A notice to House offices Monday from the chamber’s chief administrative officer said that staffers are forbidden from having WhatsApp on official devices starting next week, prompting a rebuttal from the app’s parent company Meta. “The Office of Cybersecurity has deemed WhatsApp a high-risk to users due to the lack of transparency in how it…
Category: Technology
Artificial Intelligence, Global Security News, Technology
OpenAI’s Sam Altman discusses GPT-5 release date
ChatGPT’s next big upgrade, or the new foundational model “GPT-5,” is still being prepared for a release in the summer, but OpenAI won’t share the specifics. […]
Artificial Intelligence, Global Security News, Technology
ChatGPT will analyze Gmail emails, manage schedule on Google Calendar
ChatGPT appears to be testing support for Gmail and Google Calendar integration. This will allow users to summarise emails and create events. […]
academia, application specific passwords, Europe, Global Security News, privacy, Technology, Threats
Unusually patient suspected Russian hackers pose as State Department in ‘sophisticated’ attacks on researchers
The hackers targeting prominent researcher and Russian military expert Keir Giles were different this time. The attackers, suspected to be working on behalf of the Russian government, had ginned up the May solicitation email for a consultation with a state.gov address, one that didn’t get a bounceback message when Giles replied. They spoke convincing English,…
Global Security News, hackathon, Rapid Rebuild Hackathon, Technology
Rapid Rebuild Hackathon 2025: When Legacy Meets Innovation
Consider this: Berkshire Hathaway, Warren Buffett’s $700 billion conglomerate, operates one of the most influential investor websites on…
Artificial Intelligence, Global Security News, Technology
ChatGPT’s AI coder Codex now lets you choose the best solution
ChatGPT’s Codex, which is an AI agent that lets you code and delegate programming tasks, is now testing a new feature that lets you choose the best solution. […]
Android, Gaming, Global Security News, iOS, Technology, unity
How to Monetize Unity Apps: Best Practices
Unity is one of the most popular game engines for mobile and cross-platform app development. It powers millions…
Global Security News, Technology
Google Cloud and Cloudflare hit by widespread service outages
Google Cloud and Cloudflare are investigating ongoing outages impacting access to sites and various services across multiple regions. […]
Access Now, Citizen Lab, Europe, Global Security News, Italy, privacy, Technology
Paragon spyware found on the phones of Euro journos
Researchers revealed Wednesday that they have confirmed Paragon spyware on an Apple product for the first time, on the phones of European journalists, amid an unfolding surveillance scandal in Italy. University of Toronto’s Citizen Lab published a report on its findings, which confirmed spyware on the phone of an Italian journalist named Ciro Pellegrino, following…
Artificial Intelligence, Global Security News, Technology
ChatGPT o3 API 80% price drop has no impact on performance
ChatGPT o3, which has been available via API, is now 80% cheaper for developers, and there’s no visible impact on performance. […]
AI, Amazon Web Services (AWS), Application Security, Cybersecurity, Global Security News, Technology
How Amazon Web Services uses AI to be a security ‘force multiplier’
When Amazon Web Services deploys thousands of new digital sensors around the globe, it often runs into a ruthless truth of the internet: Within minutes, the sensors are poked, prodded, and attacked. However, using large language models, the company is turning those immediate attacks into actionable security intelligence for its vast array of cloud-centered services. …
cyber espionage, Cybersecurity, espionage, Exploits, Global Security News, Technology, Threats
Microsoft Patch Tuesday addresses 66 vulnerabilities, including an actively exploited zero-day
Microsoft addressed 66 vulnerabilities across its suite of products and systems, including a zero-day in WebDAV that allows unauthorized attackers to remotely execute code, the company said in its latest security update Tuesday. The espionage group Stealth Falcon exploited the zero-day — CVE-2025-33053 — to execute malware on a defense company in Turkey in March,…
Global Security News, Technology
Massive Heroku outage impacts web platforms worldwide
Heroku is suffering a widespread outage that has lasted over six hours, preventing developers from logging into the platform and breaking website functionality. […]
Global Security News, Technology
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps. […]
Global Security News, Technology
Linux Foundation unveils decentralized WordPress plugin manager
A collective of former WordPress developers and contributors backed by the Linux Foundation has launched the FAIR Package Manager, a new and independent distribution system for trusted WordPress plugins and themes. […]
Artificial Intelligence, Global Security News, Technology
ChatGPT prepares o3-pro model for $200 Pro subscribers
OpenAI is planning to ship an update to ChatGPT that will turn on the new o3 Pro model, which has more compute to think harder. […]
Android, Cellebrite, Corellium, encryption, Exploits, Global Security News, iOS, Mobile Security, Money, Technology
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
Security technology company Cellebrite has announced plans to acquire Florida-based mobile testing startup Corellium for $170 million in cash, with an additional $20 million converted to equity at closing and the potential for $30 million more based on performance milestones. The Israel-headquartered Cellebrite, known for its forensic equipment that unlocks smartphones, said the acquisition would…
AI, Artificial Intelligence (AI), Cybersecurity, Exploits, Global Security News, Research, software security, Technology, Uncategorized, vibe coding
Vibe coding is here to stay. Can it ever be secure?
Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…
AI, Artificial Intelligence (AI), Cybersecurity, Exploits, Global Security News, Research, software security, Technology, Uncategorized, vibe coding
Vibe coding is here to stay. Can it ever be secure?
Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…
AI, Artificial Intelligence (AI), Cybersecurity, Exploits, Global Security News, Research, software security, Technology, Uncategorized, vibe coding
Vibe coding is here to stay. Can it ever be secure?
Software powers the world, and soon, the bulk of the work making it may be done by machines. As generative AI tools have gotten more proficient at coding, their use in software development has exploded. Proponents say the tools have made it dramatically easier for individual entrepreneurs or companies to create the kind of slick,…
Cybercrime, Cybersecurity, extortion, Global Security News, Google, Google Threat Intelligence Group, Microsoft 365, OAuth, Okta, phishing, Salesforce, Social Engineering, Technology, Threats
Salesforce customers duped by series of social-engineering attacks
A financially motivated threat group posing as IT support has intruded the systems of about 20 organizations by duping employees into installing a malicious, illegitimate version of Salesforce’s Data Loader and granting broader access to cloud-based environments, Google Threat Intelligence Group said in a threat report released Wednesday. The attacks, which Google attributes to UNC6040,…
Cybercrime, Cybersecurity, extortion, Global Security News, Google, Google Threat Intelligence Group, Microsoft 365, OAuth, Okta, phishing, Salesforce, Social Engineering, Technology, Threats
Salesforce customers duped by series of social-engineering attacks
A financially motivated threat group posing as IT support has intruded the systems of about 20 organizations by duping employees into installing a malicious, illegitimate version of Salesforce’s Data Loader and granting broader access to cloud-based environments, Google Threat Intelligence Group said in a threat report released Wednesday. The attacks, which Google attributes to UNC6040,…
Cybercrime, Cybersecurity, extortion, Global Security News, Google, Google Threat Intelligence Group, Microsoft 365, OAuth, Okta, phishing, Salesforce, Social Engineering, Technology, Threats
Salesforce customers duped by series of social-engineering attacks
A financially motivated threat group posing as IT support has intruded the systems of about 20 organizations by duping employees into installing a malicious, illegitimate version of Salesforce’s Data Loader and granting broader access to cloud-based environments, Google Threat Intelligence Group said in a threat report released Wednesday. The attacks, which Google attributes to UNC6040,…
Global Security News, Technology
Photoshop for Beginners – Overview of Top Skills and How to Hone Them
What comes to your mind when you think of Photoshop? A tool for editing and retouching photos –…
Artificial Intelligence, Global Security News, Technology
ChatGPT rolls out Memory upgrade for free users
ChatGPT’s memory feature is now better and capable of referencing past conversations for free accounts. […]
Artificial Intelligence, Global Security News, Technology
ChatGPT rolls out Memory upgrade for free users
ChatGPT’s memory feature is now better and capable of referencing past conversations for free accounts. […]
Artificial Intelligence, Global Security News, Technology
ChatGPT rolls out Memory upgrade for free users
ChatGPT’s memory feature is now better and capable of referencing past conversations for free accounts. […]
Android, CISA, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Exploits, Global Security News, Google, Google Threat Analysis Group, patching, Qualcomm, Technology, vulnerabilities, zero days
Google addresses 34 high-severity vulnerabilities in June’s Android security update
Google’s June security update for Android devices contains 34 vulnerabilities, all of which the company designates as high-severity defects. The company didn’t disclose any actively exploited vulnerabilities. Attackers could exploit the most serious flaw — CVE-2025-26443 affecting the Android system — to achieve local escalation of privilege with no additional privileges required. Google said exploitation…
Android, CISA, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Exploits, Global Security News, Google, Google Threat Analysis Group, patching, Qualcomm, Technology, vulnerabilities, zero days
Google addresses 34 high-severity vulnerabilities in June’s Android security update
Google’s June security update for Android devices contains 34 vulnerabilities, all of which the company designates as high-severity defects. The company didn’t disclose any actively exploited vulnerabilities. Attackers could exploit the most serious flaw — CVE-2025-26443 affecting the Android system — to achieve local escalation of privilege with no additional privileges required. Google said exploitation…
Android, CISA, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Exploits, Global Security News, Google, Google Threat Analysis Group, patching, Qualcomm, Technology, vulnerabilities, zero days
Google addresses 34 high-severity vulnerabilities in June’s Android security update
Google’s June security update for Android devices contains 34 vulnerabilities, all of which the company designates as high-severity defects. The company didn’t disclose any actively exploited vulnerabilities. Attackers could exploit the most serious flaw — CVE-2025-26443 affecting the Android system — to achieve local escalation of privilege with no additional privileges required. Google said exploitation…
