Showing 121 to 132 of 272 results


Gmail Phishing Attack Exploits Infrastructure Weakness, Highlighting Need for Passkeys
A new Gmail phishing attack exploited a vulnerability in Google's infrastructure, sending legitimate-looking emails from a Google address to a credential-phishing page; this highlights the increasing sophistication of AI-powered attacks and the need for stronger authentication like passkeys.
Gmail Phishing Attack Exploits Infrastructure Weakness, Highlighting Need for Passkeys
A new Gmail phishing attack exploited a vulnerability in Google's infrastructure, sending legitimate-looking emails from a Google address to a credential-phishing page; this highlights the increasing sophistication of AI-powered attacks and the need for stronger authentication like passkeys.
Progress
44% Bias Score


Perplexity's Android App Exposed: Critical Security Flaws Revealed
Perplexity's Android app, offering AI search and assistant capabilities, has been found to contain critical security flaws, including hardcoded secrets and susceptibility to task hijacking and network-based attacks, exposing users to data theft and the company to revenue loss, despite a recent \$1 m...
Perplexity's Android App Exposed: Critical Security Flaws Revealed
Perplexity's Android app, offering AI search and assistant capabilities, has been found to contain critical security flaws, including hardcoded secrets and susceptibility to task hijacking and network-based attacks, exposing users to data theft and the company to revenue loss, despite a recent \$1 m...
Progress
40% Bias Score


Fontys Data Breach Exposes Student Medical Records
Fontys University of Applied Sciences experienced a data breach exposing student medical records and other personal information due to employees accidentally sharing documents publicly on the internal network; the university has removed the documents and launched an investigation.
Fontys Data Breach Exposes Student Medical Records
Fontys University of Applied Sciences experienced a data breach exposing student medical records and other personal information due to employees accidentally sharing documents publicly on the internal network; the university has removed the documents and launched an investigation.
Progress
24% Bias Score


Apple Patches Critical Zero-Day Vulnerabilities Affecting Millions of Devices
Apple is urging users to update their devices after a sophisticated attack exploited two zero-day vulnerabilities—CVE-2025-31200 in CoreAudio and CVE-2025-31201 in RPAC—affecting iPhones, iPads, Macs, and Apple TVs, allowing remote code execution and memory protection bypasses.
Apple Patches Critical Zero-Day Vulnerabilities Affecting Millions of Devices
Apple is urging users to update their devices after a sophisticated attack exploited two zero-day vulnerabilities—CVE-2025-31200 in CoreAudio and CVE-2025-31201 in RPAC—affecting iPhones, iPads, Macs, and Apple TVs, allowing remote code execution and memory protection bypasses.
Progress
32% Bias Score


4chan Hack Raises Anonymity Concerns After Source Code Compromise
A hacker attack on 4chan, a controversial online forum, caused a multi-hour outage starting around 2 PM Italian time, raising concerns about data breaches and user anonymity due to compromised source code and potential IP address exposure.
4chan Hack Raises Anonymity Concerns After Source Code Compromise
A hacker attack on 4chan, a controversial online forum, caused a multi-hour outage starting around 2 PM Italian time, raising concerns about data breaches and user anonymity due to compromised source code and potential IP address exposure.
Progress
56% Bias Score


Cyberattack Leaks Sensitive Moroccan Data Amid Algeria Tensions
A cyberattack on Morocco's social security agency leaked sensitive personal data, including salary information and financial details of high-profile individuals, onto Telegram this week; hackers claimed responsibility in response to alleged online harassment of Algeria by Morocco, highlighting the d...
Cyberattack Leaks Sensitive Moroccan Data Amid Algeria Tensions
A cyberattack on Morocco's social security agency leaked sensitive personal data, including salary information and financial details of high-profile individuals, onto Telegram this week; hackers claimed responsibility in response to alleged online harassment of Algeria by Morocco, highlighting the d...
Progress
40% Bias Score

Samsung Galaxy Password Security Risk: Urgent User Action Needed
Samsung acknowledges a security flaw in Galaxy phones where the clipboard stores passwords in plain text, posing a risk to users; the company is working on a fix but advises users to manually clear their clipboard history and use secure password manager input methods.

Samsung Galaxy Password Security Risk: Urgent User Action Needed
Samsung acknowledges a security flaw in Galaxy phones where the clipboard stores passwords in plain text, posing a risk to users; the company is working on a fix but advises users to manually clear their clipboard history and use secure password manager input methods.
Progress
40% Bias Score

DOGE Access to NLRB Systems Sparks Data Security Concerns
Following a whistleblower report alleging the Department of Government Efficiency (DOGE) removed sensitive data from the National Labor Relations Board (NLRB) systems, two DOGE staffers were assigned to the NLRB to work remotely for several months, despite the NLRB's initial denial of any contact or...

DOGE Access to NLRB Systems Sparks Data Security Concerns
Following a whistleblower report alleging the Department of Government Efficiency (DOGE) removed sensitive data from the National Labor Relations Board (NLRB) systems, two DOGE staffers were assigned to the NLRB to work remotely for several months, despite the NLRB's initial denial of any contact or...
Progress
56% Bias Score

Jenrick's WhatsApp Mishap: Hundreds of Contacts Added, Then Deleted
Shadow Justice Secretary Robert Jenrick accidentally added hundreds of Westminster contacts to a WhatsApp group promoting his London Marathon run, including senior journalists, former cabinet members, and Tory MPs, before quickly deleting them; the ICO confirmed data protection law does not apply to...

Jenrick's WhatsApp Mishap: Hundreds of Contacts Added, Then Deleted
Shadow Justice Secretary Robert Jenrick accidentally added hundreds of Westminster contacts to a WhatsApp group promoting his London Marathon run, including senior journalists, former cabinet members, and Tory MPs, before quickly deleting them; the ICO confirmed data protection law does not apply to...
Progress
52% Bias Score

DOGE Data Breach at NLRB Prompts Congressional Investigation
Following an NPR report and whistleblower testimony, House Oversight Committee Ranking Member Gerry Connolly is demanding an investigation into DOGE's access to the National Labor Relations Board after approximately 10 gigabytes of sensitive data, including corporate secrets and union member informa...

DOGE Data Breach at NLRB Prompts Congressional Investigation
Following an NPR report and whistleblower testimony, House Oversight Committee Ranking Member Gerry Connolly is demanding an investigation into DOGE's access to the National Labor Relations Board after approximately 10 gigabytes of sensitive data, including corporate secrets and union member informa...
Progress
56% Bias Score

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.

Cyberattack Exposes Security Gaps in Australian Superannuation
A coordinated credential-stuffing attack stole hundreds of thousands of dollars from Australian superannuation accounts, exposing weaknesses in security practices and highlighting the need for stronger multi-factor authentication and improved password hygiene among account holders.
Progress
48% Bias Score

Cyberattack Exposes Weaknesses in \$1 Trillion Australian Superannuation Industry
A coordinated cyberattack exploited reused passwords to compromise six major Australian superannuation funds, managing over \$1 trillion in assets and impacting 12.6 million members, prompting increased regulatory scrutiny and a focus on improving multi-factor authentication (MFA) implementation.

Cyberattack Exposes Weaknesses in \$1 Trillion Australian Superannuation Industry
A coordinated cyberattack exploited reused passwords to compromise six major Australian superannuation funds, managing over \$1 trillion in assets and impacting 12.6 million members, prompting increased regulatory scrutiny and a focus on improving multi-factor authentication (MFA) implementation.
Progress
36% Bias Score
Showing 121 to 132 of 272 results