Advertisement

Cybersecurity

WASHINGTON, DC – DECEMBER 03: (L-R) Chairman Sen. Ted Cruz (R-TX) and Ranking member Sen. Maria Cantwell (D-WA) arrive for a hearing with the Senate Commerce, Science and Transportation Committee in the Russell Senate Office Building on Capitol Hill on December 3, 2025 in Washington, DC. Senator Maria Cantwell, D-Wash., wants hearings to force AT&T and Verizon to disclose how they’ve responded to the hacks to protect telecom networks. (Photo by Anna Moneymaker/Getty Images)

Cantwell claims telecoms blocked release of Salt Typhoon report 

Senator Maria Cantwell, D-Wash., wants hearings to force AT&T and Verizon to disclose how they’ve responded to the hacks to protect telecom networks.
n this photo illustration, the video streaming apps Netflix, Amazon Prime Video, Disney Plus, Paramount Plus, Max and Discovery Plus seen displayed on a smartphone. The Department of Justice took down IPTV sites that were illegally streaming content from the apps. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)

DOJ seizes piracy sites, Italian police dismantle illegal IPTV operation

Officials took down three U.S.-registered domains that distributed copyrighted content and received tens of millions of visits a year.
Advertisement
Activist group ‘Everyone Hates Elon’ anti-Musk and X poster placed in a bus stop on the 14th of January 2026, London, United Kingdom. The poster is a reference to the highly controversial new AI tool on X called Grok which can undress pictures of people on command, which this poster suggests enables it as a tool for child abuse. (photo by Kristian Buus/In Pictures via Getty Images)

Undressed victims file class action lawsuit against xAI for Grok deepfakes

The lawsuit accuses xAI seeking to “capitalize on the internet’s seemingly insatiable appetite for humiliating non-consensual sexual images.” 
The interior of the IBM Quantum System Two is seen at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be updated. (Photo by ANGELA WEISS / AFP) (Photo by ANGELA WEISS/AFP via Getty Images)

CISA publishes a post-quantum shopping list for agencies. Security professionals aren’t sold

A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be…
Advertisement
Advertisement