Commentary, CVE, Cybersecurity, Exploits, Global Security News, MITRE, NVD, Research, Technology, Threats, Vulnerability Management
Future-ready cybersecurity: Lessons from the MITRE CVE crisis
The recent funding crisis surrounding MITRE’s Common Vulnerabilities and Exposures (CVE) program was more than just a bureaucratic hiccup — it was a wake-up call for an industry that has relied on CVEs for years to identify, categorize, and prioritize vulnerabilities. Out of the blue, we discovered the foundation was suddenly at risk. Worse still,…
Commentary, CVE, Cybersecurity, Exploits, Global Security News, MITRE, NVD, Research, Technology, Threats, Vulnerability Management
Future-ready cybersecurity: Lessons from the MITRE CVE crisis
The recent funding crisis surrounding MITRE’s Common Vulnerabilities and Exposures (CVE) program was more than just a bureaucratic hiccup — it was a wake-up call for an industry that has relied on CVEs for years to identify, categorize, and prioritize vulnerabilities. Out of the blue, we discovered the foundation was suddenly at risk. Worse still,…
Commentary, CVE, Cybersecurity, Exploits, Global Security News, MITRE, NVD, Research, Technology, Threats, Vulnerability Management
Future-ready cybersecurity: Lessons from the MITRE CVE crisis
The recent funding crisis surrounding MITRE’s Common Vulnerabilities and Exposures (CVE) program was more than just a bureaucratic hiccup — it was a wake-up call for an industry that has relied on CVEs for years to identify, categorize, and prioritize vulnerabilities. Out of the blue, we discovered the foundation was suddenly at risk. Worse still,…
Asia Pacific, Global Security News, national security, Technology
OpenAI’s Pitch to Trump: Rank the World on U.S. Tech Interests
OpenAI has always said it’s a different kind of Big Tech titan, founded not just to rack up a stratospheric valuation of $400 billion (and counting), but also to “ensure that artificial general intelligence benefits all of humanity.” The meteoric machine-learning firm announced itself to the world in a December 2015 press release that lays…
Asia Pacific, Global Security News, national security, Technology
OpenAI’s Pitch to Trump: Rank the World on U.S. Tech Interests
OpenAI has always said it’s a different kind of Big Tech titan, founded not just to rack up a stratospheric valuation of $400 billion (and counting), but also to “ensure that artificial general intelligence benefits all of humanity.” The meteoric machine-learning firm announced itself to the world in a December 2015 press release that lays…
Asia Pacific, Global Security News, national security, Technology
OpenAI’s Pitch to Trump: Rank the World on U.S. Tech Interests
OpenAI has always said it’s a different kind of Big Tech titan, founded not just to rack up a stratospheric valuation of $400 billion (and counting), but also to “ensure that artificial general intelligence benefits all of humanity.” The meteoric machine-learning firm announced itself to the world in a December 2015 press release that lays…
Global Security News, Politics, Technology
Trump’s Big, Beautiful Handout to the AI Industry
Not long ago, artificial intelligence executives were asking Congress for more regulation. The House of Representatives budget bill passed last week demonstrates how quickly the industry has changed course. Inside the House bill is a moratorium on the sort of state-level AI regulations that have addressed political “deepfakes” and using AI to deny medical claims.…
Global Security News, Politics, Technology
Trump’s Big, Beautiful Handout to the AI Industry
Not long ago, artificial intelligence executives were asking Congress for more regulation. The House of Representatives budget bill passed last week demonstrates how quickly the industry has changed course. Inside the House bill is a moratorium on the sort of state-level AI regulations that have addressed political “deepfakes” and using AI to deny medical claims.…
Global Security News, Politics, Technology
Trump’s Big, Beautiful Handout to the AI Industry
Not long ago, artificial intelligence executives were asking Congress for more regulation. The House of Representatives budget bill passed last week demonstrates how quickly the industry has changed course. Inside the House bill is a moratorium on the sort of state-level AI regulations that have addressed political “deepfakes” and using AI to deny medical claims.…
AI, Brendan Carr, FCC, Global Security News, Government, robocalls, STIR/SHAKEN, Technology
FCC looking to expand anti-robocalling initiative
Federal Communications Commission Chair Brendan Carr told Congress the agency is looking to expand the use of call authentication protocols that help crack down on robocalling more broadly, while floating the possibility that he may ask for enhanced authorities to take bad actors to court for AI-generated deepfakes over telephone and broadcast networks. While testifying…
Global Security News, Technology
Microsoft Says It’s Censoring Employee Emails Containing the Word “Palestine”
Following multiple employee-led protests against the company’s contracts with the Israeli military, Microsoft workers discovered that any emails they send containing the word “Palestine” inexplicably disappear. According to internal communications reviewed by The Intercept, employees on Wednesday began noticing that email messages sent from their company account containing a handful of keywords related to Palestine…
Global Security News, Technology
