#ai-threats

[ follow ]
Women in technology
fromwww.theguardian.com
19 hours ago

UN warns women in public life face increasingly sophisticated online violence

Women in public life face increasing online violence, exacerbated by AI, anonymity, and lack of accountability, threatening their presence and rights in digital spaces.
#cybersecurity
Information security
fromTNW | Opinion
1 day ago

Why cybersecurity leaders are losing control in the age of AI threats

AI-driven threats are increasing, and effective cybersecurity relies on leadership clarity, AI integration, and workforce awareness.
Information security
fromZDNET
5 days ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
Information security
fromNextgov.com
2 weeks ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
Information security
fromNextgov.com
1 day ago

Why recovery speed matters when the homeland is the cyber battlefield

Cyberattacks are now a constant threat to essential services and military readiness, requiring a shift in defense strategies to anticipate and recover from disruptions.
Information security
fromTNW | Opinion
1 day ago

Why cybersecurity leaders are losing control in the age of AI threats

AI-driven threats are increasing, and effective cybersecurity relies on leadership clarity, AI integration, and workforce awareness.
Information security
fromTheregister
4 days ago

Cybersecurity professional getting more work and less pay

Cybersecurity professionals faced significant pay stagnation in 2025, with 77% in the UK receiving no salary increase despite high demand for their roles.
Information security
fromZDNET
5 days ago

Nearly half of cybersecurity pros want to quit - here's why

There's a significant mismatch between demand and rewards in cybersecurity, leading to dissatisfaction among professionals.
Information security
fromNextgov.com
2 weeks ago

Expect more cybersecurity executive orders soon, national cyber director says

President Trump is expected to sign more cybersecurity executive orders soon, following the release of the national cyber strategy.
fromSecurityWeek
1 week ago

Cloudsmith Raises $72 Million in Series C Funding

AI agents generate so much software, so fast, it's nearly impossible for humans to carefully review it all. Cloudsmith has the scale and the broad view across the open-source ecosystem to protect enterprises against the new kinds of threats that AI-driven development introduces.
Venture
fromEngadget
1 week ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
SOMA, SF
fromTheregister
2 weeks ago

OpenAI CEO Sam Altman home attack suspect charged

Daniel Moreno-Gama faces attempted murder charges for attacking Sam Altman's home and threatening OpenAI's headquarters.
#openai
fromwww.bbc.com
2 weeks ago
Silicon Valley

OpenAI boss Sam Altman's home targeted with Molotov cocktail

A man was arrested for throwing a Molotov cocktail at OpenAI CEO Sam Altman's home and making threats at the company's headquarters.
Silicon Valley
fromwww.bbc.com
2 weeks ago

OpenAI boss Sam Altman's home targeted with Molotov cocktail

A man was arrested for throwing a Molotov cocktail at OpenAI CEO Sam Altman's home and making threats at the company's headquarters.
Digital life
fromHackernoon
2 years ago

The HackerNoon Newsletter: Can AI Save Centuries of Kurdish History? (8/19/2025) | HackerNoon

Digital identity crisis is a significant concern for technological infrastructure.
Building a Go dependency scanner involves parsing and vulnerability analysis.
Agentic workflow efficiency can be improved through optimization techniques.
Preserving Kurdish heritage involves digitizing fragile archives using OCR technology.
Film
fromwww.theguardian.com
8 months ago

Spike Lee's Highest 2 Lowest rages against the new but leaves him looking too old

Spike Lee collaborates with Denzel Washington in Highest 2 Lowest, blending storytelling traditions with contemporary themes of artistry and artificial intelligence.
Mobile UX
fromCsrwire
10 months ago

6G Foundry: Securing the Future of Mobile Connectivity

Security enhancements for 6G are essential to create a resilient mobile ecosystem against evolving cyber threats.
fromwww.theguardian.com
10 months ago

Spy ships, cyber-attacks and shadow fleets: the crack security team braced for trouble at sea

In an unstable world, shipping, ports and terminals are taking on enormous strategic importance as targets for destabilising infrastructure and espionage.
UK news
Marketing tech
fromAol
10 months ago

Should You Buy the Dip on Reddit Stock?

Reddit's shares fell 25% in 2025 amid mixed Wall Street sentiment due to AI search threats from Google.
Startup companies
fromAol
11 months ago

A Once-in-a-Decade Opportunity: Here's Why I'm Buying Alphabet Stock Like There's No Tomorrow

Investors should not overlook Alphabet's undervalued stock, despite concerns over AI, economic issues, and government challenges.
Information security
fromSecuritymagazine
11 months ago

Research Tracked 1 Malicious Email Every 42 Seconds in 2024

Phishing threats are evolving rapidly, outpacing security teams' responses.
Email scams and sophisticated malware attacks are on the rise, posing significant challenges for cybersecurity.
Arts
fromTheartnewspaper
1 year ago

The key takeaways from the Abu Dhabi Culture Summit

The arts face significant challenges due to global shifts, climate crises, and AI advancements, as discussed at the Culture Summit Abu Dhabi.
fromLondon Business News | Londonlovesbusiness.com
1 year ago

What steps should business owners take to mitigate security risks? - London Business News | Londonlovesbusiness.com

If security protocols do not mature alongside those changes, new vulnerabilities will surface, especially as cybercriminals develop more advanced AI-powered tactics.
Information security
[ Load more ]