CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Keyboard with dollar bill showing ransom payment and cyber extortion
Cyber SecurityNews

PowerSchool Confirms Ongoing Cyber Extortion of Individual Schools Despite Ransom Payment

Keyboard with red backlight showing LockBit ransomware data breach

LockBit Ransomware Suffers Its Own Data Breach, Internal Conversations With Victims Leaked

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack
Cyber SecurityNews

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Unlocked digital lock showing cyber attack on UK retailer
Cyber SecurityNews

Harrods Hit in Third Cyber Attack Targeting a UK Retailer

Fingerprint on device showing passwordless for Microsoft accounts
Cyber SecurityNews

Microsoft Makes All New Accounts Passwordless As of May 1, Pushes Biometric Passkeys

Data Privacy

Google logo on screen showing Privacy Sandbox and third-party cookies
Data PrivacyNews

Google Seemingly Surrenders on Third Party Cookies, Even As Privacy Sandbox Project Rolls On

DNA molecule in glass tube showing privacy concerns

Consumers Left With Serious Privacy Concerns as 23andMe Files for Bankruptcy

Fingerprint scan on device showing biometrics and personal information

Biometrics and Data Privacy: How Businesses Can Secure Personal Information

Apple store showing backdoor and end-to-end encryption for iCloud data

iCloud End-to-End Encryption No Longer Available in UK After Secret Backdoor Order

Google Chrome app on screen showing Google rules for device fingerprinting

As Chrome Finally Finishes Off Tracking Cookies, Google Rules Are Amended to Bring Back Device Fingerprinting

iCloud website showing backdoor to iCloud data

UK Once Again Calling for Backdoor Into iCloud Data With Secret Order

Capitol building at night showing privacy concerns over access to federal data

DOGE’s Blitzkrieg Through National Government Raising Privacy Concerns Over Access to Federal Data

Digital data flows showing privacy board and disruption to EU-US data transfers

Trump Removal of Privacy Board Members Could Throw EU-US Data Transfers Back Into Chaos

Flying envelopes showing LinkedIn training AI models with private messages

Lawsuit Accusing LinkedIn of Training AI Models With InMail Private Messages Dismissed

Data Protection

Digital brain on screen showing Irish DPC investigation of AI training data
Data ProtectionNews

X Faces Investigation in Ireland Over Collection of AI Training Data

Screen with NHS services logo showing UK ICO fine for ransomware attack

UK Data Regulator Fines NHS Services Software Provider Over $3 Million for 2022 Ransomware Attack

Apple Store showing antitrust fine for app tracking privacy tool

150 Million Euro Antitrust Fine for Apple Over App Tracking Tool

Lock and data showing AI regulations

OpenAI Invokes Chinese Competition in Call for Lighter AI Regulations

Hammer on U.S. flag showing DOGE access to federal data

Judge Grants DOGE More Time to Pore Through Federal Data

Gavel on laptop keyboard showing AI Act

The Colorado AI Act Shuffle: One Step Forward, Two Steps Back

Data moving in digital space showing federal data in AI software

Inside Sources Accuse DOGE Team of Feeding Federal Data Into AI Software

Google play store app on screen showing data protection authority ban from app stores

Deepseek Disappears From App Stores in Italy as Data Protection Authority Investigates

Meta logo on smartphone showing ad-free service and EU regulations

EU Regulations Trip Up Meta’s Ad-Free Service Plans Once Again

Cyber Security

Man using smartphone showing zero click spyware
Cyber SecurityInsights

The Growing Threat of Zero-Click Spyware: Why Organizations Must Rethink Smartphone Security

Power lines in field showing power utilities cyber attacks

Cyber Attacks Hit Canadian Power Utilities Emera and Nova Scotia Disrupting Business Applications

Hand using smartphone showing SaaS models and third-party security

JPMorgan Chase CISO Warns Security of SaaS Models is Unsustainable, Third-Party Security Must Improve to Prevent Catastrophe

