Netvora logo
Submit Startup Subscribe
Home About Contact Submit Startup Subscribe
Featured Google Quietly Tests New AI Image Model Behind Gemini Interface

Google Quietly Tests New AI Image Model Behind Gemini Interface

Users spotted Google silently removing “Imagen 3” from Gemini’s UI — sparking speculation about a hidden image model being tested behind the...

Apr 24 AI

Trending

Inside the Cloudflare Scandal: Teen Founder Funded, Banned, and Still Billed

Inside the Cloudflare Scandal: Teen Founder Funded, Banned, and Still Billed

He built a startup, Cloudflare gave him credits, then banned him — and kept billing. Now, a GDPR cas...

Apr 24 WebDev
AI Startups
Featured
Google Quietly Tests New AI Image Model Behind Gemini Interface

Google Quietly Tests New AI Image Model Behind Gemini Interface

Users spotted Google silently removing “Imagen 3” from Gemini’s UI — sparking speculation about a hi...

Apr 24 AI
SK Telecom Confirms SIM Data Breach Following Malware Attack

SK Telecom Confirms SIM Data Breach Following Malware Attack

SK Telecom experienced a malware-induced breach compromising SIM-related customer data. The company ...

Apr 23 Security
Employee Data Stolen in Cyberattack on Ahold Delhaize Payroll Provider

Employee Data Stolen in Cyberattack on Ahold Delhaize Payroll Provider

A cyberattack on a payroll provider linked to Ahold Delhaize exposed sensitive employee data from Al...

Apr 23 Security
Android malware intercepts contactless payment data via NFC

Android malware intercepts contactless payment data via NFC

A new Android malware reads payment cards via NFC after installing a fake banking app. Criminals use...

Apr 22 Security
Massive Metadata Leak Exposes Dutch Government Employees

Massive Metadata Leak Exposes Dutch Government Employees

Over 500,000 government documents leaked metadata exposing employee names. All ministries involved.

Apr 19
ChatGPT Rolls Out Free Image Generation: A Game Changer for Creators

ChatGPT Rolls Out Free Image Generation: A Game Changer for Creators

OpenAI now lets all users generate images using natural language — opening the door to massive creat...

Apr 22 AI
Cyber Attack on Co-op Supermarkets Exposes Personal Data of Millions

Cyber Attack on Co-op Supermarkets Exposes Personal Data of Millions

Britse Co-op bevestigt grootschalige diefstal van klantgegevens bij aanval

May 3 Security
Microsoft is to Shut Down Windows Maps App in July 2025

Microsoft is to Shut Down Windows Maps App in July 2025

Microsoft will permanently shut down the Windows Maps app in July 2025, urging users to back up thei...

Apr 27 WebDev
XRP Ledger NPM Package Caught Stealing Crypto: Major Supply Chain Backdoor Uncovered

XRP Ledger NPM Package Caught Stealing Crypto: Major Supply Chain Backdoor Uncovered

A hidden backdoor in the XRP Ledger NPM package was stealing private keys from developers. Users are...

Apr 23 WebDev
Security
DDoS attacks temporarily shut down payment service Adyen

DDoS attacks temporarily shut down payment service Adyen

Adyen was hit by three DDoS attacks that temporarily disrupted payments. The attacks were complex bu...

Apr 22 Security
Zoom exploit enables remote control on victims

Zoom exploit enables remote control on victims

Cybercriminals are abusing Zoom’s Remote Control to take over systems and steal cryptocurrency.

Apr 22 Security
Meta Will Use Your Facebook and Instagram Data to Train AI

Meta Will Use Your Facebook and Instagram Data to Train AI

Meta will soon train its AI using public data from Facebook and Instagram users in Europe. Find out ...

Apr 25 AI
Government Sets Framework to Reduce Dependence on Big Tech

Government Sets Framework to Reduce Dependence on Big Tech

Kabinet komt met kaders om afhankelijkheid van Big Tech te verminderen

May 2 Security
Blue Shield of California Discloses Data Breach Affecting 4.7 Million Members

Blue Shield of California Discloses Data Breach Affecting 4.7 Million Members

Blue Shield of California disclosed a data breach affecting 4.7 million members, where a misconfigur...

Apr 24 AI
Security
Roblox breaks ground on data center in Brazil for early 2026

Roblox breaks ground on data center in Brazil for early 2026

Roblox breaks ground on data center in Brazil for early 2026

May 3 Security
Hundreds of Webshops Impacted by Backdoor in Magento Extensions

Hundreds of Webshops Impacted by Backdoor in Magento Extensions

The widespread impact of the backdoor is significant, with an estimated 500 to 1,000 webshops potent...

May 3 Security
Astronomer’s $93M raise underscores a new reality: Orchestration is king in AI infrastructure

Astronomer’s $93M raise underscores a new reality: Orchestration is king in AI infrastructure

Astronomer’s $93M raise underscores a new reality: Orchestration is king in AI infrastructure

May 2 Security
France, Spain, and Greece Push for Mandatory Age Verification on Social Media

France, Spain, and Greece Push for Mandatory Age Verification on Social Media

Frankrijk en Spanje willen verplichte leeftijdsverificatie voor social media

May 16 Security
Microsoft launches Phi-4-Reasoning-Plus, a small, powerful, open weights reasoning model!

Microsoft launches Phi-4-Reasoning-Plus, a small, powerful, open weights reasoning model!

Microsoft launches Phi-4-Reasoning-Plus, a small, powerful, open weights reasoning model!

May 2 Security
AI
OpenAI just fixed ChatGPT’s most annoying business problem: meet the PDF export that changes everything

OpenAI just fixed ChatGPT’s most annoying business problem: meet the PDF export that changes everything

OpenAI just fixed ChatGPT’s most annoying business problem: meet the PDF export that changes everyth...

May 13 Security
OpenAI overrode concerns of expert testers to release sycophantic GPT-4o

OpenAI overrode concerns of expert testers to release sycophantic GPT-4o

OpenAI overrode concerns of expert testers to release sycophantic GPT-4o

May 4 Security
Ransomware Suspect Charged in US for Attacks on Microsoft Exchange Servers

Ransomware Suspect Charged in US for Attacks on Microsoft Exchange Servers

The attacks exploited a vulnerability in the Microsoft Exchange software, which was first identified...

May 2 Security
FBI Warns Vital Infrastructure: Change Default Passwords Immediately

FBI Warns Vital Infrastructure: Change Default Passwords Immediately

FBI waarschuwt vitale infrastructuur: wijzig standaardwachtwoorden meteen

May 7 Security
Title

Title

Akamai meldt actief misbruik van lekken in GeoVision IoT-apparaten

May 8 Security
Title

Title

According to CNIL, the data processing carried out by these cameras is not anonymous, even when cust...

May 7 Security
Addressing the developer skills gap: the role of AI in efficiency and skilling

Addressing the developer skills gap: the role of AI in efficiency and skilling

Addressing the developer skills gap: the role of AI in efficiency and skilling

May 2 Security
ServiceNow lets users see more of their AI

ServiceNow lets users see more of their AI

ServiceNow lets users see more of their AI

May 6 Security
Report: OpenAI is buying AI-powered developer platform Windsurf — what happens to its support for rival LLMs?

Report: OpenAI is buying AI-powered developer platform Windsurf — what happens to its support for rival LLMs?

Report: OpenAI is buying AI-powered developer platform Windsurf — what happens to its support for ri...

May 6 Security
Firefox's Survival Hinges on Search Deal with Google

Firefox's Survival Hinges on Search Deal with Google

Mozilla received $528 million from search engine providers in 2021 for setting their search engine a...

May 4 Security
Telegram Introduces End-to-End Encrypted Group Chats Without Pre-Existing Chat Rooms

Telegram Introduces End-to-End Encrypted Group Chats Without Pre-Existing Chat Rooms

With this new feature, users can add up to 200 participants to an active chat by selecting them indi...

May 2 Security
Email Provider Proton Mail Blocked in India

Email Provider Proton Mail Blocked in India

According to reports, the company filed a complaint with the court, which has now ordered the govern...

Apr 30 Security
Industry Giants Unite to Establish Standard for End-of-Life Product Information

Industry Giants Unite to Establish Standard for End-of-Life Product Information

Cisco, Dell, IBM en Microsoft willen standaard voor end-of-life informatie

May 2 Security
Meta unleashes Llama API running 18x faster than OpenAI: Cerebras partnership delivers 2,600 tokens per second

Meta unleashes Llama API running 18x faster than OpenAI: Cerebras partnership delivers 2,600 tokens per second

Meta unleashes Llama API running 18x faster than OpenAI: Cerebras partnership delivers 2,600 tokens ...

Apr 30 AI
UK Retailer Marks & Spencer Still Reeling from Ransomware Attack

UK Retailer Marks & Spencer Still Reeling from Ransomware Attack

The company initially issued a brief statement acknowledging the incident, stating that it had been ...

May 8 Security
The great cognitive migration: How AI is reshaping human purpose, work and meaning

The great cognitive migration: How AI is reshaping human purpose, work and meaning

The great cognitive migration: How AI is reshaping human purpose, work and meaning

May 6 Security
Disney Experiences Massive Data Breach Through Slack Channels

Disney Experiences Massive Data Breach Through Slack Channels

The malware allowed the perpetrator not only to access the computer but also an online account of th...

May 2 Security
Minister to Explain Added Value of Digital Euro

Minister to Explain Added Value of Digital Euro

Kamer wil opheldering minister over toegevoegde waarde digitale euro

May 7 Security
Critical Flaw in Ubiquiti UniFi Protect Cameras Allows Remote Takeover

Critical Flaw in Ubiquiti UniFi Protect Cameras Allows Remote Takeover

UniFi Protect is a range of security cameras and models developed by Ubiquiti, a company known for i...

May 7 Security
Korl launches platform orchestrating AI agents from OpenAI, Gemini and Anthropic to hyper-customize customer messaging

Korl launches platform orchestrating AI agents from OpenAI, Gemini and Anthropic to hyper-customize customer messaging

Korl launches platform orchestrating AI agents from OpenAI, Gemini and Anthropic to hyper-customize ...

May 6 Security
Co-op Supermarket Accepts Only Cash Following Cyberattack

Co-op Supermarket Accepts Only Cash Following Cyberattack

The cyberattack, which was first reported last week, is believed to have resulted in the theft of da...

May 6 Security
One in Ten Belgian Companies Unable to Defend Against Digital Threats

One in Ten Belgian Companies Unable to Defend Against Digital Threats

The report, which surveyed 2,700 Flemish companies, revealed that 46 percent of respondents had expe...

May 4 Security
TikTok Fined $530 Million for Data Transfer to China

TikTok Fined $530 Million for Data Transfer to China

TikTok krijgt boete van 530 miljoen euro voor datadoorgifte naar China

May 2 Security
Police Advertise "False DDoS Websites" via Google Search Ads

Police Advertise "False DDoS Websites" via Google Search Ads

Politie adverteerde 'valse ddos-websites' via Google-zoekadvertenties

May 7 Security
WordPress Sites Attacked via Critical Flaw in OttoKit Plugin

WordPress Sites Attacked via Critical Flaw in OttoKit Plugin

WordPress-sites aangevallen via kritiek lek in OttoKit-plug-in

May 7 Security
Mistral comes out swinging for enterprise AI customers with new Le Chat Enterprise, Medium 3 model

Mistral comes out swinging for enterprise AI customers with new Le Chat Enterprise, Medium 3 model

Mistral comes out swinging for enterprise AI customers with new Le Chat Enterprise, Medium 3 model

May 8 Security
Visa launches ‘Intelligent Commerce’ platform, letting AI agents swipe your card—safely, it says

Visa launches ‘Intelligent Commerce’ platform, letting AI agents swipe your card—safely, it says

Visa launches ‘Intelligent Commerce’ platform, letting AI agents swipe your card—safely, it says

May 6 Security
US Authorities Charge 12 Individuals with Stealing $263 Million in Cryptocurrency

US Authorities Charge 12 Individuals with Stealing $263 Million in Cryptocurrency

VS klaagt twaalftal aan voor stelen van 263 miljoen dollar aan cryptovaluta

May 16 Security
RSAC 2025: Why the AI agent era means more demand for CISOS

RSAC 2025: Why the AI agent era means more demand for CISOS

RSAC 2025: Why the AI agent era means more demand for CISOS

May 5 Security
Printer Company Procolored Delivers Infected Software for Half a Year

Printer Company Procolored Delivers Infected Software for Half a Year

Printerbedrijf Procolored leverde half jaar lang besmette software

May 16 Security
SimilarWeb’s new AI usage report reveals 5 surprising findings, including explosive growth in coding tools

SimilarWeb’s new AI usage report reveals 5 surprising findings, including explosive growth in coding tools

SimilarWeb’s new AI usage report reveals 5 surprising findings, including explosive growth in coding...

May 14 Security
Data Consent Experience: Firefox Tests New "To-Be-Approved" Experience for Data-Collecting Extensions

Data Consent Experience: Firefox Tests New "To-Be-Approved" Experience for Data-Collecting Extensions

Firefox test nieuwe 'toestemmingservaring' voor dataverzameling extensies

May 9 Security
Curl Bans Users Who Submit AI-Generated Bug Reports

Curl Bans Users Who Submit AI-Generated Bug Reports

Curl bant personen die AI-gegenereerde bugmeldingen indienen

May 6 Security
Google Releases Android Updates to Fix Exploitable FreeType Vulnerability

Google Releases Android Updates to Fix Exploitable FreeType Vulnerability

FreeType is a widely used library for font rendering, and its vulnerable versions could be exploited...

May 6 Security
Microsoft Discontinues Skype, Deletes User Data in 2026

Microsoft Discontinues Skype, Deletes User Data in 2026

Skype users are advised to take immediate action to ensure their data is preserved.