U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
The ever-growing market for personal data has been a boon for American spy agencies. The U.S. intelligence community is now buying up vast volumes of sensitive information that would have previously required a court order, essentially bypassing the Fourth Amendment. But the surveillance state has encountered a problem: There’s simply too much data on sale…
El Salvador, Global Security News, Hanan Elatr Khashoggi, Jamal Khashoggi, NSO Group, privacy, Saudi Arabia, Spyware, Technology, U.S. courts, United Arab Emirates, United Arab Emirates (UAE), WhatsApp
Appeals court rejects attempt by Khashoggi widow to renew suit against NSO Group
An appeals court on Wednesday rejected a bid by the widow of murdered Washington Post journalist Jamal Khashoggi to revive a lawsuit against spyware maker NSO Group, whom she alleged played a role in her husband’s death. The U.S. District Court for the Eastern District of Virginia had dismissed the suit from Hanan Elatr Khashoggi,…
Cybercrime, fbi, Federal Bureau of Investigation (FBI), Global Security News, Matthew Lane, North America, powerschool, Ransomware, Shiny Hunters, ShinyHunters, Technology, U.S. courts
Massachusetts man will plead guilty in PowerSchool hack case
A Massachusetts man will plead guilty to charges related to the hack of PowerSchool, the education software vendor that says it supports more than 60 million students, and that led to ransom demands at school boards and districts across the United States. In court documents filed Tuesday, prosecutors spelled out charges against 19-year-old Assumption University…
Global Security News, Politics, Technology
Senate Dems Hand Trump a Win by Backing Stablecoin Bill
As President Donald Trump prepares to welcome the top investors in his meme coin to a private dinner, centrist Senate Democrats gave a different kind of gift to the crypto industry on Monday. Two weeks after helping tank an earlier vote on the so-called stablecoin bill, a group of 16 Democrats voted with nearly every…
Global Security News, North America, Technology, World
Google Worried It Couldn’t Control How Israel Uses Project Nimbus, Files Reveal
Before signing its lucrative and controversial Project Nimbus deal with Israel, Google knew it couldn’t control what the nation and its military would do with the powerful cloud-computing technology, a confidential internal report obtained by The Intercept reveals. The report makes explicit the extent to which the tech giant understood the risk of providing state-of-the-art…
2009, cross-site scripting, cyber security, Cyber Security Podcast, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Early Social Media, Episodes, Facebook, Global Security News, Information Security, infosec, internet security, online safety, Podcast, Podcasts, privacy, privacy laws, SBN News, Security, Security Bloggers Network, Social Media Awareness, Social Media Risks, Social Media Security, Tech Podcast, Technology, Weekly Edition, XSS
Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security from the past and see…
Artificial Intelligence, Global Security News, Technology
ChatGPT is finally adding Download as PDF for Deep Research
ChatGPT’s Deep Research, which allows you to conduct multi-step research for complex tasks, is finally getting an option to save the report as a PDF. […]
Check Point, CISA, cisco, CVE, Cybercrime, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), edge devices, exploit, Exploits, firewall, Fortinet, Global Security News, Mandiant, Palo Alto Networks, Rapid7, Research, sonicwall, Technology, Threats, virtual private network (VPN), vulnerabilities
SonicWall customers confront resurgence of actively exploited vulnerabilities
Vulnerabilities are proliferating in SonicWall devices and software this year, putting the vendor’s customers at risk of intrusion via secure access gateways and firewalls. The year started off on a sour note for the California-based company when it released security advisories for nine vulnerabilities on Jan. 7. The total number of vulnerabilities publicly disclosed by…
Global Security News, North America, Politics, Technology
Democrats Woke Up to Trump’s Crypto Grift. Will They Stop Other Scammers?
Cryptocurrency legislation once seemed to be the rare issue that could draw bipartisan support in Donald Trump’s Washington, thanks to the industry’s prolific donations on both sides of the aisle. Then Trump and his family attempted to monetize the presidency through a meme coin and a $2 billion crypto deal involving an Abu Dhabi-backed venture…
Global Security News, national security, Technology
Trump Army Appointee Should Sell His Anduril Stock, Sen. Warren Demands
Sen. Elizabeth Warren is calling for President Trump’s pick for Under Secretary of the Army to sell his stock in a defense contractor that experts say would pose a clear conflict of interest. In a federal ethics agreement first reported by The Intercept, Michael Obadal, Trump’s pick for the second most powerful post at the…
crowdstrike, Cybersecurity, Global Security News, Jobs, Technology, Workforce
CrowdStrike cuts 5% of workforce after revenue jumped 29% last year
CrowdStrike is cutting 5% of its workforce, about 500 positions, telling its staff that it’s shifting resources and realigning its operating model for growth in new market segments, according to a Wednesday filing with the Securities and Exchange Commission. The company is slashing headcount following a year of significant growth in a strong market. CrowdStrike’s revenue…
