypass MFA despite the employee having Google Advanced Protection enabled. Cyberhaven was affected, and attackers p...
Progress
28% Bias Score

Ninth US Telecom Company Hacked in Chinese Espionage Campaign
The White House revealed that a ninth US telecommunications company was hacked in a Chinese espionage campaign, Salt Typhoon, accessing private communications of Americans, mostly government officials in Washington, D.C., and Virginia, highlighting cybersecurity vulnerabilities.

Ninth US Telecom Company Hacked in Chinese Espionage Campaign
The White House revealed that a ninth US telecommunications company was hacked in a Chinese espionage campaign, Salt Typhoon, accessing private communications of Americans, mostly government officials in Washington, D.C., and Virginia, highlighting cybersecurity vulnerabilities.
Progress
48% Bias Score

Volkswagen Data Breach Exposes Location Data of 800,000 Electric Vehicle Owners
A data breach at Volkswagen exposed the personal data of 800,000 electric vehicle owners, including precise location data for nearly 500,000 vehicles, due to a misconfiguration by subsidiary Cariad; data was accessible for months on Amazon cloud storage.

Volkswagen Data Breach Exposes Location Data of 800,000 Electric Vehicle Owners
A data breach at Volkswagen exposed the personal data of 800,000 electric vehicle owners, including precise location data for nearly 500,000 vehicles, due to a misconfiguration by subsidiary Cariad; data was accessible for months on Amazon cloud storage.
Progress
44% Bias Score

Windows 11 Update Bug Blocks Security Updates for Some Users
Microsoft confirmed a Windows 11 version 24H2 update issue that prevents some users from receiving future security updates if they install it via media containing the October or November 2024 security updates; the company is working on a permanent fix, and recommends using the December 2024 security...

Windows 11 Update Bug Blocks Security Updates for Some Users
Microsoft confirmed a Windows 11 version 24H2 update issue that prevents some users from receiving future security updates if they install it via media containing the October or November 2024 security updates; the company is working on a permanent fix, and recommends using the December 2024 security...
Progress
52% Bias Score

Estonia Launches Naval Operation After Baltic Sea Cable Sabotage
Following suspected sabotage of the Estlink 2 submarine cable on Christmas Day, Estonia launched a naval operation to protect its undersea power cables, while Finland seized a Russian oil tanker suspected of involvement, triggering calls for increased NATO presence and EU sanctions.

Estonia Launches Naval Operation After Baltic Sea Cable Sabotage
Following suspected sabotage of the Estlink 2 submarine cable on Christmas Day, Estonia launched a naval operation to protect its undersea power cables, while Finland seized a Russian oil tanker suspected of involvement, triggering calls for increased NATO presence and EU sanctions.
Progress
52% Bias Score

Dark Web Sells Genuine Identities, Bypassing KYC Verification
A dark web operation is selling genuine identity documents and corresponding facial images for financial gain, enabling sophisticated identity theft that bypasses Know Your Customer (KYC) verification processes used by banks and other financial institutions, prompting recommendations for multi-layer...

Dark Web Sells Genuine Identities, Bypassing KYC Verification
A dark web operation is selling genuine identity documents and corresponding facial images for financial gain, enabling sophisticated identity theft that bypasses Know Your Customer (KYC) verification processes used by banks and other financial institutions, prompting recommendations for multi-layer...
Progress
20% Bias Score