Showing 97 to 108 of 137 results


Berlin Police Data Leak Sparks Investigation
A Berlin police officer leaked a list of suspects' first names from internal police systems to the right-wing online portal Nius, sparking a data protection investigation and raising concerns about potential biases within law enforcement.
Berlin Police Data Leak Sparks Investigation
A Berlin police officer leaked a list of suspects' first names from internal police systems to the right-wing online portal Nius, sparking a data protection investigation and raising concerns about potential biases within law enforcement.
Progress
48% Bias Score


U.S. Soldier Indicted for Selling Trump, Harris Call Logs
A U.S. Army communications specialist, Cameron John Wagenius, was arrested on December 20, 2024, near Fort Hood, Texas, and indicted for illegally selling confidential phone records, allegedly including those of President-elect Trump and Vice President Harris, following a November 2024 data breach o...
U.S. Soldier Indicted for Selling Trump, Harris Call Logs
A U.S. Army communications specialist, Cameron John Wagenius, was arrested on December 20, 2024, near Fort Hood, Texas, and indicted for illegally selling confidential phone records, allegedly including those of President-elect Trump and Vice President Harris, following a November 2024 data breach o...
Progress
36% Bias Score


Chinese Hackers Breach US Treasury Systems via Third-Party Software
On December 8th, a state-sponsored Chinese hacking group exploited a vulnerability in the third-party software BeyondTrust to breach US Treasury Department systems, accessing unclassified employee data; the compromised service has been taken offline.
Chinese Hackers Breach US Treasury Systems via Third-Party Software
On December 8th, a state-sponsored Chinese hacking group exploited a vulnerability in the third-party software BeyondTrust to breach US Treasury Department systems, accessing unclassified employee data; the compromised service has been taken offline.
Progress
44% Bias Score


Chinese Hacker Breaches US Treasury Department Systems
A Chinese state-sponsored hacker breached the US Treasury Department's systems in early December, accessing employee data via a vulnerability in the BeyondTrust system; the Treasury Department is investigating with the FBI, while China denies involvement.
Chinese Hacker Breaches US Treasury Department Systems
A Chinese state-sponsored hacker breached the US Treasury Department's systems in early December, accessing employee data via a vulnerability in the BeyondTrust system; the Treasury Department is investigating with the FBI, while China denies involvement.
Progress
48% Bias Score


Chinese Hackers Breach US Treasury in Major Cyberattack
On Tuesday, Chinese hackers stole several unclassified documents from the US Department of the Treasury after compromising a third-party software provider; the Treasury Department, along with the FBI and CISA, are investigating the incident, which follows the disclosure of a large-scale Chinese cybe...
Chinese Hackers Breach US Treasury in Major Cyberattack
On Tuesday, Chinese hackers stole several unclassified documents from the US Department of the Treasury after compromising a third-party software provider; the Treasury Department, along with the FBI and CISA, are investigating the incident, which follows the disclosure of a large-scale Chinese cybe...
Progress
48% Bias Score


Chinese Hackers Access U.S. Treasury Department Systems
Chinese hackers accessed several U.S. Treasury Department workstations and unclassified documents after compromising third-party software provider BeyondTrust on December 8th; the department stated there is currently no evidence of continued access, and the incident is under investigation as a major...
Chinese Hackers Access U.S. Treasury Department Systems
Chinese hackers accessed several U.S. Treasury Department workstations and unclassified documents after compromising third-party software provider BeyondTrust on December 8th; the department stated there is currently no evidence of continued access, and the incident is under investigation as a major...
Progress
32% Bias Score

Massive Google Chrome Extension Hack Bypasses 2FA
A cyberattack in late December 2024 compromised at least 35 Google Chrome extensions, potentially impacting 2.6 million users; attackers used phishing emails and fake Chrome Web Store domains to distribute malware bypassing two-factor authentication, specifically targeting Facebook accounts.

Massive Google Chrome Extension Hack Bypasses 2FA
A cyberattack in late December 2024 compromised at least 35 Google Chrome extensions, potentially impacting 2.6 million users; attackers used phishing emails and fake Chrome Web Store domains to distribute malware bypassing two-factor authentication, specifically targeting Facebook accounts.
Progress
32% Bias Score

Chinese Hackers Breach U.S. Treasury Systems
Chinese state-sponsored hackers breached the U.S. Treasury Department's systems via third-party provider BeyondTrust in December 2023, stealing unclassified documents; the incident is under investigation by the FBI and CISA.

Chinese Hackers Breach U.S. Treasury Systems
Chinese state-sponsored hackers breached the U.S. Treasury Department's systems via third-party provider BeyondTrust in December 2023, stealing unclassified documents; the incident is under investigation by the FBI and CISA.
Progress
44% Bias Score

Chinese State-Sponsored Cyberattack Breaches US Treasury Systems
On December 8th, the US Treasury Department revealed a major cybersecurity incident where a Chinese state-sponsored actor gained unauthorized access to several workstations and unclassified documents via a compromised third-party software service provider, BeyondTrust.

Chinese State-Sponsored Cyberattack Breaches US Treasury Systems
On December 8th, the US Treasury Department revealed a major cybersecurity incident where a Chinese state-sponsored actor gained unauthorized access to several workstations and unclassified documents via a compromised third-party software service provider, BeyondTrust.
Progress
8% Bias Score

Chinese Hackers Breach US Treasury, New Investment Restrictions Imposed
Chinese hackers breached a US Treasury third-party software vendor, accessing unclassified documents; this follows the Salt Typhoon campaign affecting nine US telecommunication companies, and new US investment restrictions in sensitive Chinese technologies start January 2nd.

Chinese Hackers Breach US Treasury, New Investment Restrictions Imposed
Chinese hackers breached a US Treasury third-party software vendor, accessing unclassified documents; this follows the Salt Typhoon campaign affecting nine US telecommunication companies, and new US investment restrictions in sensitive Chinese technologies start January 2nd.
Progress
40% Bias Score

US Treasury Department Suffers Cyberattack, China-Backed Actor Suspected
The US Treasury Department confirmed a December 2023 cyberattack targeting multiple workstations through a compromised third-party software, BeyondTrust; the attackers stole an encryption key granting access, but no classified data was compromised, according to the department. The attack is attribut...

US Treasury Department Suffers Cyberattack, China-Backed Actor Suspected
The US Treasury Department confirmed a December 2023 cyberattack targeting multiple workstations through a compromised third-party software, BeyondTrust; the attackers stole an encryption key granting access, but no classified data was compromised, according to the department. The attack is attribut...
Progress
40% Bias Score

Data Breach Recovery Plan: Six Steps To Safeguard Your Information
This guide details a six-step recovery plan following a data breach, including verifying the breach, securing accounts, addressing email and phone risks, protecting identity, reviewing online presence, and exploring legal and financial recourse.

Data Breach Recovery Plan: Six Steps To Safeguard Your Information
This guide details a six-step recovery plan following a data breach, including verifying the breach, securing accounts, addressing email and phone risks, protecting identity, reviewing online presence, and exploring legal and financial recourse.
Progress
32% Bias Score
Showing 97 to 108 of 137 results