May 6 Security
AI to Boost Government Employees' Job Satisfaction and Reduce Workload

AI to Boost Government Employees' Job Satisfaction and Reduce Workload

Szabo: motie om werkplezier ambtenaren met AI te verhogen uitgevoerd

May 14 Security
AWS report: Generative AI overtakes security in global tech budgets for 2025

AWS report: Generative AI overtakes security in global tech budgets for 2025

AWS report: Generative AI overtakes security in global tech budgets for 2025

May 7 Security
CrowdStrike Lays Off 500 Employees to Reach $10 Billion Revenue Goal

CrowdStrike Lays Off 500 Employees to Reach $10 Billion Revenue Goal

CrowdStrike expects the cost-saving measures to have a positive impact on its bottom line, allowing ...

May 7 Security
Data Leads to Arrest of DDOS Suspects in Poland

Data Leads to Arrest of DDOS Suspects in Poland

The services, which were used from 2022 to this year, reportedly charged customers as little as €10 ...

May 7 Security
Ōura adds AI-driven meal and glucose tracking features with Stelo by Dexcom

Ōura adds AI-driven meal and glucose tracking features with Stelo by Dexcom

Ōura adds AI-driven meal and glucose tracking features with Stelo by Dexcom

May 6 Security
IBM thinks that over a billion new applications will be built with gen AI : Here’s how they’re going to help that happen with agentic AI

IBM thinks that over a billion new applications will be built with gen AI : Here’s how they’re going to help that happen with agentic AI

IBM thinks that over a billion new applications will be built with gen AI : Here’s how they’re going...

May 6 Security
Szabo: Unfeasible to Develop Safety Certification for AI

Szabo: Unfeasible to Develop Safety Certification for AI

Szabo: onmogelijk om veiligheidskeurmerk voor AI te ontwikkelen

May 6 Security
Bold New Feature in Brave Browser for Android: One-Tap Blocking of Annoying Website Elements

Bold New Feature in Brave Browser for Android: One-Tap Blocking of Annoying Website Elements

The issue is even more pressing on smartphones, where the limited screen real estate makes every ban...

May 6 Security
Cybersecurity Alert: US Agency Warns of Active Exploitation of Commvault Vulnerability

Cybersecurity Alert: US Agency Warns of Active Exploitation of Commvault Vulnerability

Commvault's Command Center Innovation provides a web interface for managing backups, restores, and d...

May 6 Security
Experts Call for Ban on Social Media for Minors

Experts Call for Ban on Social Media for Minors

According to the experts, there is sufficient scientific evidence to demonstrate the harmful effects...

May 6 Security
Not everything needs an LLM: A framework for evaluating when AI makes sense

Not everything needs an LLM: A framework for evaluating when AI makes sense

Not everything needs an LLM: A framework for evaluating when AI makes sense

May 5 Security
EU's Online Age Verification Plan Undermines Fundamental Rights, Claims EFF

EU's Online Age Verification Plan Undermines Fundamental Rights, Claims EFF

EFF: Brussel ondermijnt fundamentele rechten met online leeftijdsverificatie

May 3 Security
CISA Reverses Decision on Cybersecurity Updates Distribution

CISA Reverses Decision on Cybersecurity Updates Distribution

CISA's decision to backtrack on its plan may be attributed to the potential consequences of restrict...

May 14 Security
Adobe Urges Quick Installation of ColdFusion Security Updates

Adobe Urges Quick Installation of ColdFusion Security Updates

ColdFusion, a platform for developing web applications, has historically been targeted by attackers.

May 14 Security
From silicon to sentience: The legacy guiding AI’s next frontier and human cognitive migration

From silicon to sentience: The legacy guiding AI’s next frontier and human cognitive migration

From silicon to sentience: The legacy guiding AI’s next frontier and human cognitive migration

May 12 Security
ACM: Switching Cloud Providers Should Be Easier

ACM: Switching Cloud Providers Should Be Easier

Companies and organizations are largely dependent on a few large cloud providers.

May 12 Security
Florida Bill to Compromise End-to-End Encryption Withdrawn

Florida Bill to Compromise End-to-End Encryption Withdrawn

Wetsvoorstel Florida voor backdoor end-to-end encryptie ingetrokken

May 9 Security
Utrecht Takes Steps to Reduce Dependence on US Tech

Utrecht Takes Steps to Reduce Dependence on US Tech

Utrecht moet van gemeenteraad afhankelijkheid Amerikaans tech afbouwen

May 9 Security
The walled garden cracks: Nadella bets Microsoft’s Copilots—and Azure’s next act—on A2A/MCP interoperability

The walled garden cracks: Nadella bets Microsoft’s Copilots—and Azure’s next act—on A2A/MCP interoperability

The walled garden cracks: Nadella bets Microsoft’s Copilots—and Azure’s next act—on A2A/MCP interope...

May 9 Security
Firefox Struggles to Import Chrome Passwords Due to New Security Measure

Firefox Struggles to Import Chrome Passwords Due to New Security Measure

Firefox kan Chrome-wachtwoorden door securitymaatregel lastiger importeren

May 8 Security
Business leaders are losing trust in their data — agentic analytics promises a fix

Business leaders are losing trust in their data — agentic analytics promises a fix

Business leaders are losing trust in their data — agentic analytics promises a fix

May 8 Security
Microsoft Unveils AI Agent to Personalize Windows 11 Settings

Microsoft Unveils AI Agent to Personalize Windows 11 Settings

The AI agent uses on-device AI to understand users' goals and, with their permission, automates and ...

May 6 Security
US Reports Active Exploitation of Critical Security Flaw in AI Software Langflow

US Reports Active Exploitation of Critical Security Flaw in AI Software Langflow

VS meldt actief misbruik van beveiligingslek in AI-software Langflow

May 6 Security
UK Government Issues Security Tips After Retail Chains Hit by Cyber Attacks

UK Government Issues Security Tips After Retail Chains Hit by Cyber Attacks

Security expert Kevin Beaumont, who works with one of the affected organizations, believes that the ...

May 6 Security
Belgian School Scolded for Non-Anonymous Survey on Substance Use

Belgian School Scolded for Non-Anonymous Survey on Substance Use

Belgische school berispt voor niet anonieme enquête over alcohol en drugs

May 2 Security
Software engineering-native AI models have arrived: What Windsurf’s SWE-1 means for technical decision-makers

Software engineering-native AI models have arrived: What Windsurf’s SWE-1 means for technical decision-makers

Software engineering-native AI models have arrived: What Windsurf’s SWE-1 means for technical decisi...

May 16 Security
Fine-tuning vs. in-context learning: New research guides better LLM customization for real-world tasks

Fine-tuning vs. in-context learning: New research guides better LLM customization for real-world tasks

Fine-tuning vs. in-context learning: New research guides better LLM customization for real-world tas...

May 12 Security
WhatsApp Scammers Ordered to Pay Victims €53,000 in Damages

WhatsApp Scammers Ordered to Pay Victims €53,000 in Damages

WhatsAppfraudeurs moeten slachtoffers 53.000 euro schadevergoeding betalen

May 9 Security
SAP Vulnerability Used in Attacks Since January, Hundreds of Installations Affected

SAP Vulnerability Used in Attacks Since January, Hundreds of Installations Affected

SAP NetWeaver is a platform used to run SAP applications, which are widely used in many business env...

May 9 Security
5 strategies that separate AI leaders from the 92% still stuck in pilot mode

5 strategies that separate AI leaders from the 92% still stuck in pilot mode

5 strategies that separate AI leaders from the 92% still stuck in pilot mode

May 9 Security
SonicWall Flaw Exposes Devices to Factory Reset Attacks

SonicWall Flaw Exposes Devices to Factory Reset Attacks

SonicWall-lek dat voor fabrieksreset zorgt mogelijk misbruikt bij aanvallen

May 8 Security
WhatsApp Fraud Suspect Had Lists of 33 Million Phone Numbers

WhatsApp Fraud Suspect Had Lists of 33 Million Phone Numbers

During a police search of the suspect's phone and laptop, authorities found scripts for bank helpdes...

May 7 Security
Malware Attackers Exploited Unpatched Windows Vulnerability

Malware Attackers Exploited Unpatched Windows Vulnerability

The CLFS vulnerability has been discovered to be exploited in the past, with multiple instances of i...

May 7 Security
NSO Group Ordered to Pay WhatsApp $167 Million in Spyware Attack Case

NSO Group Ordered to Pay WhatsApp $167 Million in Spyware Attack Case

NSO moet WhatsApp wegens aanval op gebruikers 167 miljoen dollar betalen

May 7 Security
DDoS Attacks on Belgian Government Websites: Insights from State Secretary

DDoS Attacks on Belgian Government Websites: Insights from State Secretary

Staatssecretaris: lastig te achterhalen wie erachter ddos-aanvallen zitten

May 6 Security
Nvidia provides Omniverse Blueprint for AI factory digital twins

Nvidia provides Omniverse Blueprint for AI factory digital twins

Nvidia provides Omniverse Blueprint for AI factory digital twins

May 19 Security
Proton Threatens to Leave Switzerland Over Surveillance Bill

Proton Threatens to Leave Switzerland Over Surveillance Bill

Proton dreigt opnieuw wegens surveillancewet met vertrek uit Zwitserland

May 18 Security
NHS Calls on Suppliers to Take Action Against Ransomware Attacks

NHS Calls on Suppliers to Take Action Against Ransomware Attacks

Ransomware, a type of malware that denies access to devices and stored data by encrypting files, has...

May 16 Security
VPN Provider Cancels Lifetime Subscriptions, Angers Customers

VPN Provider Cancels Lifetime Subscriptions, Angers Customers

The lifetime accounts were only discovered months later, when a significant portion of the resources...

May 14 Security
Meta Faces Legal Action Over AI Training with EU Users' Data

Meta Faces Legal Action Over AI Training with EU Users' Data

Meta is relying on a "legitimate interest" basis for processing the data, claiming that it has a jus...

May 14 Security
The interoperability breakthrough: How MCP is becoming enterprise AI’s universal language

The interoperability breakthrough: How MCP is becoming enterprise AI’s universal language

The interoperability breakthrough: How MCP is becoming enterprise AI’s universal language

May 13 Security
Glass Imaging raises $20M to use AI to improve digital image quality

Glass Imaging raises $20M to use AI to improve digital image quality

Glass Imaging raises $20M to use AI to improve digital image quality

May 13 Security
Cybersecurity Awareness: A Permanent Priority for Healthcare Professionals

Cybersecurity Awareness: A Permanent Priority for Healthcare Professionals

Minister: permanent werken aan cyberbewustzijn van zorgpersoneel

May 12 Security
MCP and the innovation paradox: Why open standards will save AI from itself

MCP and the innovation paradox: Why open standards will save AI from itself

MCP and the innovation paradox: Why open standards will save AI from itself

May 12 Security
OpenAI’s $3B Windsurf move: the real reason behind its enterprise AI code push

OpenAI’s $3B Windsurf move: the real reason behind its enterprise AI code push

OpenAI’s $3B Windsurf move: the real reason behind its enterprise AI code push

May 10 Security
Zencoder launches Zen Agents, ushering in a new era of team-based AI for software development

Zencoder launches Zen Agents, ushering in a new era of team-based AI for software development

Zencoder launches Zen Agents, ushering in a new era of team-based AI for software development

May 10 Security
Ransomware Suspect Detained by Moldovan Authorities

Ransomware Suspect Detained by Moldovan Authorities

During the arrest, a search was conducted at the suspect's residence, and data storage devices and a...

May 9 Security
Ransomware Attackers Use Legitimate Software to Monitor Employees

Ransomware Attackers Use Legitimate Software to Monitor Employees

Kickidler-software voor monitoren personeel gebruikt bij ransomware-aanvallen

May 9 Security
Amnesty International Calls for Global Ban on Spyware Like Pegasus

Amnesty International Calls for Global Ban on Spyware Like Pegasus

Amnesty International wil volledig verbod van spyware zoals Pegasus

May 9 Security
Forensic Experts Warned of Default BitLocker Encryption in Windows 11

Forensic Experts Warned of Default BitLocker Encryption in Windows 11

According to Oleg Afonin, a forensic expert at Elcomsoft, the Windows 11 24H2 update marks a signifi...

May 9 Security
Google Warns of Targeted Attacks Using "Cloudflare-Captcha"

Google Warns of Targeted Attacks Using "Cloudflare-Captcha"

The attack begins with the attacker luring the victim to a specific website, which is designed to lo...

May 8 Security
Medical Device Manufacturer Masimo Struggles to Process Orders After Cyberattack

Medical Device Manufacturer Masimo Struggles to Process Orders After Cyberattack

The company has not provided further details about the incident, including the nature of the attack ...

May 7 Security
German Consumer Organization Demands Meta Halt AI-Training Plans

German Consumer Organization Demands Meta Halt AI-Training Plans

According to the organization, Meta's procedure does not meet the legal requirements.

May 7 Security
Hungary's Real-Time Facial Recognition Law Under Fire

Hungary's Real-Time Facial Recognition Law Under Fire

'Hongarije schendt met real-time gezichtsherkenning Europese wetgeving'

May 7 Security
Nvidia charges ahead with humanoid robotics aided by the cloud

Nvidia charges ahead with humanoid robotics aided by the cloud

Nvidia charges ahead with humanoid robotics aided by the cloud

May 19 Security
Government Seeks to Allow DNA Collection from Suspects Before Conviction

Government Seeks to Allow DNA Collection from Suspects Before Conviction

Kabinet wil dna van nog niet veroordeelde verdachten laten afnemen

May 17 Security
New WhatsApp Channel Launched by North Holland Police to Reach Residents

New WhatsApp Channel Launched by North Holland Police to Reach Residents

Politie Eenheid Noord-Holland start WhatsApp-kanaal voor inwoners

May 16 Security
Coinbase Estimates Data Breach Costs at $180-$400 Million

Coinbase Estimates Data Breach Costs at $180-$400 Million

The stolen customer data, including copies of passports, driver's licenses, and identity cards, was ...

