International

OpenAI Thwarts Iranian Influence Operation by Blocking Use of ChatGPT for U.S. Election Propaganda

OpenAI Uncovers Iranian Covert Influence Operation Leveraging ChatGPT for U.S. Election Content OpenAI recently uncovered a covert Iranian influence operation named Storm-2035, utilizing their ChatGPT...

T-Mobile Punished with $60 Million Fine for Violating National Security Agreements

T-Mobile US, Inc. Fined $60 Million by CFIUS for Data Breach Violations The Committee on Foreign Investment in the United States (CFIUS) has made headlines...

The Lingering Nightmare of the National Public Data Breach

National Public Data Breach Exposes Millions of Records and Raises Concerns about Data Privacy The recent data breach of the background-check service National Public Data...

Outsmart your competition by monitoring their latest deals and contracts

Streamline Your Competitive Intelligence Strategy with Feedly's New Deals AI Model Feedly Introduces New AI Model for Tracking Competitors' Deals: A Game-Changer for Competitive Intelligence In...

FTC greenlights legal action against TikTok for breaching COPPA regulations

FTC and DOJ File Lawsuit Against TikTok for Violating Children's Online Privacy Protection Act (COPPA) The Federal Trade Commission (FTC) has filed a lawsuit against...

New T-Head CPU Vulnerabilities Leave Devices Vulnerable to Unrestricted Attacks

Researchers Uncover Architectural Bug in Chinese CPU Chips - Vulnerability Allows Unrestricted Access In a groundbreaking discovery, researchers from the CISPA Helmholtz Center for Information...

Operations at Evolution Mining in Australia Disrupted by Cyberattack

Evolution Mining Cyberattack: Company Responds Swiftly to Ransomware Incident Evolution Mining Limited, a leading Australian mining company specializing in gold extraction, is the latest victim...

Top 13 USB Flash Drives in 2024: Pen Drives, Thumb Drives, Memory Sticks

Tips for Shopping for and Using USB Flash Drives In a world where technology is constantly evolving, choosing the right USB flash drive can be...

Monitor Adversarial Actions in Real-Time Using Threat Actor Insights Cards

Threat Actor Insights Cards - Understanding your adversaries and staying informed Keeping up with today's evolving cyber threats is crucial for organizations looking to protect...

Response of Security Leaders to Ransomware Attack at Olympic Venue

Ransomware Attack Hits Grand Palais Exhibition Hall Hosting Paris Olympics Events The Grand Palais exhibition hall in Paris was targeted in a ransomware attack just...

North Korean Cyber Espionage Group Targets University Professors

Kimsuky Cyber Attack Targeting Universities Linked to North Korea In a recent development, the North Korea-linked threat actor, Kimsuky, has been identified in a series...

Researchers Attending Black Hat Conference Expose AWS Vulnerabilities

Critical AWS Vulnerabilities Discovered by Security Researchers Security researchers have uncovered six critical vulnerabilities in various AWS services that could have led to remote code...

Recent articles