Most Recent Articles
McHire.com – McDonald’s Hiring Chatbot – Leaked Data on 64 Million Job Applicants
Hiring platform McHire.com, used by fast food giant McDonald’s, has exposed information on more than 64 million job applicants, according to security researchers.
It turns out that not every chatbot is created equal – some are less good than others, …
Bitcoin Depot Data Breach Exposes Personal Info of Nearly 27,000 Customers
Bitcoin Depot, one of the largest bitcoin ATM operators in the United States, is notifying customers that a data breach that exposed their personal information collected during cryptocurrency transactions.
According to a notice sent to impacted indivi…
What’s Next in IoT Policy and Regulation in 2025
With Internet of Things (IoT) devices in nearly every home, regulators worldwide are stepping up to enforce meaningful cybersecurity standards.
The need for regulators in the IoT field
From smart fridges to voice-activated assistants and internet-co…
Hackers Meet Brazilian IT Tech Outside Bar, Persuade Him to Help $100 Million Heist
Hackers have stolen $100 million from Brazil’s banking system by allegedly exploiting a single IT employee at C&M Software, a company linking financial institutions to the Central Bank’s PIX payment network.
João Nazareno Roque worked as a junior back…
Piggybacking Explained: How Cybercriminals and Fraudsters Ride on Your Access—Physically, Digitally, and Financially
Not all cyber-related threats take the form of complex malware or sophisticated phishing attacks. Some of the sneakiest attacks are surprisingly simple–a crook just exploits your legitimate access, resources or reputation. In the cybersecurity industr…
Cybersecurity for Nonprofits: Why Hackers Target You and What to Do About It
Nonprofits do incredible work—from feeding families to fighting injustice. But behind all that heart and effort is something hackers are very interested in: data.
It doesn’t matter that your mission isn’t about making money. If your organization colle…
Deepfakes Are the New Bullying. How to Protect Your Daughter from Online Abuse
Whether she’s sharing selfies with her friends or building her future online, your daughter is growing up in a very different world than the one you knew. The internet offers her freedom, connection, and creativity—but it also exposes her to new and de…
Eight Dangerous Firefox Add-ons Found in Official Repository
Security researchers have discovered an extensive network of malicious Firefox extensions that used the names of tools and known games to trick users into downloading them.
It’s one thing to download a browser add-on from a shady corner of the Interne…