May 16 Security
Meet AlphaEvolve, the Google AI that writes its own code—and just saved millions in computing costs

Meet AlphaEvolve, the Google AI that writes its own code—and just saved millions in computing costs

Meet AlphaEvolve, the Google AI that writes its own code—and just saved millions in computing costs

May 15 Security
Patronus AI debuts Percival to help enterprises monitor failing AI agents at scale

Patronus AI debuts Percival to help enterprises monitor failing AI agents at scale

Patronus AI debuts Percival to help enterprises monitor failing AI agents at scale

May 15 Security
Old ICT Systems at Dutch Prosecutor's Office to Take Years to Replace

Old ICT Systems at Dutch Prosecutor's Office to Take Years to Replace

Minister: vervangen van oude ict-systemen OM gaat nog jaren duren

May 14 Security
What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2

What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2

What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 2

May 14 Security
Google Enhances Android Security with Advanced Protection

Google Enhances Android Security with Advanced Protection

One of the key components of Advanced Protection is the ability to store log files in the cloud as s...

May 14 Security
Netherlands' Phishing Sites Stay Online for 23 Hours on Average

Netherlands' Phishing Sites Stay Online for 23 Hours on Average

SIDN's efforts to combat malicious registrations or domains have resulted in a high success rate.

May 14 Security
Cyberattack Hits Nucor, North America's Largest Steel Producer

Cyberattack Hits Nucor, North America's Largest Steel Producer

Nucor's decision to shut down production at some of its facilities is likely to have a significant i...

May 14 Security
EU Unveils Own Vulnerability Database, Enhancing Cybersecurity Information Sharing

EU Unveils Own Vulnerability Database, Enhancing Cybersecurity Information Sharing

The EUVD database offers three dashboards for users to access information: one for critical vulnerab...

May 14 Security
Microsoft Warns of Five Actively Exploited Windows Vulnerabilities

Microsoft Warns of Five Actively Exploited Windows Vulnerabilities

The first two vulnerabilities (CVE-2025-32701 and CVE-2025-32706) are located in the Windows Common ...

May 14 Security
Travelers to the US Advised to Disable Biometric Locking

Travelers to the US Advised to Disable Biometric Locking

Mozilla is urging people to disable biometric locking features on their devices, such as fingerprint...

May 12 Security
US Authorities Take Down Anyproxy, a Proxies Service Used by Cybercriminals

US Authorities Take Down Anyproxy, a Proxies Service Used by Cybercriminals

Anyproxy provided paid proxies to its users, which were compromised old WiFi routers.

May 12 Security
New Zealand to Investigate Social Media Ban for Under-16s

New Zealand to Investigate Social Media Ban for Under-16s

Nieuw-Zeeland gaat socialmediaverbod voor onder de 16 jaar onderzoeken

May 12 Security
US and Dutch Authorities Disrupt Massive Proxy-Botnet, Arrest Four Suspects

US and Dutch Authorities Disrupt Massive Proxy-Botnet, Arrest Four Suspects

The proxy-botnet, which used services called Anyproxy and 5socks, allowed cybercriminals to exploit ...

May 11 Security
Microsoft Teams Gains Feature to Block Unauthorized Screen Recordings

Microsoft Teams Gains Feature to Block Unauthorized Screen Recordings

The Prevent Screen Capture feature is a step towards enhancing the security and privacy of Microsoft...

May 11 Security
Military Fitness App Alternative to Strava

Military Fitness App Alternative to Strava

Defensie biedt militairen eigen fitness-app als alternatief voor Strava

May 11 Security
You can now fine-tune your enterprise’s own version of OpenAI’s o4-mini reasoning model with reinforcement learning

You can now fine-tune your enterprise’s own version of OpenAI’s o4-mini reasoning model with reinforcement learning

You can now fine-tune your enterprise’s own version of OpenAI’s o4-mini reasoning model with reinfor...

May 9 Security
Seven Hundred ScreenConnect Servers Miss Crucial Security Update

Seven Hundred ScreenConnect Servers Miss Crucial Security Update

Zevenhonderd ScreenConnect-servers missen belangrijke update

May 9 Security
How The Ottawa Hospital uses AI ambient voice capture to reduce physician burnout by 70%, achieve 97% patient satisfaction

How The Ottawa Hospital uses AI ambient voice capture to reduce physician burnout by 70%, achieve 97% patient satisfaction

How The Ottawa Hospital uses AI ambient voice capture to reduce physician burnout by 70%, achieve 97...

May 9 Security
Alibaba’s ‘ZeroSearch’ lets AI learn to google itself — slashing training costs by 88 percent

Alibaba’s ‘ZeroSearch’ lets AI learn to google itself — slashing training costs by 88 percent

Alibaba’s ‘ZeroSearch’ lets AI learn to google itself — slashing training costs by 88 percent

May 9 Security
Imagination unveils E-Series GPUs for graphics and AI at the edge

Imagination unveils E-Series GPUs for graphics and AI at the edge

Imagination unveils E-Series GPUs for graphics and AI at the edge

May 8 Security
Data Breach Fines: Bitdefender Hit with €10,000 Fine for Customer Data Leak

Data Breach Fines: Bitdefender Hit with €10,000 Fine for Customer Data Leak

A programming or implementation flaw in the use of a system led to a large amount of personal data f...

May 8 Security
Data Leak Hits TeleMessage, a Customized Version of Signal

Data Leak Hits TeleMessage, a Customized Version of Signal

TeleMessage offers customized versions of Signal, WhatsApp, Telegram, and WeChat for archival purpos...

May 6 Security
Meta, Cisco put open-source LLMs at the core of next-gen SOC workflows

Meta, Cisco put open-source LLMs at the core of next-gen SOC workflows

Meta, Cisco put open-source LLMs at the core of next-gen SOC workflows

May 6 Security
EU's "ProtectEU" Plan Sparks Fears of Undermining Encryption

EU's "ProtectEU" Plan Sparks Fears of Undermining Encryption

The plan, which is part of the EU's new internal security strategy, includes a "Roadmap for lawful a...

May 6 Security
Acer unveils AI-powered wearables at Computex 2025

Acer unveils AI-powered wearables at Computex 2025

Acer unveils AI-powered wearables at Computex 2025

May 16 Security
Firefox Code Migrates to Microsoft's GitHub

Firefox Code Migrates to Microsoft's GitHub

Mozilla verhuist broncode Firefox naar Microsofts GitHub

May 16 Security
AI power rankings upended: OpenAI, Google rise as Anthropic falls, Poe report finds

AI power rankings upended: OpenAI, Google rise as Anthropic falls, Poe report finds

AI power rankings upended: OpenAI, Google rise as Anthropic falls, Poe report finds

May 14 Security
New Intel Processor Vulnerability Discovered

New Intel Processor Vulnerability Discovered

The exploit, developed by Kaveh Razavi and his team, takes advantage of the speculative execution of...

May 14 Security
LinkedIn Users Lose Cookie Lawsuit After Giving Consent

LinkedIn Users Lose Cookie Lawsuit After Giving Consent

LinkedIn-gebruikers verliezen cookiezaak wegens geven van toestemming

May 13 Security
SAP Warns of Critical Security Flaw in NetWeaver Redactie

SAP Warns of Critical Security Flaw in NetWeaver Redactie

SAP waarschuwt voor nieuw kritiek beveiligingslek in NetWeaver

May 13 Security
Aarki launches Encore as privacy-first mobile growth platform

Aarki launches Encore as privacy-first mobile growth platform

Aarki launches Encore as privacy-first mobile growth platform

May 12 Security
Neighbors' Surveillance Cameras Spark Complaints in Sweden

Neighbors' Surveillance Cameras Spark Complaints in Sweden

While the number of complaints has grown steadily over the past three years, with 432 reported in 20...

May 12 Security
More Retailers Refuse Cash Payments

More Retailers Refuse Cash Payments

In 2024, 38% of movie theaters refused cash payments, up from 27% in 2023.

May 12 Security
Google Settles Incognito Mode and Biometric Data Lawsuits for $1.4 Billion

Google Settles Incognito Mode and Biometric Data Lawsuits for $1.4 Billion

Google schikt zaken over Incognito Mode en biometrie voor 1,4 miljard dollar

May 11 Security
OpenAI, Microsoft tell Senate ‘no one country can win AI’

OpenAI, Microsoft tell Senate ‘no one country can win AI’

OpenAI, Microsoft tell Senate ‘no one country can win AI’

May 9 Security
EU Looks to Ease Data Protection Requirements for Smaller Businesses

EU Looks to Ease Data Protection Requirements for Smaller Businesses

Under the General Data Protection Regulation (GDPR), companies are required to maintain a register o...

May 9 Security
Google Chrome to Inspect Visited Websites for Helpdesk Fraud

Google Chrome to Inspect Visited Websites for Helpdesk Fraud

According to Google, the average malicious website is only up for a short period of time, often less...

May 9 Security
Gmail to Discontinue Support for 3DES in Incoming SMTP Connections

Gmail to Discontinue Support for 3DES in Incoming SMTP Connections

3DES, also known as Triple DES, is an encryption algorithm that was widely used in the past to encry...

May 8 Security
Data Breach: PowerSchool Paid Off Hackers, Now Schools Face Individualized Extortion

Data Breach: PowerSchool Paid Off Hackers, Now Schools Face Individualized Extortion

PowerSchool betaalde criminelen losgeld, scholen nu individueel afgeperst

May 8 Security
FBI Warns of Malware Attacks on End-of-Life Cisco and Linksys Routers

FBI Warns of Malware Attacks on End-of-Life Cisco and Linksys Routers

The FBI warns that two criminal services, 5Socks and Anyproxy, are specifically targeting routers th...

May 7 Security
Data Transfers to UK: EU Regulators Extend Approval

Data Transfers to UK: EU Regulators Extend Approval

According to the European Data Protection Authority, the rules for data transfers to third countries...

May 6 Security
Enchant launches zero-equity accelerator for gaming and AI startups

Enchant launches zero-equity accelerator for gaming and AI startups

Enchant launches zero-equity accelerator for gaming and AI startups

May 22 Security
At Google I/O, Sergey Brin makes surprise appearance — and declares Google will build the first AGI

At Google I/O, Sergey Brin makes surprise appearance — and declares Google will build the first AGI

At Google I/O, Sergey Brin makes surprise appearance — and declares Google will build the first AGI

May 22 Security
HR Departments Targeted in Sophisticated Phishing Attacks

HR Departments Targeted in Sophisticated Phishing Attacks

The downloaded zip file contains a .lnk file and a .jpg file.

May 16 Security
Pwn2Own Hack Challenge Uncovers Critical Flaws in VMware and Microsoft

Pwn2Own Hack Challenge Uncovers Critical Flaws in VMware and Microsoft

VMware ESXi en Microsoft SharePoint onderuit tijdens hackwedstrijd Pwn2Own

May 16 Security
Beyond sycophancy: DarkBench exposes six hidden ‘dark patterns’ lurking in today’s top LLMs

Beyond sycophancy: DarkBench exposes six hidden ‘dark patterns’ lurking in today’s top LLMs

Beyond sycophancy: DarkBench exposes six hidden ‘dark patterns’ lurking in today’s top LLMs

May 15 Security
Elon Musk’s Grok AI is spamming X users about South African race relations now, for some reason

Elon Musk’s Grok AI is spamming X users about South African race relations now, for some reason

Elon Musk’s Grok AI is spamming X users about South African race relations now, for some reason

May 15 Security
The VentureBeat AI survey is back: Are you ready for the agentic AI future?

The VentureBeat AI survey is back: Are you ready for the agentic AI future?

The VentureBeat AI survey is back: Are you ready for the agentic AI future?

May 14 Security
Notion bets big on integrated LLMs, adds GPT-4.1 and Claude 3.7 to platform

Notion bets big on integrated LLMs, adds GPT-4.1 and Claude 3.7 to platform

Notion bets big on integrated LLMs, adds GPT-4.1 and Claude 3.7 to platform

May 14 Security
Sakana introduces new AI architecture, ‘Continuous Thought Machines’ to make models reason with less guidance — like human brains

Sakana introduces new AI architecture, ‘Continuous Thought Machines’ to make models reason with less guidance — like human brains

Sakana introduces new AI architecture, ‘Continuous Thought Machines’ to make models reason with less...

May 13 Security
Malicious Captcha Attack Discovered on Linux System

Malicious Captcha Attack Discovered on Linux System

Linux-variant van aanval met malafide captcha ontdekt

May 13 Security
Data Breach: Marks & Spencer Confirms Customer Information Stolen in Sophisticated Cyberattack

Data Breach: Marks & Spencer Confirms Customer Information Stolen in Sophisticated Cyberattack

Account passwords were not compromised in the attack.

May 13 Security
US: TeleMessage Stores Plain Text Messages from Custom Signal Variant

US: TeleMessage Stores Plain Text Messages from Custom Signal Variant

VS: TeleMessage bewaart plaintext berichten aangepaste Signal-variant

May 13 Security
Cyber Attack Leaves Co-op Shelves Bare

Cyber Attack Leaves Co-op Shelves Bare

Stores on the Scottish island of Islay, where Co-op is the only major supermarket, are unable to sto...

May 12 Security
SIDN abandons plan to build new domain registration system!

SIDN abandons plan to build new domain registration system!

SIDN abandons plan to build new domain registration system!

May 12 Security
Student Engagement Platform iClicker Compromised by Malware-Carrying Captcha

Student Engagement Platform iClicker Compromised by Malware-Carrying Captcha

According to the University of Michigan, the attackers managed to compromise the website and insert ...

May 12 Security
Online Systems of Fuel Storage Tanks Under Attack

Online Systems of Fuel Storage Tanks Under Attack

ATG systems have been accessible from the internet without passwords for over a decade, according to...

May 11 Security
Mem0’s scalable memory promises more reliable AI agents that remembers context across lengthy conversations

Mem0’s scalable memory promises more reliable AI agents that remembers context across lengthy conversations

Mem0’s scalable memory promises more reliable AI agents that remembers context across lengthy conver...

May 9 Security
Senator Calls for Investigation into "Poor Signal Clone" Used by US Officials

Senator Calls for Investigation into "Poor Signal Clone" Used by US Officials

Senator VS wil onderzoek naar 'slechte Signal-kopie' TeleMessage

May 8 Security
Tens of Thousands of Help Desk Software Installations Vulnerable to Attacks

Tens of Thousands of Help Desk Software Installations Vulnerable to Attacks

The software, which offers various help desk functionalities for organizations, has been plagued by ...

