Twitter sues hate-speech watchdog, following through on its litigation threat
Twitter has sued the Center for Countering Digital Hate (CCDH), a nonprofit group that has criticized the company's handling of hate speech, following through on a litigation threat that had been publicly revealed just hours before......»»
CDK Global to pay $100 million to settle dealership antitrust suit
The proposed settlement, which requires a judge's approval, avoids a planned September trial. It does not affect other pending litigation against CDK......»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
This new threat proves that Macs aren’t immune from malware
The latest malware threat for Mac users targets popular browsers that you could be using this very instant. Which ones are affected?.....»»
During a heat wave, temperatures not the only threat: expert
Spain has just emerged from a 21-day heat wave that engulfed Madrid, Barcelona and Zaragoza, posing a health threat which extends far beyond the actual temperature, according to Julio Diaz, a researcher at Madrid's Carlos III Health Institute......»»
Pindrop Pulse Inspect analyzes and verifies whether media files contain synthetic speech
Pindrop launched Pindrop Pulse Inspect in Preview. This innovative tool, the latest addition to Pindrop’s deepfake detection Pindrop Pulse product family, can detect AI-generated speech in any digital audio file with 99% accuracy. Following the.....»»
Google’s threat team confirms Iran targeting Trump, Biden, and Harris campaigns
Another Big Tech firm seems to confirm Trump adviser Roger Stone was hacked. Enlarge / Roger Stone, former adviser to Donald Trump's presidential campaign, center, during the Republican National Convention (RNC) in Milwaukee on J.....»»
Musk’s new Grok upgrade allows X users to create largely uncensored AI images
With Grok's new AI image generator, X users put Musk's "freedom of speech" to the test. Enlarge / An AI-generated image of Donald Trump and catgirls created with Grok, which uses the Flux image synthesis model. (credit: BEAST / X.....»»
Teacup teaser: Yvonne Strahovski faces deadly threat in Peacock’s sci-fi horror series
Something terrifying is lurking in the new teaser for Teacup, Peacock's sci-fi horror series arriving this fall......»»
Texas sues GM for allegedly violating drivers" privacy
Texas Attorney General Ken Paxton said Tuesday's lawsuit arose from a probe announced in June into whether several automakers collected and sold mass amounts of data without drivers' knowledge......»»
Breaking down online shopping"s silent threat
Breaking down online shopping"s silent threat.....»»
IntelOwl: Open-source threat intelligence management
IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a.....»»
Current attacks, targets, and other threat landscape trends
In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. Whil.....»»
Ex-Twitter staffer wins $600K over Musk’s click-yes-or-resign ultimatum
Elon Musk’s 24-hour email ultimatum unfairly dismissed Twitter staff, court says. Enlarge (credit: Craig T Fruchtman / Contributor | Getty Images Entertainment) Elon Musk had no business sending Twitter employees an em.....»»
Slow Horses season 4 trailer: Jackson Lamb and Slough House tackle new threat
Jackson Lamb and his team of rejects are thrust into a new mission in the trailer for Apple TV+'s Slow Horses season 4......»»
"Killer robots" are becoming a real threat in Africa
The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. In April, for example, Al Qaeda's affiliate in the Sahel, Jama'at Nusrat al Isl.....»»
Stratasys sues Bambu Lab over patents used widely by consumer 3D printers
Heated platforms and purge towers are among Stratasys' infringement claims. Enlarge / The Bambu Lab A1, complete with heated build platform. (credit: Bambu Lab) A patent lawsuit filed by one of 3D printing's most establi.....»»
Social media: Disinformation expert offers three safety tips in a time of fake news and dodgy influencers
Social networks have revolutionized the way we communicate, stay informed and share moments of our daily lives. We use platforms like Facebook, Twitter, Instagram and TikTok to keep in touch with our friends and family, share our experiences, keep in.....»»
X (formerly Twitter) now lets you properly sort replies on iPhone
After allowing people to buy their way to the top of the replies section by purchasing an X Premium subscription, the social media platform has now launched a new menu to allow users to sort through replies with more traditional options. more….....»»
Are Taylor Swift concerts still safe after terrorist threat? Experts explain why stadiums can be "soft targets"
Authorities in Austria say they've subverted a planned terrorist attack targeting several of Taylor Swift's Eras Tour concerts in Vienna, shows that would have drawn as many as 200,000 concertgoers to three stadiums......»»
1Password 8 for Mac flaw allows attackers to steal credentials, here’s how to patch it
1Password has shared that its software for Mac has a vulnerability that exposes users to a potentially serious threat. Along with attackers being able to compromise credentials, the flaw can give bad actors access to your account unlock key. more.....»»