ChatGPT on smartphone showing prompt injection attack on AI models

HiddenLayer Prompt Injection Attack Able to Break the Guardrails of All Major AI Models

Stethoscope showing ransomware attack on dialysis company

Ransomware Attack on Dialysis Company DaVita Disrupts Operations and Exposes Sensitive Patient Data

Medicine doctor working showing cyber defenses in healthcare

Fortifying Cyber Defenses in the Healthcare Industry Through Live Patching

Downtown skyline Of Seoul, South Korea showing malware attack on telecom exposing USIM data

SK Telecom Warns Subscribers of Sensitive USIM Data Leak After a Successful Malware Attack

Red skull and bones showing zero-day exploits and spyware

Google Threat Intelligence: 75 Zero-Days Exploited in 2024, Majority Linked to Spyware

Open digital padlock showing ransomware cyber incident

Marks & Spencer’s Apparent Ransomware Cyber Incident Disrupts Order Collections and Contactless Payments

Latest News

Doctor in front of laptop showing health insurance provider health data breach
Cyber SecurityNews

Health Insurance Provider Blue Shield of California Discloses Accidental Sharing of Customer Health Data Via Google Analytics

Hacker in hoodie showing DBIR report on cyber attacks

2025 Verizon DBIR: Cyber Attacks Increasingly Driven by Vulnerability Exploitation, VPNs and Edge Devices Heavily Targeted

Digital data showing Oracle Cloud credential leak

CISA Warns About Heightened Security Risks from the Alleged Oracle Cloud Credential Leak

NASCAR race showing data breach by ransomware gang

Medusa Ransomware Gang Claims NASCAR Data Breach Leaking Over 1 Terabyte of Sensitive Information

Traffic jam in evening showing data breach of file sharing platform

Hertz Confirms Data Breach from Cleo Managed File Sharing Platform Zero-Day Vulnerabilities

Hammer on US flag showing cybersecurity law

Extension to Federal Information Sharing Cybersecurity Law Introduced Ahead of September Expiration Date

China flag and server hardware showing cyber attacks on US critical infrastructure

WSJ: China Admitted to Volt Typhoon Cyber Attacks in Secret Meeting

Alert on screen showing ransomware attack

Sensor-Rich Technology Giant Sensata Suffers a Ransomware Attack that Disrupted Various Operations

Hands typing on keyboard showing health data breach

Planned Parenthood Lab Services Provider LSC Leaks Extensive Health Data of 1.6 Million People

Latest Insights

Digital shield showing security perimeter
Cyber SecurityInsights

Identity Changed, the World Remained: Why Businesses Must Change Assumptions about the Security Perimeter

Hammer on US flag showing false claims of cybersecurity requirements

DOJ Continues Cybersecurity False Claims Act Enforcement in New Administration

Digital hook showing phishing and social engineering attacks

Applying Behavioral Economics to Phishing and Social Engineering Attacks

Cyberspace and digital data showing data governance

How to Resolve Data Governance Challenges

Disk storage in data center showing data destruction

5 Steps to Smarter Data Destruction

Digital brain showing AI challenges

Overcoming Key Challenges in an AI-Centric Future

Outlines of human brain showing cybersecurity, privacy and AI

Navigating Privacy, Cybersecurity, and the Future of AI

Businessman with laptop and phone showing biometrics and identity verification

Proper ID Verification Requires Ethical Technology

Virtual lock and shield showing data security and cyber security

Data Security vs. Cyber Security – Why the Difference Matters

Recent Posts

Keyboard with dollar bill showing ransom payment and cyber extortion

PowerSchool Confirms Ongoing Cyber Extortion of Individual Schools Despite Ransom Payment

Keyboard with red backlight showing LockBit ransomware data breach

LockBit Ransomware Suffers Its Own Data Breach, Internal Conversations With Victims Leaked

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results