CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Coinbase crypto exchange on screen showing data breach
Cyber SecurityNews

Coinbase Crypto Exchange Reports Losses of Up to $400 Million After Data Breach

Google sign above entrance showing consumer privacy settlement in Texas

Texas AG’s Consumer Privacy Settlement With Google Will Cost Company $1.375 Billion

Aerial view of factory showing hackers cyber attack on critical infrastructure

CISA Warns About Unsophisticated Hackers Compromising U.S. Critical Infrastructure

Access granted screen on monitor showing data breach

Education Giant Pearson Confirms Customer Data Breach After Cyber Attack

Mechanical bug on keyboard showing vulnerability database

EU Launches Government-Backed Vulnerability Database as CVE Alternative

Stack of golden Monero coins showing ban on privacy coins and anonymous crypto accounts
Data PrivacyNews

EU Looks to Ban Privacy Coins and Anonymous Crypto Accounts by 2027

Keyboard with dollar bill showing ransom payment and cyber extortion
Cyber SecurityNews

PowerSchool Confirms Ongoing Cyber Extortion of Individual Schools Despite Ransom Payment

Keyboard with red backlight showing LockBit ransomware data breach
Cyber SecurityNews

LockBit Ransomware Suffers Its Own Data Breach, Internal Conversations With Victims Leaked

Data Privacy

Google logo on screen showing Privacy Sandbox and third-party cookies
Data PrivacyNews

Google Seemingly Surrenders on Third Party Cookies, Even As Privacy Sandbox Project Rolls On

DNA molecule in glass tube showing privacy concerns

Consumers Left With Serious Privacy Concerns as 23andMe Files for Bankruptcy

Fingerprint scan on device showing biometrics and personal information

Biometrics and Data Privacy: How Businesses Can Secure Personal Information

Apple store showing backdoor and end-to-end encryption for iCloud data

iCloud End-to-End Encryption No Longer Available in UK After Secret Backdoor Order

Google Chrome app on screen showing Google rules for device fingerprinting

As Chrome Finally Finishes Off Tracking Cookies, Google Rules Are Amended to Bring Back Device Fingerprinting

iCloud website showing backdoor to iCloud data

UK Once Again Calling for Backdoor Into iCloud Data With Secret Order

Capitol building at night showing privacy concerns over access to federal data

DOGE’s Blitzkrieg Through National Government Raising Privacy Concerns Over Access to Federal Data

Digital data flows showing privacy board and disruption to EU-US data transfers

Trump Removal of Privacy Board Members Could Throw EU-US Data Transfers Back Into Chaos

Flying envelopes showing LinkedIn training AI models with private messages

Lawsuit Accusing LinkedIn of Training AI Models With InMail Private Messages Dismissed

Data Protection

TikTok logo on smartphone showing data transfers of EU data
Data ProtectionNews

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Digital brain on screen showing Irish DPC investigation of AI training data

X Faces Investigation in Ireland Over Collection of AI Training Data

Screen with NHS services logo showing UK ICO fine for ransomware attack

UK Data Regulator Fines NHS Services Software Provider Over $3 Million for 2022 Ransomware Attack

Apple Store showing antitrust fine for app tracking privacy tool

150 Million Euro Antitrust Fine for Apple Over App Tracking Tool

Lock and data showing AI regulations

OpenAI Invokes Chinese Competition in Call for Lighter AI Regulations

Hammer on U.S. flag showing DOGE access to federal data

Judge Grants DOGE More Time to Pore Through Federal Data

Gavel on laptop keyboard showing AI Act

The Colorado AI Act Shuffle: One Step Forward, Two Steps Back

Data moving in digital space showing federal data in AI software

Inside Sources Accuse DOGE Team of Feeding Federal Data Into AI Software

Google play store app on screen showing data protection authority ban from app stores

Deepseek Disappears From App Stores in Italy as Data Protection Authority Investigates

Cyber Security

Mobile phone and lock icons showing messaging app security breach
Cyber SecurityNews

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Unlocked digital lock showing cyber attack on UK retailer