Global Security News, Meta, NSO Group, privacy, Spyware, Technology, U.S. courts, WhatsApp
NSO Group owes $168M in damages to WhatsApp over spyware infections, jury says
A federal jury decided Tuesday that NSO Group must pay WhatsApp approximately $168 million in damages after a judge ruled that it violated anti-hacking laws when 1,400 of the messaging application’s users became infected with Pegasus spyware. It’s the latest in a series of wins in court for WhatsApp in its pioneering lawsuit that has produced…
Android, Cybersecurity, Exploits, Global Security News, Google, Mobile, Mobile Security, security patch, Technology, vulnerabilities
Google addresses 1 actively exploited vulnerability in May’s Android security update
Google addressed 47 vulnerabilities affecting Android devices in its May security update, including an actively exploited software defect that was first disclosed in March. Google said the high-severity vulnerability, CVE-2025-27363, “may be under limited, targeted exploitation.” The out-of-bounds write defect in FreeType versions 2.13.0 and below may result in arbitrary code execution, Facebook said in…
Artificial Intelligence, Global Security News, Technology
OpenAI document explains when to use each ChatGPT model
OpenAI admitted that it can be confusing for users to choose between all the different models, but the company has quietly published a document that makes it easier to understand ChatGPT. […]
Amazon, CISA, crowdstrike, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Cybersecurity Collaboration Center, Global Security News, Google, Government, intelligence sharing, Joint Cyber Defense Collaborative, Joint Cyber Defense Collaborative (JCDC), National Security Agency, National Security Agency (NSA), Palo Alto Networks, Research, Technology, Threat Intelligence, Threats
Amazon, CrowdStrike, Google and Palo Alto Networks claim no change to threat intel sharing under Trump
SAN FRANCISCO — Threat intelligence sharing is flowing between the private sector and federal government and remains unimpeded thus far by job losses and budget cuts across federal agencies that support the cyber mission, according to executives at major security firms. Top brass at Amazon, CrowdStrike, Google and Palo Alto Networks said there’s been no…
Amazon Web Services (AWS), CloudFlare, Global Security News, IBM, NIST, Post-Quantum Cryptography, quantum computing, RSAC 2025 Conference, Technology
Quantum computer threat spurring quiet overhaul of internet security
SAN FRANCISCO — Cryptography experts say the race to fend off future quantum-computer attacks has entered a decisive but measured phase, with companies quietly replacing the internet plumbing that the majority of the industry once considered unbreakable. Speaking at Cloudflare’s Trust Forward Summit on Wednesday, encryption leaders at IBM Research, Amazon Web Services and Cloudflare…
Cybercrime, Cybersecurity, Global Security News, google cloud, Google Threat Intelligence Group, Mandiant, North Korea, North Korean IT workers, Research, Technology, Threats
North Korean operatives have infiltrated hundreds of Fortune 500 companies
SAN FRANCISCO — North Korean nationals have infiltrated the employee ranks at top global companies more so than previously thought, maintaining a pervasive and potentially widening threat against IT infrastructure and sensitive data. “There are hundreds of Fortune 500 organizations that have hired these North Korean IT workers,” Mandiant Consulting CTO Charles Carmakal said Tuesday…
Global Security News, Politics, Technology
Trump’s Auto Tariff Relief “Helps Tesla a Lot” — Leaving Other Carmakers Behind
Donald Trump’s latest adjustment to automobile tariffs were billed as relief for the Big Three carmakers, but a leading analyst said Wednesday that Elon Musk’s Tesla will benefit most while others will be stuck “in quicksand” — potentially creating a slight advantage for a company whose CEO donated nearly $300 million to Trump and other…
Asia Pacific, Global Security News, Technology, Voices, World
U.S. Companies Honed Their Surveillance Tech in Israel. Now It’s Coming Home.
Illustration: The Intercept In partnership with Rita Murad, a 21-year-old Palestinian citizen of Israel and student at the Technion Israel Institute of Technology, was arrested by Israeli authorities in November 2023 after sharing three Instagram stories on the morning of October 7. The images included a picture of a bulldozer breaking through the border fence in Gaza…
AI, Congress, content moderation, deepfakes, FTC, Global Security News, Government, Technology
House passes legislation to criminalize nonconsensual deepfakes
The House passed a bill Monday evening that would criminalize using a person’s likeness to create nonconsensual deepfake pornography. The Take It Down Act sailed through the chamber on a vote of 402-2, marking one of the first major pieces of legislation passed by Congress to address AI-generated deepfakes. The bill makes it a federal…
AI, AI-based technology, Cybersecurity, Deep Fake and Other Social Engineering Tactics, deepfakes, Global Security News, human creativity, humans, inclusive learning., quantum computing, Security Boulevard (Original), Social - Facebook, Social - LinkedIn, Social - X, Social Engineering, Technology
The Human Advantage in the Age of Technological Uncertainties
Our excessive reliance on technology has disabled us from crossing the barriers to experience, sense, and relate with others the way we used to. The post The Human Advantage in the Age of Technological Uncertainties appeared first on Security Boulevard.
