Showing 1,165 to 1,176 of 2,462 results


Windows 11's TPM Chip: Enhanced Security and Free Upgrade Offer
Microsoft is urging Windows 10 users to upgrade to Windows 11 before October 14, 2024, when Windows 10 support ends, due to enhanced security features including a TPM chip that verifies system integrity on boot, preventing malware and protecting data.
Windows 11's TPM Chip: Enhanced Security and Free Upgrade Offer
Microsoft is urging Windows 10 users to upgrade to Windows 11 before October 14, 2024, when Windows 10 support ends, due to enhanced security features including a TPM chip that verifies system integrity on boot, preventing malware and protecting data.
Progress
44% Bias Score


Microsoft Leads Passkey Push to Combat AI-Powered Cyberattacks
AI-powered cyberattacks are on the rise, prompting Microsoft to lead a campaign to replace passwords with passkeys for over a billion accounts, significantly enhancing security against phishing and credential theft.
Microsoft Leads Passkey Push to Combat AI-Powered Cyberattacks
AI-powered cyberattacks are on the rise, prompting Microsoft to lead a campaign to replace passwords with passkeys for over a billion accounts, significantly enhancing security against phishing and credential theft.
Progress
48% Bias Score


Kremlin Disinformation Network Targets Former Soviet States and Balkan Countries
A study reveals that the Kremlin's Pravda disinformation network heavily targets former Soviet states and Balkan countries, with Moldova, Latvia, and Estonia being the most affected, due to their strategic geopolitical importance and energy infrastructure.
Kremlin Disinformation Network Targets Former Soviet States and Balkan Countries
A study reveals that the Kremlin's Pravda disinformation network heavily targets former Soviet states and Balkan countries, with Moldova, Latvia, and Estonia being the most affected, due to their strategic geopolitical importance and energy infrastructure.
Progress
36% Bias Score


Agentic AI: Reshaping Cybersecurity Operations
Overburdened security operations centers (SOCs) face 4,000 daily alerts, leading to analyst burnout. Agentic AI, unlike traditional SOAR tools, offers autonomous, learning-based solutions to reduce workload and improve efficiency, as seen in ReliaQuest's GreyMatter platform and supported by a recent...
Agentic AI: Reshaping Cybersecurity Operations
Overburdened security operations centers (SOCs) face 4,000 daily alerts, leading to analyst burnout. Agentic AI, unlike traditional SOAR tools, offers autonomous, learning-based solutions to reduce workload and improve efficiency, as seen in ReliaQuest's GreyMatter platform and supported by a recent...
Progress
40% Bias Score


Microsoft Warns of AI-Powered Tech Support Scam Surge
Microsoft warns of a rise in AI-powered tech support scams using tools like Quick Assist for unauthorized access, emphasizing that legitimate companies never initiate unsolicited contact for technical support.
Microsoft Warns of AI-Powered Tech Support Scam Surge
Microsoft warns of a rise in AI-powered tech support scams using tools like Quick Assist for unauthorized access, emphasizing that legitimate companies never initiate unsolicited contact for technical support.
Progress
56% Bias Score


Vietnam's Ministry of Public Security to Acquire Majority Stake in FPT Telecom
Vietnam's Ministry of Public Security plans to acquire a majority stake in FPT Telecom, a leading internet provider, to strengthen national cybersecurity, following a similar takeover of MobiFone last year and stricter data protection rules.
Vietnam's Ministry of Public Security to Acquire Majority Stake in FPT Telecom
Vietnam's Ministry of Public Security plans to acquire a majority stake in FPT Telecom, a leading internet provider, to strengthen national cybersecurity, following a similar takeover of MobiFone last year and stricter data protection rules.
Progress
36% Bias Score

Google Confirms Sophisticated Phishing Attack; Urges Users to Abandon Passwords
On April 19, Google confirmed a sophisticated phishing attack exploiting platform vulnerabilities that bypassed security warnings by using valid DKIM signatures in emails from no-reply@google.com. The attack targeted an Ethereum developer, prompting Google to urge users to abandon passwords and enab...

Google Confirms Sophisticated Phishing Attack; Urges Users to Abandon Passwords
On April 19, Google confirmed a sophisticated phishing attack exploiting platform vulnerabilities that bypassed security warnings by using valid DKIM signatures in emails from no-reply@google.com. The attack targeted an Ethereum developer, prompting Google to urge users to abandon passwords and enab...
Progress
44% Bias Score

AI-Powered Job Application Scams Surge, Posing Major Security Risk
AI is enabling a surge in sophisticated job application scams, with Gartner predicting that 25% of applicants will be fake by 2028; North Korean operatives are already using this method to generate hundreds of millions of dollars annually for their military.

AI-Powered Job Application Scams Surge, Posing Major Security Risk
AI is enabling a surge in sophisticated job application scams, with Gartner predicting that 25% of applicants will be fake by 2028; North Korean operatives are already using this method to generate hundreds of millions of dollars annually for their military.
Progress
32% Bias Score

Prodaft's SYS Initiative: Purchasing Hacker Accounts for Threat Intelligence
Prodaft launched the SYS Initiative on April 17th, aiming to purchase inactive hacker forum accounts (created before December 2022) from XSS Exploit, RAMP4U, and Breachforums to gain threat intelligence and improve cybersecurity defenses.

Prodaft's SYS Initiative: Purchasing Hacker Accounts for Threat Intelligence
Prodaft launched the SYS Initiative on April 17th, aiming to purchase inactive hacker forum accounts (created before December 2022) from XSS Exploit, RAMP4U, and Breachforums to gain threat intelligence and improve cybersecurity defenses.
Progress
48% Bias Score

Rheinland-Pfalz Considers Automated Data Analysis Platform for Law Enforcement
Responding to a growing political debate on police technology, Rheinland-Pfalz's interior ministry announced plans to implement an automated data analysis platform for improved threat assessment, mirroring initiatives in other German states, such as Hesse's use of the Palantir-developed Hessendata s...

Rheinland-Pfalz Considers Automated Data Analysis Platform for Law Enforcement
Responding to a growing political debate on police technology, Rheinland-Pfalz's interior ministry announced plans to implement an automated data analysis platform for improved threat assessment, mirroring initiatives in other German states, such as Hesse's use of the Palantir-developed Hessendata s...
Progress
32% Bias Score

Flawed Automation Leads to Significant Errors in Israeli Tech Employment Data
Israel's Innovation Authority's automated system for gathering employment data from Facebook resulted in significant errors, including misclassifying a company with 20,000 employees as having 300 and listing a defunct company, demonstrating the dangers of relying solely on automated systems without ...

Flawed Automation Leads to Significant Errors in Israeli Tech Employment Data
Israel's Innovation Authority's automated system for gathering employment data from Facebook resulted in significant errors, including misclassifying a company with 20,000 employees as having 300 and listing a defunct company, demonstrating the dangers of relying solely on automated systems without ...
Progress
60% Bias Score

Perplexity's Android App Exposed: Critical Security Flaws Revealed
Perplexity's Android app, offering AI search and assistant capabilities, has been found to contain critical security flaws, including hardcoded secrets and susceptibility to task hijacking and network-based attacks, exposing users to data theft and the company to revenue loss, despite a recent \$1 m...

Perplexity's Android App Exposed: Critical Security Flaws Revealed
Perplexity's Android app, offering AI search and assistant capabilities, has been found to contain critical security flaws, including hardcoded secrets and susceptibility to task hijacking and network-based attacks, exposing users to data theft and the company to revenue loss, despite a recent \$1 m...
Progress
40% Bias Score
Showing 1,165 to 1,176 of 2,462 results