May 8 Security
Netflix unveils new TV experience with GenAI search and AI-based recommendations

Netflix unveils new TV experience with GenAI search and AI-based recommendations

Netflix unveils new TV experience with GenAI search and AI-based recommendations

May 8 Security
Nvidia launches fully open source transcription AI model Parakeet-TDT-0.6B-V2 on Hugging Face

Nvidia launches fully open source transcription AI model Parakeet-TDT-0.6B-V2 on Hugging Face

Nvidia launches fully open source transcription AI model Parakeet-TDT-0.6B-V2 on Hugging Face

May 6 Security
FLUX.1 Kontext enables in-context image generation for enterprise AI pipelines

FLUX.1 Kontext enables in-context image generation for enterprise AI pipelines

FLUX.1 Kontext enables in-context image generation for enterprise AI pipelines

May 31 Security
Ransomware Attack Triggers After Malicious KeePass Advertisements

Ransomware Attack Triggers After Malicious KeePass Advertisements

The compromised KeePass software, which was available for download, contained a legitimate version o...

May 20 Security
Security Concerns Raised Over Leaked Personal Data by Government Officials

Security Concerns Raised Over Leaked Personal Data by Government Officials

The investigation, led by the Public Prosecution Service (OM), suggests that the official may have b...

May 19 Security
Samsung boosts OLED TV gaming with Nvidia G-Sync compatibility

Samsung boosts OLED TV gaming with Nvidia G-Sync compatibility

Samsung boosts OLED TV gaming with Nvidia G-Sync compatibility

May 19 Security
Victims of Digital Fraud Can Now Report Incidents from Home

Victims of Digital Fraud Can Now Report Incidents from Home

Politie laat slachtoffers van digitale fraude voortaan thuis aangifte doen

May 19 Security
Active Exploitation of Chrome Vulnerability Allows Account Hijacking

Active Exploitation of Chrome Vulnerability Allows Account Hijacking

The vulnerability allows an attacker to steal sensitive data from a user's browser by exploiting the...

May 16 Security
US Senators Call for Immediate Ban on TP-Link Router Sales

US Senators Call for Immediate Ban on TP-Link Router Sales

The senators and congressional members allege that TP-Link's low prices are driving out American alt...

May 16 Security
From OAuth bottleneck to AI acceleration: How CIAM solutions are removing the top integration barrier in enterprise AI agent deployment

From OAuth bottleneck to AI acceleration: How CIAM solutions are removing the top integration barrier in enterprise AI agent deployment

From OAuth bottleneck to AI acceleration: How CIAM solutions are removing the top integration barrie...

May 16 Security
Netherlands Launches Register for Data Protection Officers

Netherlands Launches Register for Data Protection Officers

According to the Dutch Data Protection Authority, there are currently around 10,000 FGs in the Nethe...

May 15 Security
Meta's AI Training Plan Raises Fresh Concerns in Dutch Parliament

Meta's AI Training Plan Raises Fresh Concerns in Dutch Parliament

Opnieuw Kamervragen over Meta's plan om AI te trainen met gebruikersdata

May 14 Security
AP to Investigate Local Governments' Handling of Residents' Personal Data

AP to Investigate Local Governments' Handling of Residents' Personal Data

As part of the investigation, the AP will also assess whether local governments conduct risk analyse...

May 13 Security
CISA Shifts Cybersecurity Alerts to Email and Social Media

CISA Shifts Cybersecurity Alerts to Email and Social Media

The CISA cited the need to prioritize urgent information and make it more accessible to the public.

May 13 Security
Data Collection: Google Chrome Tops the List, Tor Browser Comes Out on Top

Data Collection: Google Chrome Tops the List, Tor Browser Comes Out on Top

What's more concerning is that Chrome is the only browser that collects financial information, such ...

May 9 Security
OpenAI names Instacart leader Fidji Simo as new CEO of Applications

OpenAI names Instacart leader Fidji Simo as new CEO of Applications

OpenAI names Instacart leader Fidji Simo as new CEO of Applications

May 8 Security
Anthropic launches Claude web search API, betting on the future of post-Google information access

Anthropic launches Claude web search API, betting on the future of post-Google information access

Anthropic launches Claude web search API, betting on the future of post-Google information access

May 8 Security
Spanish Retailer Fined $12,000 for Violating GDPR

Spanish Retailer Fined $12,000 for Violating GDPR

Spaanse winkel wil geld terug van klant, krijgt AVG-boete van 12.000 euro

May 8 Security
Samsung MagicINFO 9 Servers Targeted by Botnet, Update Not Available

Samsung MagicINFO 9 Servers Targeted by Botnet, Update Not Available

Servers running MagicINFO 9 have been targeted by a Mirai-based botnet, which has been using the vul...

May 8 Security
American Politicians Warn UK of Risks from iCloud Backdoor

American Politicians Warn UK of Risks from iCloud Backdoor

'Amerikaanse politici waarschuwen VK voor risico's van iCloud-backdoor'

May 8 Security
New Zealand Prime Minister Seeks Ban on Social Media for Under-16s

New Zealand Prime Minister Seeks Ban on Social Media for Under-16s

Currently, there are no legally established age verification measures for social media platforms in ...

May 7 Security
Lightricks just made AI video generation 30x faster — and you won’t need a $10,000 GPU

Lightricks just made AI video generation 30x faster — and you won’t need a $10,000 GPU

Lightricks just made AI video generation 30x faster — and you won’t need a $10,000 GPU

May 7 Security
Co-op Supermarkets to Replace Paper Price Tags with Digital Ones

Co-op Supermarkets to Replace Paper Price Tags with Digital Ones

According to VusionGroup, the company behind the technology, digital price tags can display a wide r...

May 23 Security
Meta Faces Pressure to Stop Training AI Model with EU User Data

Meta Faces Pressure to Stop Training AI Model with EU User Data

Meta opgeroepen om AI-model niet met data Europese gebruikers te trainen

May 23 Security
Anthropic overtakes OpenAI: Claude Opus 4 codes seven hours nonstop, sets record SWE-Bench score and reshapes enterprise AI

Anthropic overtakes OpenAI: Claude Opus 4 codes seven hours nonstop, sets record SWE-Bench score and reshapes enterprise AI

Anthropic overtakes OpenAI: Claude Opus 4 codes seven hours nonstop, sets record SWE-Bench score and...

May 23 Security
Dantumadiel Pays 5725 Euro for Own .nl Domain Name

Dantumadiel Pays 5725 Euro for Own .nl Domain Name

Earlier this week, it became known that Omrop Fryslân had rented the domain name Dantumadiel.nl and ...

May 22 Security
AI Chatbot Replika Hit with €5 Million Fine for GDPR Violations

AI Chatbot Replika Hit with €5 Million Fine for GDPR Violations

Ontwikkelaar AI-chatbot Replika krijgt AVG-boete van 5 miljoen euro

May 22 Security
Swiss Proposal Mandates Logging and Storage of User Data for Mail and VPN Providers

Swiss Proposal Mandates Logging and Storage of User Data for Mail and VPN Providers

The proposal, introduced by the Swiss Ministry of Justice and Police and the Swiss Federal Council, ...

May 22 Security
Group of Over 100 Organizations Express Concerns Over Plans to Amend EU's GDPR

Group of Over 100 Organizations Express Concerns Over Plans to Amend EU's GDPR

The organizations are concerned that the European Commission's plans to relax the obligation for com...

May 19 Security
France Embraces Open Source Principles as First Nation

France Embraces Open Source Principles as First Nation

The guidelines emphasize the importance of "open by default", which means choosing open source as th...

May 19 Security
From dot-com to dot-AI: How we can learn from the last tech transformation (and avoid making the same mistakes)

From dot-com to dot-AI: How we can learn from the last tech transformation (and avoid making the same mistakes)

From dot-com to dot-AI: How we can learn from the last tech transformation (and avoid making the sam...

May 19 Security
Google’s AlphaEvolve: The AI agent that reclaimed 0.7% of Google’s compute – and how to copy it

Google’s AlphaEvolve: The AI agent that reclaimed 0.7% of Google’s compute – and how to copy it

Google’s AlphaEvolve: The AI agent that reclaimed 0.7% of Google’s compute – and how to copy it

May 18 Security
Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense

Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense

Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense

May 17 Security
OpenAI launches research preview of Codex AI software engineering agent for developers — with parallel tasking

OpenAI launches research preview of Codex AI software engineering agent for developers — with parallel tasking

OpenAI launches research preview of Codex AI software engineering agent for developers — with parall...

May 17 Security
Elon Musk’s xAI tries to explain Grok’s South African race relations freakout the other day

Elon Musk’s xAI tries to explain Grok’s South African race relations freakout the other day

Elon Musk’s xAI tries to explain Grok’s South African race relations freakout the other day

May 16 Security
The $1 Billion database bet: What Databricks’ Neon acquisition means for your AI strategy

The $1 Billion database bet: What Databricks’ Neon acquisition means for your AI strategy

The $1 Billion database bet: What Databricks’ Neon acquisition means for your AI strategy

May 16 Security
You.com’s ARI Enterprise crushes OpenAI in head-to-head tests, aims at deep research market

You.com’s ARI Enterprise crushes OpenAI in head-to-head tests, aims at deep research market

You.com’s ARI Enterprise crushes OpenAI in head-to-head tests, aims at deep research market

May 15 Security
OpenAI brings GPT-4.1 and 4.1 mini to ChatGPT — what enterprises should know

OpenAI brings GPT-4.1 and 4.1 mini to ChatGPT — what enterprises should know

OpenAI brings GPT-4.1 and 4.1 mini to ChatGPT — what enterprises should know

May 15 Security
Proofpoint Acquires Hornetsecurity for $1 Billion

Proofpoint Acquires Hornetsecurity for $1 Billion

Hornetsecurity specializes in providing security solutions to businesses that use Microsoft 365, inc...

May 15 Security
Data Leak Exposes 70,000 Customers of Belgian Telecom Providers

Data Leak Exposes 70,000 Customers of Belgian Telecom Providers

The company was in the process of integrating its system with the Central Number Database, and in th...

May 15 Security
High-Risk Government Officials Receive Fully Managed Mobile Devices

High-Risk Government Officials Receive Fully Managed Mobile Devices

Hoog-risico ambtenaren ontvangen volledig beheerde mobiele apparaten

May 13 Security
Microsoft Discloses Active Exploitation of Critical Path Traversal Vulnerability in Output Messenger

Microsoft Discloses Active Exploitation of Critical Path Traversal Vulnerability in Output Messenger

Output Messenger is a communication platform that enables users to chat, make calls, manage calendar...

May 13 Security
What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 1

What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 1

What your tools miss at 2:13 AM: How gen AI attack chains exploit telemetry lag – Part 1

May 11 Security
Russian Couple Accused of Ransomware Attacks Faces Decades in Prison

Russian Couple Accused of Ransomware Attacks Faces Decades in Prison

Belgisch OM eist drie jaar extra cel voor niet geven wachtwoord

May 24 Security
After GPT-4o backlash, researchers benchmark models on moral endorsement—find sycophancy persists across the board

After GPT-4o backlash, researchers benchmark models on moral endorsement—find sycophancy persists across the board

After GPT-4o backlash, researchers benchmark models on moral endorsement—find sycophancy persists ac...

May 23 Security
Samsung Secures Critical Vulnerability in Digital Signage System

Samsung Secures Critical Vulnerability in Digital Signage System

Samsung dicht actief aangevallen lek in systeem voor digitale reclameborden

May 23 Security
OpenAI updates its new Responses API rapidly with MCP support, GPT-4o native image gen, and more enterprise features

OpenAI updates its new Responses API rapidly with MCP support, GPT-4o native image gen, and more enterprise features

OpenAI updates its new Responses API rapidly with MCP support, GPT-4o native image gen, and more ent...

May 22 Security
Concerns Raised Over Microsoft's Handling of ICC Chief Prosecutor's Email

Concerns Raised Over Microsoft's Handling of ICC Chief Prosecutor's Email

Kamer wil opheldering over afsluiten e-mail hoofdaanklager ICC door Microsoft

May 22 Security
The case for a new operating system purpose-built for AI

The case for a new operating system purpose-built for AI

The case for a new operating system purpose-built for AI

May 22 Security
Cybersecurity Alert: UK Government Urges Business Leaders to Heed Expert Advice

Cybersecurity Alert: UK Government Urges Business Leaders to Heed Expert Advice

Cyberattacks have very real consequences, causing disruption to services we all depend on, incurring...

May 22 Security
Signal Blocks Microsoft Recall on Windows 11 by Default

Signal Blocks Microsoft Recall on Windows 11 by Default

Microsoft Recall is a controversial AI-powered feature that continuously captures screenshots of use...

May 22 Security
US Government Struggles to Find IT Professionals, Seeks External Help

US Government Struggles to Find IT Professionals, Seeks External Help

The GAO report highlights the scarcity of IT professionals in the federal government.

May 21 Security
Cyber Incident Disrupts Dairy Production at Arla

Cyber Incident Disrupts Dairy Production at Arla

Arla's customers can expect possible delays in delivery and cancellations due to the cyber incident.

May 20 Security
Microsoft just taught its AI agents to talk to each other—and it could transform how we work

Microsoft just taught its AI agents to talk to each other—and it could transform how we work

Microsoft just taught its AI agents to talk to each other—and it could transform how we work

May 19 Security
Why Microsoft Fabric has already been adopted by 70% of the Fortune 500 — and what’s next

Why Microsoft Fabric has already been adopted by 70% of the Fortune 500 — and what’s next

Why Microsoft Fabric has already been adopted by 70% of the Fortune 500 — and what’s next

May 19 Security
Microsoft announces over 50 AI tools to build the ‘agentic web’ at Build 2025

Microsoft announces over 50 AI tools to build the ‘agentic web’ at Build 2025

Microsoft announces over 50 AI tools to build the ‘agentic web’ at Build 2025

May 19 Security
Regeneron Acquires 23andMe for $256 Million, Including Data of 15 Million Users

Regeneron Acquires 23andMe for $256 Million, Including Data of 15 Million Users

Regeneron's acquisition of 23andMe raises concerns about data security and privacy.