Global Security News, Politics, Technology
AI Firm Behind Mysterious Trump Donation Is Run by Alleged Election Overthrow Plotter
An obscure nonprofit group that gave $100,000 to Donald Trump’s inaugural committee was bankrolled by an artificial intelligence company whose CEO was an unindicted co-conspirator in Trump’s election interference case in Georgia, the company’s president confirmed to The Intercept. Unlike more established megadonors such as Boeing or the Heritage Foundation, however, the Institute for Criminal…
Access Now, Exploits, Global Security News, Israel, Jamal Khashoggi, NSO Group, privacy, Spyware, Technology, U.S. courts, WhatsApp
Judge limits evidence about NSO Group customers, victims in damages trial
A federal judge last week placed strict limits on the kind of evidence NSO Group can raise during a trial on damages in the lawsuit WhatsApp brought against the spyware vendor over allegations it hacked 1,400 of the messaging platform’s users. Under the order, NSO Group is prohibited from presenting evidence about its customers’ identities,…
CISA, Cybersecurity, Global Security News, Government, Policy, resigns, secure by design, Technology, Workforce
Multiple top CISA officials behind ‘Secure by Design’ resign
Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the agency. Bob Lord, senior technical adviser and Lauren Zabierek, senior advisor at CISA, were both chief architects behind CISA’s Secure by Design initiative, which garnered voluntary commitments from major vendors…
Artificial Intelligence, Global Security News, Technology
OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits
OpenAI has launched three new reasoning models – o3, o4-mini, and o4-mini-high for Plus and Pro subscribers, but as it turns out, these models do not offer ‘unlimited’ usage. […]
AI, Asia Pacific, china, Congress, Cybersecurity, deepseek, export control, Geopolitics, Global Security News, Government, House Select Committee on Chinese Communist Party, openai, Technology
House investigation into DeepSeek teases out funding, security realities around Chinese AI tool
A House panel has concluded that the U.S. government should double down on export controls and other tools to slow down the progress of Chinese AI companies like DeepSeek, while also preparing for a future where those efforts fail. In a report released Wednesday, the House Select Committee on the Chinese Communist Party further fleshes…
Asia Pacific, china, China Telecom, Global Security News, iVerify, Japan, New Zealand, privacy, Salt Typhoon, Saudi Arabia, surveillance, Technology, telecommunications, Threats
35 countries use Chinese networks for transporting mobile user traffic, posing cyber risks
U.S. allies are among the 35 countries where mobile providers employ China-based networks for transporting user traffic, opening travelers and residents in those nations to potential surveillance, an analysis published Thursday concludes. “Everyone knows that they have to be careful with their phones when they travel to China,” Rocky Cole, chief operating officer at iVerify,…
Global Security News, Google, Technology
Google begins unifying search country domains to Google.com
Google has announced that it’s retiring separate country code top-level domain names like google.co.uk or google.com.br and redirecting users to Google.com. […]
Global Security News, Security, Technology
Jira Down: Atlassian users experiencing degraded performance
Atlassian users are experiencing degraded performance amid an ‘active incident’ affecting multiple Jira products since morning hours today. Jira, Jira Service Management, Jira Work Management and Jira Product Discovery are among the impacted products. […]
Artificial Intelligence, Europe, Global Security News, Technology
Meta to resume AI training on content shared by Europeans
Meta announced today that it will soon start training its artificial intelligence models using content shared by European adult users on its Facebook and Instagram social media platforms. […]
Cloud Security, Global Security News, lastpass, password manager, Security, Technology
How to Use LastPass Password Manager
Learn how to set up and use LastPass password manager. Start managing and storing your passwords with this step-by-step guide.
china, CISA, cisco, citrix, Coalition, CVE, Cybercrime, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), edge devices, espionage, exploit, Exploits, firewall, firewalls, Fortinet, Gartner, Global Security News, Google Threat Intelligence Group, ivanti, known exploited vulnerabilities (KEV), Mandiant, National Vulnerability Database, NIST, Palo Alto Networks, Rapid7, Research, routers, Technology, Threats, virtual private network (VPN), VulnCheck, vulnerabilities, vulnerability disclosure, zero days
Is Ivanti the problem or a symptom of a systemic issue with network devices?
Network edge devices — hardware that powers firewalls, VPNs and network routers — have quickly moved up the list of attackers’ preferred intrusion points into enterprise networks. While dozens of companies make and sell these devices, customers of one company in particular — Ivanti — have confronted exploited vulnerabilities in their products more than any…
Cybersecurity, El Salvador, Global Security News, North America, NSO Group, privacy, Spyware, Technology, U.S. courts
Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos
A panel of U.S. judges considering an appeal of a ruling that went against El Salvadoran journalists suing NSO Group over alleged infections of their phone by the company’s Pegasus spyware appeared more skeptical Thursday of the vendor’s arguments than those of the reporters. Judge James Donato of the District Court for the Northern District…
Global Security News, Hardware, Technology
Flipper Zero maker unveils ‘Busy Bar,’ a new ADHD productivity tool
