The technology industry, home to some of the world’s most sensitive and valuable intellectual property, finds itself increasingly in the crosshairs of international cyber espionage efforts. These clandestine operations frequently target proprietary data that, once stolen, could provide significant military or commercial advantage. China, with its ambition to become self-sufficientContinue Reading

Jack Teixeira, a 21-year-old US Air Force serviceman, has been accused of leaking classified data from the Pentagon and American intelligence agencies. Hundreds of sensitive documents were discovered on the popular gaming platform Discord. The New York Times and investigative reporter Arik Toler revealed Teixeira’s identity, while Vanity Fair interviewedContinue Reading

The North American National Basketball Association (NBA) has issued a warning to its fans about a recent data breach that has resulted in the theft of some personal information. In a statement, the NBA revealed that the data breach affected only those users who have agreed to receive emails fromContinue Reading

Louisiana passed a law that requires websites hosting adult content to require verification of the user’s age before they can access the content. This verification is done by providing a special digitized identity card, which is a more stringent requirement than simply clicking a button to confirm age. The mainContinue Reading

Last week, a hacker called USDoD advertised U.S. Intelligence Feed Portal on breached forum. “InfraGard is a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector for the protection of U.S. Critical Infrastructure. InfraGard connects owners and operators within critical infrastructure to the FBI, toContinue Reading

The U.S. Federal Communications Commission (FCC) announced that they ban telecom and surveillance equipment from Chinese companies Huawei, ZTE, Hytera, Hikvision, and Dahua due to national security threat. “The FCC is committed to protecting our national security by ensuring that untrustworthy communications equipment is not authorized for use within ourContinue Reading