May 19 Security
Nvidia powers world’s largest quantum research supercomputer

Nvidia powers world’s largest quantum research supercomputer

Nvidia powers world’s largest quantum research supercomputer

May 19 Security
Adopting agentic AI? Build AI fluency, redesign workflows, don’t neglect supervision

Adopting agentic AI? Build AI fluency, redesign workflows, don’t neglect supervision

Adopting agentic AI? Build AI fluency, redesign workflows, don’t neglect supervision

May 19 Security
AP Warns Hotel Booking Users of Phishing Scams

AP Warns Hotel Booking Users of Phishing Scams

AP waarschuwt gebruikers van boekingsplatformen hotels voor phishing

May 18 Security
Mozilla Plugs Critical Pwn2Own Vulnerabilities in Firefox, Urges Users to Update Immediately

Mozilla Plugs Critical Pwn2Own Vulnerabilities in Firefox, Urges Users to Update Immediately

Mozilla dicht kritieke Pwn2Own-lekken in Firefox, roept op tot snel updaten

May 18 Security
Arm is rebranding its system-on-a-chip product designs to showcase power savings for AI workloads, targeting a surprising sector

Arm is rebranding its system-on-a-chip product designs to showcase power savings for AI workloads, targeting a surprising sector

Arm is rebranding its system-on-a-chip product designs to showcase power savings for AI workloads, t...

May 16 Security
Minister Seeks to Grant Access to UBO Registry to Various Parties

Minister Seeks to Grant Access to UBO Registry to Various Parties

Minister wijst partijen aan die toegang krijgen tot het UBO-register

May 15 Security
VPN Provider Defends Decision to Cancel Long-Term Subscriptions

VPN Provider Defends Decision to Cancel Long-Term Subscriptions

The owners claim that VPN Secure generated $6,000 per month in recurring revenue, with hosting costs...

May 15 Security
Cyber Threats Pose Grave Risk to Aviation Sector

Cyber Threats Pose Grave Risk to Aviation Sector

Luchtvaartautoriteit: cyberdreigingen zijn als ontwakende vulkaan

May 14 Security
Microsoft to Continue Supporting Office Apps on Windows 10 Until October 2028

Microsoft to Continue Supporting Office Apps on Windows 10 Until October 2028

Microsoft 365 Apps, which include popular applications such as Word, Excel, PowerPoint, Outlook, and...

May 13 Security
Software Giant Ivanti Discloses Active Exploitation of Endpoint Manager Mobile Vulnerabilities

Software Giant Ivanti Discloses Active Exploitation of Endpoint Manager Mobile Vulnerabilities

According to Ivanti, the exploited vulnerabilities are located in open-source libraries used by EPMM...

May 13 Security
Risks of Backing Up Encrypted Chat History Revealed

Risks of Backing Up Encrypted Chat History Revealed

This means that conversations that were sent with end-to-end encryption could potentially be made ac...

May 13 Security
iOS Security Flaws: Apple Patches 33 Vulnerabilities

iOS Security Flaws: Apple Patches 33 Vulnerabilities

IPhone-lek geeft fysieke aanvaller toegang tot verwijderde gespreksopnames

May 13 Security
Asus DriverHub Flaw Enables Remote Code Execution

Asus DriverHub Flaw Enables Remote Code Execution

Asus DriverHub-lek maakt remote code execution mogelijk

May 12 Security
Cisco Warns of Critical Flaw in Wireless Controller Software

Cisco Warns of Critical Flaw in Wireless Controller Software

The vulnerability, identified as CVE-2025-20188, affects the Cisco IOS XE Software for Wireless LAN ...

May 8 Security
Critical Security Flaws Exploited in Popular Forum Software vBulletin

Critical Security Flaws Exploited in Popular Forum Software vBulletin

The impact of CVE-2025-48827 has been rated 10.0 out of 10, while CVE-2025-48828 has been rated 9.0.

May 31 Security
Netherlands' Government Agencies Heavily Rely on American Cloud Services

Netherlands' Government Agencies Heavily Rely on American Cloud Services

The analysis highlights Microsoft's dominance in the market, with the majority of the websites using...

May 31 Security
Netherlands Man Sentenced for Phishing Attacks via Google Ads

Netherlands Man Sentenced for Phishing Attacks via Google Ads

The scheme, which was uncovered by authorities, involved sending fake SMS messages that appeared to ...

May 30 Security
Why enterprise RAG systems fail: Google study introduces ‘sufficient context’ solution

Why enterprise RAG systems fail: Google study introduces ‘sufficient context’ solution

Why enterprise RAG systems fail: Google study introduces ‘sufficient context’ solution

May 24 Security
FBI Warns of Ransomware Attacks on American Law Firms

FBI Warns of Ransomware Attacks on American Law Firms

The hackers use a combination of phishing emails and phone calls to compromise the law firms' system...

May 23 Security
Generative AI Models May Have Unlawful Origins, Regulator Warns

Generative AI Models May Have Unlawful Origins, Regulator Warns

The AP is concerned about the large-scale scraping of data from the internet, which is often used to...

May 23 Security
AMD unveils new Threadripper CPUs and Radeon GPUs for gamers at Computex 2025

AMD unveils new Threadripper CPUs and Radeon GPUs for gamers at Computex 2025

AMD unveils new Threadripper CPUs and Radeon GPUs for gamers at Computex 2025

May 21 Security
Mistral AI launches Devstral, powerful new open source SWE agent model that runs on laptops

Mistral AI launches Devstral, powerful new open source SWE agent model that runs on laptops

Mistral AI launches Devstral, powerful new open source SWE agent model that runs on laptops

May 21 Security
Is your AI app pissing off users or going off-script? Raindrop emerges with AI-native observability platform to monitor performance

Is your AI app pissing off users or going off-script? Raindrop emerges with AI-native observability platform to monitor performance

Is your AI app pissing off users or going off-script? Raindrop emerges with AI-native observability ...

May 20 Security
Data Breach Exposes Personal Info of Domestic Violence Victims in UK

Data Breach Exposes Personal Info of Domestic Violence Victims in UK

The compromised data includes contact details, addresses, dates of birth, national insurance numbers...

May 19 Security
American Sentenced to 14 Months in Prison for SEC Account Hack

American Sentenced to 14 Months in Prison for SEC Account Hack

The incident occurred when the SEC announced on X that it had approved the trading of bitcoin ETFs, ...

May 18 Security
Cyberspionage Now a Criminal Offense in the Netherlands

Cyberspionage Now a Criminal Offense in the Netherlands

Cyberspionage vanaf vandaag strafbaar in Nederland

May 15 Security
Telemarketing Regulations to Tighten Up in 2026

Telemarketing Regulations to Tighten Up in 2026

The current telemarketing regulations have been criticized for allowing companies to pressure consum...

May 15 Security
Court Imposes Criminal Sentence and Professional Ban on Official Who Issued Fake Passports

Court Imposes Criminal Sentence and Professional Ban on Official Who Issued Fake Passports

According to the court, the applicants used someone else's passport photo to request the fake docume...

May 14 Security
Fortinet Confirms Active Exploitation of Critical Flaw in FortiVoice Phone Systems

Fortinet Confirms Active Exploitation of Critical Flaw in FortiVoice Phone Systems

FortiVoice is a communication platform that offers phone, chat, fax, and conferencing capabilities.

May 14 Security
Emotive voice AI startup Hume launches new EVI 3 model with rapid custom voice creation

Emotive voice AI startup Hume launches new EVI 3 model with rapid custom voice creation

Emotive voice AI startup Hume launches new EVI 3 model with rapid custom voice creation

May 31 Security
DeepSeek R1-0528 arrives in powerful open source challenge to OpenAI o3 and Google Gemini 2.5 Pro

DeepSeek R1-0528 arrives in powerful open source challenge to OpenAI o3 and Google Gemini 2.5 Pro

DeepSeek R1-0528 arrives in powerful open source challenge to OpenAI o3 and Google Gemini 2.5 Pro

May 30 Security
Meta Receives Fewer Data Requests from Dutch Authorities

Meta Receives Fewer Data Requests from Dutch Authorities

Overheid vraagt Meta minder vaak om gegevens van Facebookgebruikers

May 30 Security
Lawmakers Seek to Ban "Kill-Switches" in Solar Panels and Energy Converters

Lawmakers Seek to Ban "Kill-Switches" in Solar Panels and Energy Converters

Kamermotie tegen 'kill-switches' in zonnepanelen, omvormers en laadpalen

May 30 Security
Meta's AI-Training: Last Chance to Object for Facebook and Instagram Users

Meta's AI-Training: Last Chance to Object for Facebook and Instagram Users

Meta has made some adjustments in response to these concerns, including simplifying the process for ...

May 24 Security
Two-Thirds of Dutch Municipalities Use Microsoft Email Services

Two-Thirds of Dutch Municipalities Use Microsoft Email Services

The study's findings raise concerns about the consequences of relying on a single company for email ...

May 24 Security
Spanish Government Behind Most Sophisticated Espionage Campaign Ever Seen

Spanish Government Behind Most Sophisticated Espionage Campaign Ever Seen

The campaign was remarkable for its complexity, featuring a sophisticated toolset that included high...

May 23 Security
Time Magazine appears to accidentally publish embargoed story confirming new Anthropic model

Time Magazine appears to accidentally publish embargoed story confirming new Anthropic model

Time Magazine appears to accidentally publish embargoed story confirming new Anthropic model

May 23 Security
Let's Encrypt: Recurring Donations Crucial for Safer Internet

Let's Encrypt: Recurring Donations Crucial for Safer Internet

According to Shannon Robinson, a representative of the Internet Security Research Group (ISRG), whic...

May 22 Security
Google finally launches NotebookLM mobile app at I/O: hands-on, first impressions

Google finally launches NotebookLM mobile app at I/O: hands-on, first impressions

Google finally launches NotebookLM mobile app at I/O: hands-on, first impressions

May 21 Security
EU Commission Proposes Replacing Mandatory Product Labels with QR Codes

EU Commission Proposes Replacing Mandatory Product Labels with QR Codes

Brussel wil verplichte papieren etiketten vervangen door QR-codes

May 21 Security
Meta Advocates for Age Verification on App Stores

Meta Advocates for Age Verification on App Stores

Meta aan Tweede Kamer: appstore moet leeftijd gebruikers verifiëren

May 20 Security
Foxconn builds AI factory in partnership with Taiwan and Nvidia

Foxconn builds AI factory in partnership with Taiwan and Nvidia

Foxconn builds AI factory in partnership with Taiwan and Nvidia

May 19 Security
Government Officials to Brief Parliament on Online Age Verification

Government Officials to Brief Parliament on Online Age Verification

Ambtenaren gaan Kamercommissie informeren over online leeftijdsverificatie

May 19 Security
PARENTS TURN TO GPS TRACKERS TO KEEP TABS ON KIDS

PARENTS TURN TO GPS TRACKERS TO KEEP TABS ON KIDS

The Bureau of Youth and Media has expressed concerns that GPS trackers are becoming the "new normal....

May 19 Security
Cyber Attack on TU Eindhoven via Stolen, Reused Passwords

Cyber Attack on TU Eindhoven via Stolen, Reused Passwords

According to the investigation, the attackers first logged in on January 6th.

May 19 Security
EU Roadmap on Encryption Sparks Debate on Data Retention and Privacy

EU Roadmap on Encryption Sparks Debate on Data Retention and Privacy

The Commission's proposal to use digital identity wallets to prevent identity and document fraud has...

May 16 Security
Reduce model integration costs while scaling AI: LangChain’s open ecosystem delivers where closed vendors can’t

Reduce model integration costs while scaling AI: LangChain’s open ecosystem delivers where closed vendors can’t

Reduce model integration costs while scaling AI: LangChain’s open ecosystem delivers where closed ve...

May 16 Security
Thunderbird to Offer Limited iOS Version via Apple's TestFlight

Thunderbird to Offer Limited iOS Version via Apple's TestFlight

The limited iOS version of Thunderbird is still in its early stages and will not be available in the...

May 15 Security
Coinbase Hacked: Criminals Bribe Employees to Steal Customer Data

Coinbase Hacked: Criminals Bribe Employees to Steal Customer Data

Coinbase revealed that the criminals bribed employees to access its support tool and copy customer d...

May 15 Security
Google Secures Chrome Vulnerability that Allows Hackers to Steal User Accounts

Google Secures Chrome Vulnerability that Allows Hackers to Steal User Accounts

The issue allows hackers to steal data from other websites that the user has opened in their browser...

May 15 Security
Google Chrome Revokes Trust in Certificates from Chunghwa Telecom and Netlock

Google Chrome Revokes Trust in Certificates from Chunghwa Telecom and Netlock

Google has specified several reasons for its decision, including the failure of these certification ...

Jun 2 Security
Tax Authority Not Obligated to Disclose All Algorithm Information

Tax Authority Not Obligated to Disclose All Algorithm Information

Belastingdienst hoeft niet alle informatie over algoritmes openbaar te maken

Jun 2 Security
Government Seeks Clarity on Dutch Cloud Alternative for SIDN

Government Seeks Clarity on Dutch Cloud Alternative for SIDN

Kamer krijgt snel duidelijkheid over Nederlandse cloud voor DNS-keten SIDN

May 30 Security
Peer launches Global Simulation as real-time digital Earth with AI agents

Peer launches Global Simulation as real-time digital Earth with AI agents

Peer launches Global Simulation as real-time digital Earth with AI agents

May 29 Security
Nvidia CEO takes a shot at U.S. policy cutting off AI chip sales to China

Nvidia CEO takes a shot at U.S. policy cutting off AI chip sales to China

Nvidia CEO takes a shot at U.S. policy cutting off AI chip sales to China

May 29 Security
The 3 biggest bombshells from this week’s AI extravaganza

The 3 biggest bombshells from this week’s AI extravaganza

The 3 biggest bombshells from this week’s AI extravaganza

May 25 Security
Anthropic faces backlash to Claude 4 Opus behavior that contacts authorities, press if it thinks you’re doing something ‘egregiously immoral’

Anthropic faces backlash to Claude 4 Opus behavior that contacts authorities, press if it thinks you’re doing something ‘egregiously immoral’

Anthropic faces backlash to Claude 4 Opus behavior that contacts authorities, press if it thinks you...