Flipper Devices, the company behind the popular Flipper Zero, has launched an open-source productivity tool called Busy Bar, designed to help reduce distractions for people with ADHD. […]
Android, Cellebrite, Cybersecurity, Exploits, Global Security News, Google, Mobile, Mobile Security, security patch, Technology, Threats, vulnerabilities, zero days
Google addresses 2 actively exploited vulnerabilities in security update
Google addressed 62 vulnerabilities affecting Android devices in its April security update, including a pair of actively exploited software defects that were first disclosed in December. Google said the two vulnerabilities — CVE-2024-53197 and CVE-2024-53150 — “may be under limited, targeted exploitation.” The pair of flaws under active exploitation are high-severity and affect the Linux…
Austria, Denmark, estonia, France, Germany, Global Security News, Hungary, Ireland, Italy, Japan, kosovo, Luxembourg, Moldova, Netherlands, North America, Pall Mall Process, poland, Policy, privacy, Slovakia, Slovenia, Spyware, Sweden, switzerland, Technology, United Kingdom (U.K.), vulnerability disclosure
Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
Twenty-one nations signed on to a voluntary accord last week in Paris to govern the use of commercial hacking tools commonly known as spyware, after more than a year of work on the agreement. The Pall Mall Process, or Code of Practices for States, has four pillars for the responsible use of the surveillance tech,…
23andMe, Bankruptcy, cyber security, cyber threat, Cybersecurity, data deletion, Data Privacy, data retention, Data Security, Digital Privacy, DNA, DNA Privacy, Episodes, genetic testing, Global Security News, Government Accountability, Information Security, infosec, Legal Challenges, Military Protocol, personal data, Podcast, Podcasts, privacy, Security, Security Bloggers Network, signal, Signal Gate, Technology, Weekly Edition
The 23andMe Collapse, Signal Gate Fallout
In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of…
Global Security News, Technology, Uncategorized
Google Is Helping the Trump Administration Deploy AI Along the Mexican Border
Five years after Google Cloud CEO Thomas Kurian assured employees that the company was “not working on any projects associated with immigration enforcement at the southern border,” federal contract documents reviewed by The Intercept show that the tech giant is at the center of project to upgrade the so-called virtual wall. U.S. Customs and Border…
Amazon Web Services (AWS), Check Point, cisco, Cybersecurity, Exploits, firewall, Forcepoint, Fortinet, Global Security News, google cloud, Juniper Networks, Microsoft Azure, Palo Alto Networks, Research, Technology, Versa Networks
Independent tests show why orgs should use third-party cloud security services
Businesses don’t always get what they pay for in cybersecurity. Some of the most expensive cloud network firewall vendors are among the worst performers against exploits and evasions, according to the most comprehensive, independent testing CyberRatings.org has conducted to date. Cisco, by far the most expensive cloud network firewall offering across the top 10 vendors…
Cloud Security, Global Security News, keepass, password manager, Security, Technology
KeePass Review (2025): Features, Pricing, and Security
While its downloadable plugins make it highly customizable, KeePass’ unintuitive interface holds it back from one of our top password manager picks.
Apple, CVE, Cybersecurity, Exploits, Global Security News, iOS, iPadOS, macOS, Safari, security patch, Technology, zero days
Apple issues fixes for vulnerabilities in both old and new OS versions
Apple released security updates Monday to address software defects in the latest version of the company’s Safari browser and other applications across iOS, iPadOS and macOS. The security issues addressed across the latest versions of Apple’s most popular platforms include 62 vulnerabilities affecting iOS 18.4 and iPadOS 18.4, 131 vulnerabilities affecting macOS Sequoia 15.4 and…
AI, AI and Privacy, ai models, cyber security, cyber threat, Cybersecurity, Data Privacy, Data Security, Digital Privacy, Digital Surveillance, eBay, eBay Privacy Policy, Episodes, Global Security News, Information Security, infosec, LLM, North America, Podcast, Podcasts, privacy, Security, Security Bloggers Network, Smart Privacy, Tech Podcast, Tech Policy, Technology, Weekly Edition
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how…
Global Security News, Technology
Crossing the U.S. Border? Here’s How to Protect Yourself
The crackdown is already happening. First, Mahmoud Khalil was snatched from his home in New York. Then, immigrants in the U.S. were targeted for their political views, and foreigners reported being denied entry at the border after having their devices searched. Even before Donald Trump was sworn in, border searches of electronics were steadily rising.…
Artificial Intelligence (AI), Asia Pacific, china, cloud computing, Commerce Department, Geopolitics, Global Security News, Government, quantum computing, sanctions, semiconductors, Technology
Commerce limits 19 Chinese, Taiwanese companies from buying U.S. tech
The Commerce Department plans to finalize economic sanctions this week on nearly 20 Chinese and Taiwanese organizations, citing the need to limit their access to U.S. cloud, artificial intelligence and quantum computing technologies. The sanctions, which will be detailed and published Friday in the Federal Register , would place additional license requirements on, and limit…
Global Security News, Microsoft, Technology
Windows 11 update breaks Veeam recovery, causes connection errors
Microsoft and Veeam are investigating a known issue that triggers connection errors on Windows 11 24H2 systems when restoring from Veeam Recovery Media. […]
Exploits, Global Security News, Technology
U.S. Officials Called Signal a Tool for Terrorists and Criminals. Now They’re Using It.