Harrods Hit in Third Cyber Attack Targeting a UK Retailer

Fingerprint on device showing passwordless for Microsoft accounts

Microsoft Makes All New Accounts Passwordless As of May 1, Pushes Biometric Passkeys

Man using smartphone showing zero click spyware

The Growing Threat of Zero-Click Spyware: Why Organizations Must Rethink Smartphone Security

Power lines in field showing power utilities cyber attacks

Cyber Attacks Hit Canadian Power Utilities Emera and Nova Scotia Disrupting Business Applications

Hand using smartphone showing SaaS models and third-party security

JPMorgan Chase CISO Warns Security of SaaS Models is Unsustainable, Third-Party Security Must Improve to Prevent Catastrophe

ChatGPT on smartphone showing prompt injection attack on AI models

HiddenLayer Prompt Injection Attack Able to Break the Guardrails of All Major AI Models

Latest News

Stethoscope showing ransomware attack on dialysis company
Cyber SecurityNews

Ransomware Attack on Dialysis Company DaVita Disrupts Operations and Exposes Sensitive Patient Data

Downtown skyline Of Seoul, South Korea showing malware attack on telecom exposing USIM data

SK Telecom Warns Subscribers of Sensitive USIM Data Leak After a Successful Malware Attack

Red skull and bones showing zero-day exploits and spyware

Google Threat Intelligence: 75 Zero-Days Exploited in 2024, Majority Linked to Spyware

Open digital padlock showing ransomware cyber incident

Marks & Spencer’s Apparent Ransomware Cyber Incident Disrupts Order Collections and Contactless Payments

Doctor in front of laptop showing health insurance provider health data breach

Health Insurance Provider Blue Shield of California Discloses Accidental Sharing of Customer Health Data Via Google Analytics

Hacker in hoodie showing DBIR report on cyber attacks

2025 Verizon DBIR: Cyber Attacks Increasingly Driven by Vulnerability Exploitation, VPNs and Edge Devices Heavily Targeted

Digital data showing Oracle Cloud credential leak

CISA Warns About Heightened Security Risks from the Alleged Oracle Cloud Credential Leak

NASCAR race showing data breach by ransomware gang

Medusa Ransomware Gang Claims NASCAR Data Breach Leaking Over 1 Terabyte of Sensitive Information

Traffic jam in evening showing data breach of file sharing platform

Hertz Confirms Data Breach from Cleo Managed File Sharing Platform Zero-Day Vulnerabilities

Latest Insights

Cyber SecurityInsights

When IT Becomes the Threat: 58% of All ICS/OT Breaches Tied to IT Compromise

Digital shield showing security perimeter

Identity Changed, the World Remained: Why Businesses Must Change Assumptions about the Security Perimeter

Hammer on US flag showing false claims of cybersecurity requirements

DOJ Continues Cybersecurity False Claims Act Enforcement in New Administration

Digital hook showing phishing and social engineering attacks

Applying Behavioral Economics to Phishing and Social Engineering Attacks

Cyberspace and digital data showing data governance

How to Resolve Data Governance Challenges

Disk storage in data center showing data destruction

5 Steps to Smarter Data Destruction

Digital brain showing AI challenges

Overcoming Key Challenges in an AI-Centric Future

Outlines of human brain showing cybersecurity, privacy and AI

Navigating Privacy, Cybersecurity, and the Future of AI

Businessman with laptop and phone showing biometrics and identity verification

Proper ID Verification Requires Ethical Technology

Recent Posts

Coinbase crypto exchange on screen showing data breach

Coinbase Crypto Exchange Reports Losses of Up to $400 Million After Data Breach

Google sign above entrance showing consumer privacy settlement in Texas

Texas AG’s Consumer Privacy Settlement With Google Will Cost Company $1.375 Billion

Aerial view of factory showing hackers cyber attack on critical infrastructure

CISA Warns About Unsophisticated Hackers Compromising U.S. Critical Infrastructure

Access granted screen on monitor showing data breach

Education Giant Pearson Confirms Customer Data Breach After Cyber Attack

Mechanical bug on keyboard showing vulnerability database

EU Launches Government-Backed Vulnerability Database as CVE Alternative

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results