May 23 Security
Mozilla Abandons Pocket and Fakespot, Shifts Focus to Firefox

Mozilla Abandons Pocket and Fakespot, Shifts Focus to Firefox

Users with paid accounts will receive a refund, and the service will stop on July 8.

May 23 Security
International Police Operation Targets Illegal Online Marketplaces

International Police Operation Targets Illegal Online Marketplaces

The suspects are accused of buying and selling illegal goods and services, including drugs, stolen c...

May 22 Security
Ransomware Attack Forces Ohio Hospitals to Cancel Treatments

Ransomware Attack Forces Ohio Hospitals to Cancel Treatments

Ziekenhuizen VS annuleren behandelingen wegens ransomware-aanval

May 22 Security
Budget Service Sees Legacy IT Systems Decline to 19%: Report

Budget Service Sees Legacy IT Systems Decline to 19%: Report

In its report, the Budget Service highlights a successful year, despite the challenges of a tight la...

May 22 Security
Malicious AI, VPN, and Crypto Extensions in Chrome Web Store Steal Data

Malicious AI, VPN, and Crypto Extensions in Chrome Web Store Steal Data

Malafide AI-, vpn-, en crypto-extensies in Chrome Web Store stelen data

May 22 Security
Data Breaches: UWV Reports Over 900 Incidents to Dutch Data Protection Authority

Data Breaches: UWV Reports Over 900 Incidents to Dutch Data Protection Authority

UWV meldde vorig jaar 900 datalekken bij Autoriteit Persoonsgegevens

May 22 Security
Government Algorithms Fail to Meet EU Data Protection Standards

Government Algorithms Fail to Meet EU Data Protection Standards

Algoritmes Dienst Toeslagen en Belastingdienst voldoen niet aan AVG

May 21 Security
Experts Advise Keeping Cash on Hand for Emergencies

Experts Advise Keeping Cash on Hand for Emergencies

In the event of an emergency, it's possible that ATMs and payment terminals may not function, making...

May 20 Security
British Supermarket Supplier Hit by Ransomware Attack

British Supermarket Supplier Hit by Ransomware Attack

In an email sent to customers on Thursday, the company informed them that it was unable to process o...

May 20 Security
Noyb Warns EU GDPR Procedures Unworkable

Noyb Warns EU GDPR Procedures Unworkable

Noyb waarschuwt dat EU AVG-procedures onwerkbaar maakt

May 20 Security
New Version of Data Leak Search Engine Have I Been Pwned Launched

New Version of Data Leak Search Engine Have I Been Pwned Launched

In addition to the ability to search for email addresses in known data breaches, HIBP also offers a ...

May 20 Security
Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

Users of Roundcube, Horde, MDaemon, and Zimbra Fall Prey to XSS Attacks

Gebruikers Roundcube, Horde, MDaemon en Zimbra doelwit XSS-aanvallen

May 15 Security
When your LLM calls the cops: Claude 4’s whistle-blow and the new agentic AI risk stack

When your LLM calls the cops: Claude 4’s whistle-blow and the new agentic AI risk stack

When your LLM calls the cops: Claude 4’s whistle-blow and the new agentic AI risk stack

Jun 2 Security
Which LLM should you use? Token Monster automatically combines multiple models and tools for you

Which LLM should you use? Token Monster automatically combines multiple models and tools for you

Which LLM should you use? Token Monster automatically combines multiple models and tools for you

May 31 Security
Trickbot Leader Named and Sought by German Police

Trickbot Leader Named and Sought by German Police

Trickbot's victims span across the globe, including hospitals, government institutions, businesses, ...

May 31 Security
Ransomware Payment Reporting Mandate Introduced in Australia

Ransomware Payment Reporting Mandate Introduced in Australia

Australië introduceert meldplicht voor betalen van losgeld bij ransomware

May 30 Security
Security Flaws in NetFax Server to Remain Unpatched

Security Flaws in NetFax Server to Remain Unpatched

The first vulnerability has an impact score of 9.4 out of 10, making it a severe threat to system se...

May 30 Security
DanaBot takedown shows how agentic AI cut months of SOC analysis to weeks

DanaBot takedown shows how agentic AI cut months of SOC analysis to weeks

DanaBot takedown shows how agentic AI cut months of SOC analysis to weeks

May 29 Security
Rumi raises $4.7M to change passive media into interactive AI experiences

Rumi raises $4.7M to change passive media into interactive AI experiences

Rumi raises $4.7M to change passive media into interactive AI experiences

May 28 Security
Routers Compromised: Thousands of Online Asus Routers Infected with Backdoor

Routers Compromised: Thousands of Online Asus Routers Infected with Backdoor

The backdoor allows attackers to execute system commands and retains access even after the router is...

May 28 Security
Ransomware Crackdown: Police Take Down 60 Malware Servers, Arrest Warrants Issued for 20 Suspects

Ransomware Crackdown: Police Take Down 60 Malware Servers, Arrest Warrants Issued for 20 Suspects

These "initial access malware" variants can steal sensitive data from infected systems and install a...

May 23 Security
Microsoft Uncovers Password-Stealing Lumma Malware on 394,000 PCs

Microsoft Uncovers Password-Stealing Lumma Malware on 394,000 PCs

Microsoft detecteert wachtwoord-stelende Lumma-malware op 394.000 pc's

May 22 Security
Consumer Claims Fraudulent Transaction, Bank Says He Agreed

Consumer Claims Fraudulent Transaction, Bank Says He Agreed

Vakantieganger claimt fraude bij afrekenen, krijgt schade niet vergoed

May 21 Security
Hundreds of Ivanti EPMM Servers Exposed to Active Attack in Germany

Hundreds of Ivanti EPMM Servers Exposed to Active Attack in Germany

The consequences of this vulnerability are severe, as it allows attackers to compromise sensitive sy...

May 19 Security
Nvidia-powered supercomputer to enable quantum leap for Taiwan’s research

Nvidia-powered supercomputer to enable quantum leap for Taiwan’s research

Nvidia-powered supercomputer to enable quantum leap for Taiwan’s research

May 19 Security
FBI Warns of Deepfake Audio Messages Imitating US Officials

FBI Warns of Deepfake Audio Messages Imitating US Officials

The attackers send malicious links to initiate a chat on a different platform, where they offer malw...

May 16 Security
Criticism SAP NetWeaver Vulnerability Now Used in Ransomware Attacks

Criticism SAP NetWeaver Vulnerability Now Used in Ransomware Attacks

SAP released an emergency patch on April 24, but misuse of the vulnerability is believed to have sta...

May 15 Security
Battle Over Online Tracking Cookies Heats Up in Europe

Battle Over Online Tracking Cookies Heats Up in Europe

Brussels Hof vernietigt beslissing privacytoezichthouder over cookiepop-ups

May 15 Security
Model Context Protocol: A promising AI integration layer, but not a standard (yet)

Model Context Protocol: A promising AI integration layer, but not a standard (yet)

Model Context Protocol: A promising AI integration layer, but not a standard (yet)

Jun 2 Security
The future of engineering belongs to those who build with AI, not without it

The future of engineering belongs to those who build with AI, not without it

The future of engineering belongs to those who build with AI, not without it

Jun 2 Security
Qualcomm Warns of GPU Vulnerabilities in Android Phones

Qualcomm Warns of GPU Vulnerabilities in Android Phones

The two most critical vulnerabilities can lead to "memory corruption," allowing an attacker to execu...

Jun 2 Security
Mozilla Develops Detection System to Protect Firefox Users' Cryptowallets

Mozilla Develops Detection System to Protect Firefox Users' Cryptowallets

A cryptowallet drainer is essentially any fraudulent method that gives unauthorized access to a cryp...

Jun 2 Security
Micro Center nerd store fills the Fry’s vacuum with its return to Silicon Valley

Micro Center nerd store fills the Fry’s vacuum with its return to Silicon Valley

Micro Center nerd store fills the Fry’s vacuum with its return to Silicon Valley

Jun 1 Security
QwenLong-L1 solves long-context reasoning challenge that stumps current LLMs

QwenLong-L1 solves long-context reasoning challenge that stumps current LLMs

QwenLong-L1 solves long-context reasoning challenge that stumps current LLMs

Jun 1 Security
ElevenLabs debuts Conversational AI 2.0 voice assistants that understand when to pause, speak, and take turns talking

ElevenLabs debuts Conversational AI 2.0 voice assistants that understand when to pause, speak, and take turns talking

ElevenLabs debuts Conversational AI 2.0 voice assistants that understand when to pause, speak, and t...

May 31 Security
Burgers Seek Clarification on National Cyber Security Center

Burgers Seek Clarification on National Cyber Security Center

The V-100 event, which has been held annually since 2017, brings together 100 citizens, including en...

May 30 Security
Nvidia beats estimates for Q1 results as revenues rise 69% from a year ago

Nvidia beats estimates for Q1 results as revenues rise 69% from a year ago

Nvidia beats estimates for Q1 results as revenues rise 69% from a year ago

May 29 Security
Less is more: Meta study shows shorter reasoning improves AI accuracy by 34%

Less is more: Meta study shows shorter reasoning improves AI accuracy by 34%

Less is more: Meta study shows shorter reasoning improves AI accuracy by 34%

May 29 Security
Akool Live Camera can translate video calls in real time, swap faces, and get live virtual avatars to mimic human movements

Akool Live Camera can translate video calls in real time, swap faces, and get live virtual avatars to mimic human movements

Akool Live Camera can translate video calls in real time, swap faces, and get live virtual avatars t...

May 28 Security
Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

The scheme involves setting up fake "AI video generator" websites that promise users they can create...

May 28 Security
The battle to AI-enable the web: NLweb and what enterprises need to know

The battle to AI-enable the web: NLweb and what enterprises need to know

The battle to AI-enable the web: NLweb and what enterprises need to know

May 25 Security
American Government Warns of Attacks on Commvault Cloud App

American Government Warns of Attacks on Commvault Cloud App

VS waarschuwt voor aanvallen op cloudapplicatie Commvault

May 23 Security
FBI Uncovers Self-Infected Developers of DanaBot Malware

FBI Uncovers Self-Infected Developers of DanaBot Malware

The DanaBot malware is designed to steal stored login credentials, record keystrokes, and grant atta...

May 23 Security
Town Amersfoort Promotes Two-Factor Authentication with Unique Bike Promotion

Town Amersfoort Promotes Two-Factor Authentication with Unique Bike Promotion

Gemeente Amersfoort gaat met bakfiets tweestapsverificatie promoten

May 23 Security
Aethir enables better user acquisition via Instant Play streaming for Doctor Who: Worlds Apart

Aethir enables better user acquisition via Instant Play streaming for Doctor Who: Worlds Apart

Aethir enables better user acquisition via Instant Play streaming for Doctor Who: Worlds Apart

Jun 2 Security
Italian Psychologists Fined for Leaking Sensitive Data in Ransomware Attack

Italian Psychologists Fined for Leaking Sensitive Data in Ransomware Attack

Italiaanse psychologen beboet voor lekken gevoelige data bij ransomware-aanval

Jun 2 Security
Experts: 9-Second Break Not Enough to Thwart Scams, Phishing, and Malware

Experts: 9-Second Break Not Enough to Thwart Scams, Phishing, and Malware

The Take9 campaign, supported by numerous American organizations, urges people to take a moment to t...

Jun 2 Security
European Commission to Launch Age Verification App This Summer

European Commission to Launch Age Verification App This Summer

The age verification app is being developed by Scytales and T-Systems and is designed to be easily i...

Jun 2 Security
Bunq Won't Compensate Victim of PayPal Impersonation

Bunq Won't Compensate Victim of PayPal Impersonation

The scammer convinced the customer to install AnyDesk on their smartphone, granting the scammer acce...

May 30 Security
European Ministers to Discuss EU-Wide Data Retention Plan

European Ministers to Discuss EU-Wide Data Retention Plan

Europese ministers bespreken plan voor EU-brede bewaarplicht

May 30 Security
Almost 2,000 Dutch Computers Infected with Latrodectus Malware

Almost 2,000 Dutch Computers Infected with Latrodectus Malware

Latrodectus is a significant threat to global cybersecurity, and its presence in nearly 2,000 Dutch ...

May 30 Security
Cyber Spies Abused Google Calendar to Control Infected Systems

Cyber Spies Abused Google Calendar to Control Infected Systems

The attack was a sophisticated and multi-step process, involving spear phishing emails, compromised ...

May 30 Security
How Snowflake’s open-source text-to-SQL and Arctic inference models solve enterprise AI’s two biggest deployment headaches

How Snowflake’s open-source text-to-SQL and Arctic inference models solve enterprise AI’s two biggest deployment headaches

How Snowflake’s open-source text-to-SQL and Arctic inference models solve enterprise AI’s two bigges...

May 29 Security
Everyone’s looking to get in on vibe coding — and Google is no different with Stitch, its follow-up to Jules

Everyone’s looking to get in on vibe coding — and Google is no different with Stitch, its follow-up to Jules

Everyone’s looking to get in on vibe coding — and Google is no different with Stitch, its follow-up ...

May 28 Security
Microsoft Unveils Windows Backup for Organizations

Microsoft Unveils Windows Backup for Organizations

The new feature aims to reduce migration overhead, minimize disruptions for users, and enhance the r...

May 28 Security
Minister Rejects List of Open-Source Cybersecurity Software

Minister Rejects List of Open-Source Cybersecurity Software

The debate was sparked by a proposed motion from GroenLinks-PvdA-Kamerlid Kathmann, which aimed to p...

May 28 Security
Malicious Tool Versions Target IT Staff

Malicious Tool Versions Target IT Staff

These fake domains appear in Microsoft Bing search results, offering users a compromised version of ...