For years, U.S. officials villainized end-to-end encrypted messaging apps like Signal as the domain of criminals and terrorists and a threat to national security. As fallout over a Signal group chat about Yemen war plans ricocheted through Washington, however, CIA Director John Ratcliffe revealed at a Senate Intelligence Committee hearing on Tuesday that the app…
AI, Application Security, Automation in Security, CISO Suite, cyber defense, cyber security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Governance, Risk & Compliance, Information Security, infosec, IT Security Collaboration, Managing Cybersecurity Data, penetration testing, PlexTrac, Podcast, Podcasts, privacy, purple teaming, Red Teaming, Risk Management, risk scoring, Security, security best practices, Security Bloggers Network, Social Engineering, Technology, Threat Intelligence, vulnerability remediation, Weekly Edition
From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful…
Asia Pacific, china, FCC, Geopolitics, Global Security News, Government, Huawei, Technology, telecommunications, ZTE
FCC’s Carr alleges Chinese companies are making ‘end run’ around Chinese telecom bans, announces investigation
The first initiative from The Federal Communications Commission’s newly-created Council on National Security will be a “sweeping” investigation of Chinese-made equipment in America’s telecommunications infrastructure, the agency announced Friday. In particular, FCC Commissioner Brendan Carr said the focus will be on equipment and services from Chinese companies already barred from U.S. networks under the Secure…
Emerging Tech, Global Security News, Politics, Technology
Musk Is Firing Federal Workers Who Prevent Bloated Tech Contracts
Earlier this month, all of the employees at 18F, a unit of government technologists under the General Services Administration, awoke to a surprise. The entire department — which helps build, buy, and share technological products across government agencies — discovered they’d been placed on administrative leave. 18F, named after its headquarters at 18th and F…
Exploits, Global Security News, Politics, Technology
DEA Insiders Warned About Legality of Phone Tracking Program. Their Concerns Were Kept Secret.
When the Drug Enforcement Administration’s access to a secret trove of billions of American phone records was exposed in 2013, the Obama administration said the data had been collected under a perfectly legal program. Civil liberties advocates, however, were not convinced about that the data collection program — which let the DEA see who you…
CloudFlare, Cybersecurity, Global Security News, Post-Quantum Cryptography, quantum computing, Technology
Cloudflare rolls out post-quantum encryption for enterprise users
Internet security company Cloudflare, the world’s largest DDoS-mitigation service, plans to shift a sizable chunk of its traffic through post-quantum encrypted services over the next year. Approximately 35% of human-directed web traffic to Cloudflare’s network is currently protected through advanced encryption algorithms. These algorithms are theoretically designed to withstand attacks from significantly more powerful quantum…
Bitwarden, Cloud Security, Global Security News, nordpass, password manager, Security, Technology
NordPass vs Bitwarden: Which Is Safer and Easier to Use in 2025?
Which is better, NordPass or Bitwarden? This guide provides a detailed comparison of their features, security and pricing to help you choose your best fit.
Bitwarden, Cloud Security, Global Security News, nordpass, password manager, Security, Technology
NordPass vs Bitwarden: Which Is Safer and Easier to Use in 2025?
Which is better, NordPass or Bitwarden? This guide provides a detailed comparison of their features, security and pricing to help you choose your best fit.
Global Security News, Technology
LAPD Surveilled Gaza Protests Using This Social Media Tool
One week after Hamas’s October 7 attack, thousands rallied outside the Israeli Consulate in Los Angeles to protest the country’s retaliatory assault on Gaza. The protestors were peaceful, according to local media, “carrying signs that said ‘Free Palestine’ and ‘End the Occupation,’” and watched over by a “sizable police presence in the area.” The LAPD…
AI, Application Security, Automation in Security, CISO Suite, cyber defense, cyber security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Data Security, Digital Privacy, Episodes, Global Security News, Governance, Risk & Compliance, Information Security, infosec, IT Security Collaboration, Managing Cybersecurity Data, penetration testing, PlexTrac, Podcast, Podcasts, privacy, purple teaming, Red Teaming, Risk Management, risk scoring, Security, security best practices, Security Bloggers Network, Social Engineering, Technology, Threat Intelligence, vulnerability remediation, Weekly Edition
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today.…
Apple, Global Security News, iPhone, macbook, Technology
Are your iPhone or MacBook hacked?
Understanding Common Misconceptions Digital security is a growing concern, and many Apple users suspect their iPhones or MacBooks have been hacked. However, in most cases, these fears stem from new features, security alerts, or misinterpretations of system behaviour rather than actual cyberattacks. This article explores common reasons why people believe their Apple devices are compromised…
Apple, Global Security News, iPhone, macbook, Technology
Are your iPhone or MacBook hacked?
Understanding Common Misconceptions Digital security is a growing concern, and many Apple users suspect their iPhones or MacBooks have been hacked. However, in most cases, these fears stem from new features, security alerts, or misinterpretations of system behaviour rather than actual cyberattacks. This article explores common reasons why people believe their Apple devices are compromised…
Apple, Cybersecurity, Exploits, Global Security News, iOS, mac, patching, Safari, Technology, Threats, zero days
Apple discloses zero-day vulnerability, releases emergency patches
Apple released emergency software patches Tuesday that address a newly identified zero-day vulnerability in the company’s WebKit web browser engine. Tracked as CVE-2025-24201, an attacker can potentially escape the constraints of Webkit’s Web Content sandbox, potentially leading to unauthorized actions. The sandbox is a security feature that isolates untrusted web content in order to prevent…
Cybersecurity, Data Breaches, Global Security News, Government, insurance, New York, New York Attorney General, New York DFS, Policy, privacy, Technology
New York sues Allstate and subsidiaries for back-to-back data breaches
Allstate and several of the insurance company’s subsidiaries were accused of poor security practices resulting in data breaches in 2020 and 2021 that exposed sensitive data on nearly 200,000 people, the New York State Attorney General office said in a lawsuit filed Monday. National General, an insurance company Allstate acquired for $4 billion in 2021,…