Security

Security

Your privacy and rights online. Cybersecurity trends, hacking news, and policies to safeguard digital assets in a data-driven world.

tea 4chan web hacking leak

Tea app confirms data leak after 4Chan users discover unsecured cloud storage

What just happened? Tea, officially known as "Tea Dating Advice," is a dating safety app that allows women to anonymously share information about men and potential red flag behavior. Now the top free app in the App Store, Tea has been hacked. 4Chan users linked to a public storage bucket containing about 72,000 images, including 13,000 selfies and government-issued IDs used for gender verification.
worldwide microsoft sharepoint hacking zero day cisa sharepoint servers

Worldwide cyberattack underway as hackers exploit Microsoft SharePoint zero-day vulnerability

CISA has identified the exploit as a top-level security threat, a patch is now out
A hot potato: A newly uncovered security flaw in Microsoft's SharePoint software has sparked a widespread series of cyberattacks targeting government organizations, educational institutions, energy companies, and private enterprises around the globe. This threat has prompted coordinated investigations by authorities in the United States, Canada, and Australia, with cybersecurity experts warning that these intrusions represent one of the most serious server-level breaches seen in recent memory.
gmail phishing generative ai prompt injection vishing scam

Google Gemini vulnerable to a stupidly easy prompt injection attack in Gmail AI summaries

Artificial idiocy keeps on improving things... for cybercriminals
AI first, security later: As GenAI tools make their way into mainstream apps and workflows, serious concerns are mounting about their real-world safety. Far from boosting productivity, these systems are increasingly being exploited – benefiting cybercriminals and cost-cutting executives far more than end users. Researchers this week uncovered how Google's Gemini model used in Gmail can be subverted in an incredibly simple way, making phishing campaigns easier than ever.
ssd storage privacy data self-destructing with video

Self-destructing SSD brings espionage-level security to data protection

Select either a software wipe that preserves the drive or hardware-level destruction that renders it unusable
Something to look forward to: It's the kind of gadget Q might slip into James Bond's tuxedo pocket: an SSD with a built-in self-destruct feature. TeamGroup has developed the P250Q-M80, which brings a touch of cinematic espionage to real-world data security. This industrial-grade storage device is engineered for sectors where data security is paramount, such as defense, industrial automation, and AI development.
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9