May 26 Security
Forensic Experts Use Blood Flow Detection to Identify Deepfakes

Forensic Experts Use Blood Flow Detection to Identify Deepfakes

NFI gebruikt bloedstroomdetectie voor herkennen van deepfakes

May 23 Security
US Authorities Seek to Forfeit $24 Million in Cryptocurrency Linked to Qakbot Malware Leader

US Authorities Seek to Forfeit $24 Million in Cryptocurrency Linked to Qakbot Malware Leader

VS wil 24 miljoen dollar vermeende Qakbot-leider verbeurd laten verklaren

May 23 Security
Method Predicts Likelihood of Exploited Cybersecurity Vulnerabilities

Method Predicts Likelihood of Exploited Cybersecurity Vulnerabilities

According to the researchers, only a small percentage of the tens of thousands of vulnerabilities di...

May 20 Security
Critical Flaw in RoundCube Webmail Software Enables Remote Code Execution

Critical Flaw in RoundCube Webmail Software Enables Remote Code Execution

Kritiek RoundCube-lek maakt remote code execution op mailserver mogelijk

Jun 6 Security
Linux Switching Campaign Targets Windows 10 Users

Linux Switching Campaign Targets Windows 10 Users

On October 14, Microsoft will cease to provide security updates for Windows 10, unless users opt for...

Jun 6 Security
Ransomware Threats Continue to Haunt Dutch Municipalities

Ransomware Threats Continue to Haunt Dutch Municipalities

Ransomware remains the greatest threat to Dutch municipalities, the IBD stated.

Jun 5 Security
Enterprise alert: PostgreSQL just became the database you can’t ignore for AI applications

Enterprise alert: PostgreSQL just became the database you can’t ignore for AI applications

Enterprise alert: PostgreSQL just became the database you can’t ignore for AI applications

Jun 3 Security
Bank Malware Adds Contacts to Infected Android Phones

Bank Malware Adds Contacts to Infected Android Phones

The Crocodilus malware is specifically designed for bank fraud and allows attackers to remotely acce...

Jun 3 Security
Malaysian Interior Minister's WhatsApp Account Hacked and Used for Scam

Malaysian Interior Minister's WhatsApp Account Hacked and Used for Scam

The Malaysian authorities have warned the public to be cautious of messages that appear to come from...

Jun 2 Security
VeraCrypt Update Brings Screen Protection Against Screenshots and Recordings

VeraCrypt Update Brings Screen Protection Against Screenshots and Recordings

Encryptiesoftware VeraCrypt voorzien van schermbeveiliging tegen opnames

Jun 2 Security
US Sanctions Philippine Internet Company for Facilitating 'Pig Butchering' Scams

US Sanctions Philippine Internet Company for Facilitating 'Pig Butchering' Scams

The FBI has warned that internet service providers, DNS providers, browser developers, and safe brow...

May 30 Security
Police Take Down Popular Service for Malware Developers

Police Take Down Popular Service for Malware Developers

AvCheck played a crucial facilitating role in the cybercrime ecosystem, the police stated.

May 30 Security
ConnectWise Hit by System Breach, Some Customers Affected

ConnectWise Hit by System Breach, Some Customers Affected

ConnectWise getroffen door inbraak op systemen, klanten ook geraakt

May 30 Security
Cyberattacks: Dutch Intelligence Unveils Russian Hackers' 'Laundry Bear' Group

Cyberattacks: Dutch Intelligence Unveils Russian Hackers' 'Laundry Bear' Group

In September 2024, the group stole work-related contact information of all Dutch police employees.

May 27 Security
OpenAI updates Operator to o3, making its $200 monthly ChatGPT Pro subscription more enticing

OpenAI updates Operator to o3, making its $200 monthly ChatGPT Pro subscription more enticing

OpenAI updates Operator to o3, making its $200 monthly ChatGPT Pro subscription more enticing

May 26 Security
The Correspondent Appeals Wiretap Case Against Public Prosecutor

The Correspondent Appeals Wiretap Case Against Public Prosecutor

De Correspondent in hoger beroep afluisterzaak Openbaar Ministerie

May 26 Security
Doctors Urge Minimum Age Limits for Social Media and Smartphones

Doctors Urge Minimum Age Limits for Social Media and Smartphones

The doctors point to several worrying trends, including:

May 26 Security
Government Agencies Lack Exit Strategy for American Cloud Services

Government Agencies Lack Exit Strategy for American Cloud Services

Overheidsinstanties hebben geen exitstrategie voor Amerikaanse cloud

May 20 Security
Google to Block Chrome Startup with Admin Rights

Google to Block Chrome Startup with Admin Rights

When a user performs actions within the browser, such as downloading and executing files, it is typi...

May 15 Security
How much information do LLMs really memorize? Now we know, thanks to Meta, Google, Nvidia and Cornell

How much information do LLMs really memorize? Now we know, thanks to Meta, Google, Nvidia and Cornell

How much information do LLMs really memorize? Now we know, thanks to Meta, Google, Nvidia and Cornel...

Jun 5 Security
Databricks and Noma tackle CISOs’ AI nightmares around inference vulnerabilities

Databricks and Noma tackle CISOs’ AI nightmares around inference vulnerabilities

Databricks and Noma tackle CISOs’ AI nightmares around inference vulnerabilities

Jun 5 Security
Stop guessing why your LLMs break: Anthropic’s new tool shows you exactly what goes wrong

Stop guessing why your LLMs break: Anthropic’s new tool shows you exactly what goes wrong

Stop guessing why your LLMs break: Anthropic’s new tool shows you exactly what goes wrong

Jun 5 Security
OpenAI hits 3M business users and launches workplace tools to take on Microsoft

OpenAI hits 3M business users and launches workplace tools to take on Microsoft

OpenAI hits 3M business users and launches workplace tools to take on Microsoft

Jun 5 Security
EU Launches Own DNS Service with Built-In Ad Blocker and Child Filter

EU Launches Own DNS Service with Built-In Ad Blocker and Child Filter

EU lanceert eigen dns-dienst met ingebouwde adblocker en kinderfilter

Jun 5 Security
Ransomware Group Claims Data Theft from US Hospitals

Ransomware Group Claims Data Theft from US Hospitals

The attack caused a "system-wide technology disruption," according to a statement on the healthcare ...

Jun 5 Security
23andMe Offers DNA Data of Millions to Bidders Again

23andMe Offers DNA Data of Millions to Bidders Again

As part of the new auction, Wojcicki will team up with a California-based research institute to make...

Jun 5 Security
Civil Liberties at Risk as Police Leverage AI without Adequate Protection

Civil Liberties at Risk as Police Leverage AI without Adequate Protection

'Grondrechten burgers onvoldoende beschermd bij AI-gebruik door politie'

Jun 5 Security
HMRC Reports $56 Million in Tax Loss Due to Phishing Scam

HMRC Reports $56 Million in Tax Loss Due to Phishing Scam

The HMRC reports that the accounts of 100,000 British taxpayers were compromised in the scam.

Jun 5 Security
Nvidia CEO Jensen Huang sings praises of processor in Nintendo Switch 2

Nvidia CEO Jensen Huang sings praises of processor in Nintendo Switch 2

Nvidia CEO Jensen Huang sings praises of processor in Nintendo Switch 2

Jun 4 Security
Porn Sites in France Block Access in Protest Against Age Verification

Porn Sites in France Block Access in Protest Against Age Verification

The new French law aims to prevent minors from accessing adult content online.

Jun 4 Security
The North Face Customers Hit by Credential Stuffing Attack

The North Face Customers Hit by Credential Stuffing Attack

Credential stuffing is a type of attack in which hackers use previously leaked email addresses and p...

Jun 4 Security
Asus Recommends Factory Reset to Remove SSH Backdoor

Asus Recommends Factory Reset to Remove SSH Backdoor

Asus adviseert fabrieksreset voor verwijderen van SSH-backdoor

Jun 4 Security
Kill-Switch Ban Sought for Solar Panels, Converters, and Chargers in the Netherlands

Kill-Switch Ban Sought for Solar Panels, Converters, and Chargers in the Netherlands

NSC parliamentarians argue that the widespread use of kill-switches in consumer electronics could ha...

Jun 4 Security
Phonely’s new AI agents hit 99% accuracy—and customers can’t tell they’re not human

Phonely’s new AI agents hit 99% accuracy—and customers can’t tell they’re not human

Phonely’s new AI agents hit 99% accuracy—and customers can’t tell they’re not human

Jun 4 Security
Inside Intuit’s GenOS update: Why prompt optimization and intelligent data cognition are critical to enterprise agentic AI success

Inside Intuit’s GenOS update: Why prompt optimization and intelligent data cognition are critical to enterprise agentic AI success

Inside Intuit’s GenOS update: Why prompt optimization and intelligent data cognition are critical to...

Jun 3 Security
Concerns Rise Over EU's Encryption Plan: "Undermines End-to-End Encryption"

Concerns Rise Over EU's Encryption Plan: "Undermines End-to-End Encryption"

Experts bezorgd over plan Brussel: "schaadt gebruik van end-to-end encryptie"

Jun 3 Security
Android Flaws Allow Rogue Apps to Gain Unwanted Permissions

Android Flaws Allow Rogue Apps to Gain Unwanted Permissions

The most severe vulnerability is CVE-2025-26443, a flaw in the Android System that allows a local us...

Jun 3 Security
Microsoft Simplifies Tool for Resolving Windows 11 Startup Issues

Microsoft Simplifies Tool for Resolving Windows 11 Startup Issues

When a critical startup issue occurs, the system starts WinRE, connects to the network, and sends di...

Jun 3 Security
Cartier Reveals Data Breach, Exposing Personal Customer Information

Cartier Reveals Data Breach, Exposing Personal Customer Information

The attackers managed to breach Cartier's systems, allowing them to access sensitive customer data.

Jun 3 Security
Mistral launches new code embedding model that outperforms OpenAI and Cohere in real-world retrieval tasks

Mistral launches new code embedding model that outperforms OpenAI and Cohere in real-world retrieval tasks

Mistral launches new code embedding model that outperforms OpenAI and Cohere in real-world retrieval...

May 29 Security
Microsoft Targets Unified Update Experience for Windows and Third-Party Apps

Microsoft Targets Unified Update Experience for Windows and Third-Party Apps

Microsoft wil dat Windows Update ook third-party software kan updaten

May 28 Security
Digital Euro Costs Difficult to Predict, Says Finance Minister

Digital Euro Costs Difficult to Predict, Says Finance Minister

Ambitious Plans

May 27 Security
Software Company Doesn't Have to Provide Free User with Screenshots Under GDPR

Software Company Doesn't Have to Provide Free User with Screenshots Under GDPR

Softwarebedrijf hoeft gratis gebruiker onder AVG geen screenshots te geven

May 27 Security
Cellebrite to Acquire Cybersecurity Firm Corellium

Cellebrite to Acquire Cybersecurity Firm Corellium

Corellium is the creator of the CORSEC simulator, a virtual machine that runs iOS.

Jun 6 Security
Mistral AI’s new coding assistant takes direct aim at GitHub Copilot

Mistral AI’s new coding assistant takes direct aim at GitHub Copilot

Mistral AI’s new coding assistant takes direct aim at GitHub Copilot

Jun 5 Security
Nvidia says its Blackwell chips lead benchmarks in training AI LLMs

Nvidia says its Blackwell chips lead benchmarks in training AI LLMs

Nvidia says its Blackwell chips lead benchmarks in training AI LLMs

Jun 4 Security
Coinbase Knew of Data Leak in January, Says Report

Coinbase Knew of Data Leak in January, Says Report

Malicious help desk employees allegedly provided the stolen data to criminals, who used it to defrau...

Jun 4 Security
Data Breach at Dutch Social Security Office Exposes Health Information

Data Breach at Dutch Social Security Office Exposes Health Information

In January, a UWV employee accidentally sent an internal email to a client, containing a document wi...

Jun 4 Security
Den Helder Considers Using Drones to Combat Explosions and Car Fires

Den Helder Considers Using Drones to Combat Explosions and Car Fires

In a recent meeting, the city council concluded that many technical issues can be resolved with the ...

Jun 4 Security
Epic Games reveals The State of Unreal for 2025

Epic Games reveals The State of Unreal for 2025

Epic Games reveals The State of Unreal for 2025

Jun 4 Security
What game companies can learn from AI analysis of 1.5M gamer conversations | Creativ Company

What game companies can learn from AI analysis of 1.5M gamer conversations | Creativ Company

What game companies can learn from AI analysis of 1.5M gamer conversations | Creativ Company

Jun 3 Security
AI’s big interoperability moment: Why A2A and MCP are key for agent collaboration

AI’s big interoperability moment: Why A2A and MCP are key for agent collaboration

AI’s big interoperability moment: Why A2A and MCP are key for agent collaboration

Jun 3 Security
CockroachDB’s distributed vector indexing tackles the looming AI data explosion enterprises aren’t ready for

CockroachDB’s distributed vector indexing tackles the looming AI data explosion enterprises aren’t ready for

CockroachDB’s distributed vector indexing tackles the looming AI data explosion enterprises aren’t r...

Jun 3 Security
Meta and Yandex Accused of Tracking Users Without Consent

Meta and Yandex Accused of Tracking Users Without Consent

The method, which has been in use since 2017 for Yandex and September 2024 for Meta, allows the comp...

Jun 3 Security
NCSC Warns Against Bring-Your-Own-Device, Urges Session Cookie Management

NCSC Warns Against Bring-Your-Own-Device, Urges Session Cookie Management

NCSC adviseert tegen Bring-Your-Own-Device, voor beheer van sessiecookies

May 28 Security
Security leaders lose visibility as consultants deploy shadow AI copilots to stay employed

Security leaders lose visibility as consultants deploy shadow AI copilots to stay employed

Security leaders lose visibility as consultants deploy shadow AI copilots to stay employed

May 28 Security
Mistral launches API for building AI agents that run Python, generate images, perform RAG and more

Mistral launches API for building AI agents that run Python, generate images, perform RAG and more

Mistral launches API for building AI agents that run Python, generate images, perform RAG and more

May 28 Security
ICT Job Market Tightness Eases, but Demand Remains High

ICT Job Market Tightness Eases, but Demand Remains High

UWV: krapte op arbeidsmarkt ict'ers daalt licht maar nog altijd veel vraag

May 27 Security
Government Official: Zaanstad Was Allowed to Publish List of Suspected Welfare Fraudsters

Government Official: Zaanstad Was Allowed to Publish List of Suspected Welfare Fraudsters

Staatssecretaris: Zaanstad mocht lijst met vermeende fraudeurs publiceren

May 27 Security
Congress Questions Dutch Dependence on American Cloud Services

Congress Questions Dutch Dependence on American Cloud Services

Kamervragen over Nederlandse afhankelijkheid Amerikaanse clouddiensten

May 27 Security
Data of 280,000 Canadian Energy Company Customers Published Online

Data of 280,000 Canadian Energy Company Customers Published Online

Data released includes names, phone numbers, email addresses, home addresses, birth dates, consumpti...

