Image Iranian APT group MuddyWater used Chaos ransomware as cover
Cyber stability
05.11.26 Cyber stability
Iranian APT group MuddyWater used Chaos ransomware as cover
Read
01
MIN
Image Ukrainian hacktivist groups BO Team and Head Mare cooperate against Russian targets
Cyber stability
05.11.26 Cyber stability
Ukrainian hacktivist groups BO Team and Head Mare cooperate against Russian targets
Read
01
MIN
Image Is the Cybersecurity World Heading Toward Its Own SaaSpocalypse?
Cyber stability
05.06.26 Cyber stability
Is the Cybersecurity World Heading Toward Its Own SaaSpocalypse?
Read
09
MIN
Image Australia establishes a commission of inquiry into major cyberattacks
Cyber stability
05.06.26 Cyber stability
Australia establishes a commission of inquiry into major cyberattacks
Read
01
MIN
Image Massive data breach hits Asian football two months before the World Cup
Cybercrime
04.29.26 Cybercrime
Massive data breach hits Asian football two months before the World Cup
Read
01
MIN
Image Our Google Search Data Out in the Wild? The Countdown Has Begun!
Cybersecurity
04.28.26 Cybersecurity
Our Google Search Data Out in the Wild? The Countdown Has Begun!
Read
09
MIN
Image World, Sam Altman’s “proof of humanity,” is coming to Zoom and Tinder
Digital transformation
World, Sam Altman’s “proof of humanity,” is coming to Zoom and Tinder
Read
02
MIN
Image Germany investigates Signal hack targeting its political class
Cybercrime
04.27.26 Cybercrime
Germany investigates Signal hack targeting its political class
Read
01
MIN
Image Mythos: Pandora's Box or Marketing Stunt?
Cyber stability
04.27.26 Cyber stability
Mythos: Pandora’s Box or Marketing Stunt?
Read
09
MIN
Image [Roads of surveillance].       6– Policies, Laws and Responses: Who Regulates Surveillance?
Cyber +
04.23.26 Cyber +
Roads of surveillance. 6– Policies, Laws and Responses: Who Regulates Surveillance?
Read
07
MIN
Image Anthropic investigates unauthorized access to its Mythos AI model
Risks management
04.22.26 Risks management
Anthropic investigates unauthorized access to its Mythos AI model
Read
01
MIN
Image Child protection: UK regulator investigates Telegram and two teen chat sites
Cybercrime
04.22.26 Cybercrime
Child protection: UK regulator investigates Telegram and two teen chat sites
Read
01
MIN
Image Palantir Technologies asserts the cultural superiority of the West and considers ethics obsolete in defense matters
Cyber +
04.22.26 Cyber +
Palantir Technologies asserts the cultural superiority of the West and considers ethics obsolete in defense matters
Read
01
MIN
Image Geert Baudewijns (Secutec): “Cyber negotiation is used to frame the situation very early on”
Cyber +
04.22.26 Cyber +
Geert Baudewijns (Secutec): “Cyber negotiation is used to frame the situation very early on”
Read
08
MIN
Image AI Secure: Are we really powerless in the face of the threat?
Cyber +
04.22.26 Cyber +
AI Secure: Are we really powerless in the face of the threat?
Read
04
MIN
Image Privacy: Google, Meta, and Microsoft allegedly ignore user opt-out signals
Cyber +
04.21.26 Cyber +
Privacy: Google, Meta, and Microsoft allegedly ignore user opt-out signals
Read
02
MIN
Image IPTV: European report challenges France’s blocking strategy
Cyber +
04.21.26 Cyber +
IPTV: European report challenges France’s blocking strategy
Read
01
MIN
Image Online regulation of minors : young and overlooked
Cybersecurity
04.21.26 Cybersecurity
Online regulation of minors : young and overlooked
Read
07
MIN
Image Ukraine Confirms Russian Cyber Espionage Operation Targeting Prosecutors and Anti-Corruption Agencies
Cybersecurity
04.20.26 Cybersecurity
Ukraine Confirms Russian Cyber Espionage Operation Targeting Prosecutors and Anti-Corruption Agencies
Read
01
MIN
Image Ransomware: An Economy Scaling Up
Cybercrime
04.18.26 Cybercrime
Ransomware: An Economy Scaling Up
Read
05
MIN
Image OpenAI ramps up cyber defense with GPT-5.4-Cyber, directly challenging Anthropic
Cybersecurity
04.17.26 Cybersecurity
OpenAI ramps up cyber defense with GPT-5.4-Cyber, directly challenging Anthropic
Read
02
MIN