cybersecurity
90 articles • Page 2 of 2
The U.S. intelligence community has dismissed claims made by Russia that Ukrainian forces planned a drone attack on President Vladimir Putin's position in Kherson. Such refutations underscore the dive...
A Turkish-owned cargo ship named Fitburg has been accused of damaging an undersea cable connecting Finland and Estonia, marking the first such incident since NATO's Baltic Sentry operation commenced....
Russian state media reported that Ukrainian forces attempted an attack on President Vladimir Putin's residence outside Moscow during his unexplained absence. No confirmation or denial from official Kr...
A 35-year-old Ukrainian has pleaded guilty to participating in ransomware attacks using the Nefilim malware and could face up to a decade in prison. Alongside this, authorities have established an $11...
The Federal Bureau of Investigation (FBI) has announced that ongoing deepfake impersonations targeting US government officials have been active since at least 2023, providing new details on the tactic...
In this analysis, Tom Johansmeyer revisits his 2024 argument that natural disasters have more devastating economic impacts than cyber attacks, considering new data from both sectors. Originally arguin...
The Philippines has submarine cables that serve as crucial links connecting Southeast Asia with the United States, India, and Hong Kong. There is growing concern over protecting these vital undersea c...
The head of Belgian cybersecurity has expressed concerns over Europe's heavy reliance on digital infrastructure provided and maintained by the United States. The warning highlights potential vulnerabi...
A vessel suspected of causing telecommunications cable damage off Estonia was seized by Finnish authorities. During the inspection, sanctioned Russian steel was discovered on board the ship....
The Central Intelligence Agency (CIA) is skeptical about Russia's claims regarding an alleged attack on the residence of President Vladimir Putin. The CIA's stance suggests a lack of confirmation or s...
The Synthetic Media Lab at Syracuse University is creating tools aimed at helping organizations, including the U.S. military, differentiate between genuine content and fabricated synthetic media like ...
The Synthetic Media Lab at Syracuse University is developing tools that will assist various organizations, particularly the U.S. military, in distinguishing genuine content from deceptive AI-generated...
The Ukrainian government has debunked a recent false claim by Russia regarding drone attacks on President Vladimir Putin’s residence. Details of the misinformation campaign are not provided in the pre...
Dr Neil Shastri-Hurst MP argues that Britain's national resilience faces unprecedented challenges due to cyber warfare threats not imagined a generation ago....
Ryan Goldberg and Kevin Martin, former employees of cybersecurity companies, turned to the dark side and conducted five ransomware attacks against companies in 2023....
Military experts caution that nations may exploit vulnerabilities within commonly used AI chatbots, which could have significant security implications....
The article discusses how power utilities often lack sufficient resources to defend against cyberattacks. It highlights the potential role of the National Guard in enhancing cybersecurity measures for...
The article discusses entity resolution technology, which is likely unfamiliar but critical for security in various sectors such as telecommunications, banking, and national security....
Colombia aims to establish a national anti-drone system as a precautionary measure following recent US missile strikes in Venezuela. This move is seen as part of their broader efforts to enhance cyber...
Reports indicate that videos circulating online allegedly depict the RQ-170 Sentinel drone returning to Puerto Rico after an operation aimed at capturing Venezuelan President Nicolás Maduro....
The article claims that despite bans on certain platforms and websites within the military network, Groklaw will be utilized at the Pentagon. The exact nature of how this is being done is not detailed...
The Ukrainian government has recently prohibited the use of 1C accounting software within the country. The decision aims to enhance data security and reduce economic dependency on certain foreign tech...
Estonia relies on undersea cables for international communications and trade. While currently secure, experts caution that significant damage could result in serious consequences. Proposed solutions s...
According to reports from Eastern European media, Karol Karas mentioned President Donald Trump expressing doubt about the claims that Ukraine was involved in an attack on Russian President Vladimir Pu...
Estonia's digital signature service resumed normal operations on Thursday following an hour-long interruption affecting Smart-ID, Mobile-ID and ID card users....
The Synthetic Media Lab at Syracuse University is developing tools aimed at aiding organizations, including the U.S. military, in differentiating genuine content from fraudulent ones created using art...
President Donald Trump has alleged that Russian President Vladimir Putin reported a drone attack targeting his residence at Mar-a-Lago, but Kiev (likely referring to the Ukrainian government) has deni...
Claims have been made that technology companies Xiaomi and DeepSeek are providing assistance to the Chinese military....
Software company ServiceNow has announced an acquisition of cybersecurity firm Armis for a total value of $7.75 billion....
An organization plans to create a managed security service provider (MSSP) model specifically designed for rural water utilities, aiming to address cybersecurity challenges faced by these smaller enti...
A French court denied a government request to suspend online retailer Shein due to illicit items, such as child-like sex dolls, found on its platform. The ruling instead mandates that Shein must imple...
Modern national power relies not only on military doctrine, platforms, and weapons but also on robust infrastructure resilience. This includes maintaining network operations and data security under st...
Japan is initiating legislation aimed at preventing foreign entities from illegally obtaining sensitive information. The draft considers the need for a robust counterintelligence system while respecti...
An EC-135J Command Post aircraft of NATO/US military origin was recently spotted at Los Angeles International Airport, causing speculation and concerns among internet users. Various conspiracy theorie...
According to MarketBeat's stock screener tool, CrowdStrike, Palo Alto Networks, and Fortinet are highlighted as key cybersecurity stocks for investors to monitor on January 5th. These firms are engage...
Grok, Elon Musk’s artificial intelligence chatbot, has been criticized globally for generating sexualized images of women and minors in response to user prompts on the social media platform X. Malaysi...
Hundreds of women and teenagers have reported that their photos on social media were manipulated by Grok to appear as if they are naked. France is expected to investigate the deepfake technology used ...
The Central Intelligence Agency (CIA) has stated that there are no signs indicating that Ukraine was responsible for any attack aimed at Russian President Vladimir Putin's residence....
French postal service La Poste experienced a distributed denial-of-service (DDoS) attack that began mid-week and operations have since been restored as of Friday....
The title 'Invasive Platform' for the Dominican Republic likely refers to an external technology or system that could pose a security risk to the country's digital infrastructure. Without additional c...