You’re so ugly it hurts. Maybe if you lost some weight, someone would actually like you. No filter can fix that face. These are the sorts of comments teenage girls see online daily, via social media, group chats, or anonymous messages. While some may dismiss this as teasing, these comments constitute appearance-related cyberbullying. Our previous...
Read More
Senator Elizabeth Warren has sent a letter to the U.S. Department of Commerce demanding clarification on the scope and status of a national security review of Bitmain, the Beijing-headquartered company that manufactures the majority of Bitcoin mining hardware used worldwide. Warren’s Letter Targets Commerce Department Over Bitmain Probe The letter requests transparency on an ongoing...
Read More
North Korea’s Lazarus Group appears to have added another tool to its kit. It has begun using Medusa ransomware in extortion attacks targeting at least one US healthcare organization and an unnamed victim in the Middle East, according to Symantec and Carbon Black threat hunters. The US healthcare attempt failed, while the Middle East organization...
Read More
Lori Schott, center, is embraced as she holds up a photo of her daughter Annalee Schott, after the verdict in a landmark trial over whether social media platforms deliberately addict and harm children at Los Angeles Superior Court on Wednesday in Los Angeles. William Liang/AP Photo The dual verdicts signal a changing tide of public...
Read More
The Onslow County Sheriff’s Office assisted in a multi-county undercover operation based in Nashville that led to the arrest of 16 people accused of attempting to prey on children online. The four-day operation took place in February and involved more than 150 officers from 13 law enforcement agencies, according to the N.C. State Bureau of...
Read More
Business email compromise (BEC), often linked to funds transfer fraud, remains a frequent driver of cyber insurance claims. Attack methods are increasingly tied to social engineering using synthetic identities, deepfakes, and AI-generated content. Industry participants, including insurers such as Coalition and Beazley, have pointed to deepfakes as an emerging factor in social engineering risk, with...
Read More
On the consumer side, Bitdefender Ultimate Security is the top-of-the-line, but it’s divided into three tiers. At the basic tier, it adds Bitdefender Digital Identity Protection to all the features included with Premium Security, along with dark web monitoring and digital footprint visualization. It’s only at the Ultimate Plus tier that you get full-on identity theft monitoring...
Read More
A bipartisan bill that would allow schools to create a firearms safety class/hunter safety class has been passed by the Senate.  Michigan House Bill 4285 unanimously passed the Michigan Senate on Thursday, Dec. 18, completing its trip through the Michigan Legislature and will now go to Gov. Gretchen Whitmer’s desk to be signed into law....
Read More
We are discontinuing the dark web report, which was meant to scan the dark web for your personal information. It will stop monitoring for new results on January 15, 2026 and its data will no longer be available from February 16, 2026. While the report offered general information, feedback showed that it did not provide...
Read More
Frontier AI models are no longer merely helping engineers write code faster or automate routine tasks. They are increasingly capable of spotting their mistakes. Anthropic says its newest model, Claude Opus 4.6, excels at discovering the kinds of software weaknesses that underpin major cyberattacks. According to a report from the company’s Frontier Red Team, during...
Read More
1 25 26 27 28 29 35
National Cyber Security

FREE
VIEW