The DeepSeek-V3 chat platform temporarily suspended new registrations in response to the cyber attack. The Chinese AI company grabbed headlines in January when assorted benchmark tests put it on par with the leading generative AI apps.
T-Mobile has begun notifying 37 million prepaid and post subscribers whose personal information was accessed by unauthorized bad actors in an unsecured API data breach.
Montana's TikTok ban is the first of its kind to become law if it survives the inevitable legal challenges. A group of content creators is already challenging the ban in court, claiming First Amendment violations and overreach by the state in invoking national security powers.
The Inc Ransom cyber gang has published part of NHS Scotland's stolen data and threatened to release the entire trove of 3 terabytes online unless a ransom is paid.
Okta Support System Compromised by Cookie Hijacking, Security Breach May Have Exposed Customer Files
Attackers were able to steal a session cookie from the Okta support system and access an administrator account, possibly providing them with further access to customer environments in an early October security breach.
The threat of cyber attacks on connected cars is getting very real as report shows majority of new smart vehicles from top 10 auto manufacturers are vulnerable and will be connected to Internet.
Fortinet warned customers to immediately patch an authentication bypass critical vulnerability in FortiSwitch Manager, FortiGate, and FortiProxy which are being actively exploited in the wild.
Chicago based meal kit service Home Chef suffered a data breach likely to be orchestrated by hacking group Shiny Hunters which resulted in over 8 million user records being sold on dark web marketplace.
Study shows effects of phishing awareness training starts to wear off after four months and many employees will have lost what they learned almost entirely after six months.
Proposed EU Cyber Resilience Act includes a vulnerability disclosure requirement that would have all manufacturers report to the government within 24 hours of first discovered exploitation. In most cases, this would mean disclosing before the vulnerability has been mitigated.