May 26 Security
Government to Investigate Archiving of .nl Domain Through Web Crawlers

Government to Investigate Archiving of .nl Domain Through Web Crawlers

Overheid laat archivering .nl-domein door middel van crawlers onderzoeken

May 26 Security
Data Leak Exposes Financial Information of Thousands of KBC Securities Clients

Data Leak Exposes Financial Information of Thousands of KBC Securities Clients

The mistake occurred during the transmission of annual cost reports, which contained the sensitive i...

May 26 Security
Belastingdienst Not Obligated to Accept Cash Payments for Taxes

Belastingdienst Not Obligated to Accept Cash Payments for Taxes

Belastingdienst hoeft contante betaling van belasting niet te accepteren

May 26 Security
Minister Denies Funding for Dutch Cloud Providers in Budget

Minister Denies Funding for Dutch Cloud Providers in Budget

Minister: geen geld voor Nederlandse cloudproviders in voorjaarsnota

May 26 Security
Microsoft Unveils Quantum-Resistant Encryption Test Version of Windows 11

Microsoft Unveils Quantum-Resistant Encryption Test Version of Windows 11

As quantum computing becomes increasingly powerful, encryption methods that were previously consider...

May 26 Security
Firefox Address Bar Simplified by Removing "https://" Prefix

Firefox Address Bar Simplified by Removing "https://" Prefix

The decision to remove the "https://" prefix was made to declutter the address bar and make it easie...

May 26 Security
US Authorities and Dutch Police Shut Down Illegal Online Marketplace BidenCash

US Authorities and Dutch Police Shut Down Illegal Online Marketplace BidenCash

Nederlandse politie en FBI halen illegale marktplaats BidenCash offline

Jun 5 Security
Justice Department Launches Nationwide AI Program

Justice Department Launches Nationwide AI Program

Rechtspraak start met landelijk programma voor gebruik van AI

Jun 5 Security
US Offers $10 Million Reward for Tips on RedLine Malware Developer

US Offers $10 Million Reward for Tips on RedLine Malware Developer

RedLine is offered both as a standalone product and as a subscription service.

Jun 5 Security
Cisco Warns of Critical ISE Security Flaw

Cisco Warns of Critical ISE Security Flaw

The ISE is a network access control solution that enables organizations to manage which endpoints, u...

Jun 5 Security
Over 900 Organizations Hit by Play-Ransomware: FBI

Over 900 Organizations Hit by Play-Ransomware: FBI

The attackers exploit compromised accounts and known vulnerabilities to gain access to the systems o...

Jun 5 Security
Data Leak Exposes Sensitive Information of Thousands in London Borough

Data Leak Exposes Sensitive Information of Thousands in London Borough

The data leak was discovered in November 2023, more than two years after the information was initial...

Jun 4 Security
Vodafone Germany Hit with €30 Million Fine for Authentication Process Flaw

Vodafone Germany Hit with €30 Million Fine for Authentication Process Flaw

The BfDI discovered that the authentication vulnerabilities gave unauthorized third parties access t...

Jun 4 Security
Swedish Regulator Investigates Securitas Over Possible Employee Surveillance

Swedish Regulator Investigates Securitas Over Possible Employee Surveillance

As part of the investigation, IMY will also examine whether Securitas has informed employees about t...

Jun 4 Security
Craft CMS Under Active Attack, US Government Warns

Craft CMS Under Active Attack, US Government Warns

CVE-2024-56145, a critical vulnerability, allows remote code execution, making it a highly severe th...

Jun 3 Security
OpenAI’s Sora is now available for FREE to all users through Microsoft Bing Video Creator on mobile

OpenAI’s Sora is now available for FREE to all users through Microsoft Bing Video Creator on mobile

OpenAI’s Sora is now available for FREE to all users through Microsoft Bing Video Creator on mobile

Jun 3 Security
Banks Must Delete Customer Data After Five Years, Financial Watchdog Rules

Banks Must Delete Customer Data After Five Years, Financial Watchdog Rules

Banks are required to conduct customer research under the Wwft and report unusual payment transactio...

May 28 Security
Anthropic debuts Claude conversational voice mode on mobile that searches your Google Docs, Drive, Calendar

Anthropic debuts Claude conversational voice mode on mobile that searches your Google Docs, Drive, Calendar

Anthropic debuts Claude conversational voice mode on mobile that searches your Google Docs, Drive, C...

May 28 Security
What Salesforce’s $8B acquisition of Informatica means for enterprise data and AI

What Salesforce’s $8B acquisition of Informatica means for enterprise data and AI

What Salesforce’s $8B acquisition of Informatica means for enterprise data and AI

May 27 Security
From disruption to reinvention: How knowledge workers can thrive after AI

From disruption to reinvention: How knowledge workers can thrive after AI

From disruption to reinvention: How knowledge workers can thrive after AI

May 27 Security
Google’s ‘world-model’ bet: building the AI operating layer before Microsoft captures the UI

Google’s ‘world-model’ bet: building the AI operating layer before Microsoft captures the UI

Google’s ‘world-model’ bet: building the AI operating layer before Microsoft captures the UI

May 27 Security
European Citizens Lash Out Against Brussels' Data Retention Plan

European Citizens Lash Out Against Brussels' Data Retention Plan

Europese burgers uiten felle kritiek op plan Brussel voor bewaarplicht

May 27 Security
British Police Increasingly Deploy Live Facial Recognition Cameras

British Police Increasingly Deploy Live Facial Recognition Cameras

The research reveals that the police are allocating more budget for the required hardware and the Br...

May 27 Security
Google claims Gemini 2.5 Pro preview beats DeepSeek R1 and Grok 3 Beta in coding performance

Google claims Gemini 2.5 Pro preview beats DeepSeek R1 and Grok 3 Beta in coding performance

Google claims Gemini 2.5 Pro preview beats DeepSeek R1 and Grok 3 Beta in coding performance

Jun 6 Security
Solidroad just raised $6.5M to reinvent customer service with AI that coaches, not replaces

Solidroad just raised $6.5M to reinvent customer service with AI that coaches, not replaces

Solidroad just raised $6.5M to reinvent customer service with AI that coaches, not replaces

Jun 6 Security
FBI Warns of Widespread Android Malware Infection

FBI Warns of Widespread Android Malware Infection

The malware is typically pre-installed on devices before users even turn them on, or it can infect d...

Jun 6 Security
Surveillance Drones Deployed Seven Times in Utrecht During Demonstrations

Surveillance Drones Deployed Seven Times in Utrecht During Demonstrations

In response to questions from city council factions, Dijksma revealed that the drones were used duri...

Jun 6 Security
Google Warns of Phishing Attacks Targeting Salesforce Customers

Google Warns of Phishing Attacks Targeting Salesforce Customers

Google waarschuwt voor telefonische phishing van Salesforce-klanten

Jun 4 Security
Your AI models are failing in production—Here’s how to fix model selection

Your AI models are failing in production—Here’s how to fix model selection

Your AI models are failing in production—Here’s how to fix model selection

Jun 4 Security
Thunderbird to Host EU Servers for Self-Email Service

Thunderbird to Host EU Servers for Self-Email Service

Earlier, it was announced that the code for Thunderbird's new email service would be fully open-sour...

Jun 4 Security
Global Outage Caused by Software Glitch, Says SentinelOne

Global Outage Caused by Software Glitch, Says SentinelOne

The primary cause of the outage was a software glitch in SentinelOne's infrastructure control system...

Jun 3 Security
Microsoft and CrowdStrike Unite to Link Attackers' Names

Microsoft and CrowdStrike Unite to Link Attackers' Names

According to Adam Meyers, a CrowdStrike expert, the goal is to create a comprehensive system for lin...

Jun 3 Security
US Cloud Services Won't Face Regulatory Hurdles in the Netherlands

US Cloud Services Won't Face Regulatory Hurdles in the Netherlands

Kabinet gaat overheidsgebruik Amerikaanse cloud niet via regels beperken

Jun 3 Security
Spott’s AI-native recruiting platform scores $3.2M to end hiring software chaos

Spott’s AI-native recruiting platform scores $3.2M to end hiring software chaos

Spott’s AI-native recruiting platform scores $3.2M to end hiring software chaos

May 28 Security
Microsoft Aims to Revolutionize Windows Update with Third-Party Software Support

Microsoft Aims to Revolutionize Windows Update with Third-Party Software Support

Angie Chen, a Microsoft representative, explains that the current Windows Update experience can be f...

May 28 Security
Ransomware Attack Hits Customers of Unnamed Managed Service Provider

Ransomware Attack Hits Customers of Unnamed Managed Service Provider

SimpleHelp is a remote access software that allows system administrators to troubleshoot issues with...

May 28 Security
Microsoft Thanks Dutch Intelligence Agencies for Help in Uncovering Laundry Bear Group

Microsoft Thanks Dutch Intelligence Agencies for Help in Uncovering Laundry Bear Group

Microsoft dankt AIVD en MIVD voor onderzoek naar Laundry Bear

May 28 Security
Ransomware Suspect Faces Up to 30 Years in US Prison

Ransomware Suspect Faces Up to 30 Years in US Prison

The attacks, which began in early 2019, involved unauthorized access to numerous networks.

May 28 Security
Beyond single-model AI: How architectural design drives reliable multi-agent orchestration

Beyond single-model AI: How architectural design drives reliable multi-agent orchestration

Beyond single-model AI: How architectural design drives reliable multi-agent orchestration

May 27 Security
Minister to Consider AMS-IX Advice on Separate National Networks

Minister to Consider AMS-IX Advice on Separate National Networks

Separate national networks could provide a solution to the problem of relying on foreign companies f...

May 27 Security
EU Commission Keeps Identity of "Going Dark" Group Secret

EU Commission Keeps Identity of "Going Dark" Group Secret

Brussel houdt identiteit van personen achter 'Going Dark' groep geheim

Jun 6 Security
Cabinet Explores Imposing Sanctions on Laundry Bear Members

Cabinet Explores Imposing Sanctions on Laundry Bear Members

In addition to increasing resilience and international cooperation, the cabinet is exploring the pos...

Jun 6 Security
Google Secures Critical V8 Vulnerability in Chrome

Google Secures Critical V8 Vulnerability in Chrome

V8 is a frequent target for attackers who exploit vulnerabilities without a patch available at the t...

Jun 3 Security
Mozilla Fixes Critical Firefox Flaw That Allows Remote Code Execution

Mozilla Fixes Critical Firefox Flaw That Allows Remote Code Execution

The vulnerability, known as a "double-free" bug, occurs when the libvpx encoder is used to process W...

May 28 Security
Data Leak at Dutch Police Caused by Infostealer Malware

Data Leak at Dutch Police Caused by Infostealer Malware

Securitybedrijf: datalek bij politie veroorzaakt door infostealer-malware

May 28 Security
Build a Rocket Boy drops trailer detailing MindsEye’s blend of Grand Theft Auto and AI robot combat

Build a Rocket Boy drops trailer detailing MindsEye’s blend of Grand Theft Auto and AI robot combat

Build a Rocket Boy drops trailer detailing MindsEye’s blend of Grand Theft Auto and AI robot combat

May 28 Security
Terrorism Coordinator NCTV to Resume Internet Monitoring

Terrorism Coordinator NCTV to Resume Internet Monitoring

Terrorismecoördinator NCTV zal vanaf vandaag weer internet monitoren

Jun 4 Security
Ransomware Attack on Royal Dirkzwager: A Bruteforce Breach

Ransomware Attack on Royal Dirkzwager: A Bruteforce Breach

Ransomware-aanval Royal Dirkzwager vond plaats via bruteforce-aanval

Jun 3 Security
The North Face Customers Hit Again by Credential Stuffing Attack

The North Face Customers Hit Again by Credential Stuffing Attack

Credential stuffing is a type of attack where hackers use a combination of stolen login credentials,...

Jun 3 Security
Adobe's Fate on Tracking Cookies Remains Uncertain

Adobe's Fate on Tracking Cookies Remains Uncertain

SDBN is seeking to force Adobe to stop collecting personal data illegally, pay damages to seven mill...

May 28 Security
OpenAI Eyes 'Sign in with ChatGPT' for Other Applications

OpenAI Eyes 'Sign in with ChatGPT' for Other Applications

OpenAI kijkt naar 'inloggen met ChatGPT' voor andere applicaties

May 28 Security
US Privacy Watchdog Warns Government Against Altering Archive Law

US Privacy Watchdog Warns Government Against Altering Archive Law

AP waarschuwt kabinet voor wijziging Archiefwet: heft wettelijke bescherming op

May 28 Security
Geofencing Technology Enhances NL-Alert's Emergency Messaging Capabilities

Geofencing Technology Enhances NL-Alert's Emergency Messaging Capabilities

Originally, NL-Alert was not equipped with this technology.

Jun 8 Security
Microsoft Releases Script to Restore Inetpub Directory on Windows Systems

Microsoft Releases Script to Restore Inetpub Directory on Windows Systems

This vulnerability, known as Windows Process Activation, allows an attacker who already has access t...

Jun 8 Security
Voice AI that actually converts: New TTS model boosts sales 15% for major brands

Voice AI that actually converts: New TTS model boosts sales 15% for major brands

Voice AI that actually converts: New TTS model boosts sales 15% for major brands

Jun 8 Security