Got story updates? Submit your updates here. › A cybersecurity breach exposes the digital vulnerabilities of modern schools, disrupting learning and community.Spring Lake Park Today Spring Lake Park Schools in Minnesota were forced to shut down after a suspected ransomware attack compromised their technology systems. The district’s quick response to shut down systems prevented further...Read More
AI Generated The Federal Bureau of Investigation (FBI) has released its highly anticipated 2025 Internet Crime Report, painting a stark picture of a digital landscape increasingly dominated by sophisticated financial predators. According to the data released by the FBI’s Internet Crime Complaint Center (IC3), total losses from cyber-enabled crime reached a staggering $20.877 billion in...Read More
A hack triggered the large-scale unauthorized minting of Polkadot’s DOT token on the Ethereum network. Hackers reportedly minted about 1 billion DOT tokens on the Ethereum mainnet before selling them on the market. The exact cause and attack route remain unconfirmed, but actual market damage was relatively limited because token liquidity was constrained. Forecast Trend...Read More
The digital revolution has become a vast, unplanned experiment – and children are its most exposed participants. As ADHD diagnoses rise around the world, a key question has emerged: could the growing use of digital devices be playing a role? To explore this, we studied more than 8,000 children, from when they were around ten...Read More
ZeroID is an open-source identity platform that implements an identity and credentialing layer specifically for autonomous agents and multi-agent systems. The attribution problem The core issue ZeroID targets is attribution in agentic workflows. When an orchestrator agent spawns sub-agents to carry out parts of a task, each sub-agent may call APIs, write files, or execute...Read More
One example from my work in which cybersecurity regulations were successfully integrated into a broader system was the implementation of secure access to enterprise data across both corporate-issued and personal devices. In our environment, access to sensitive resources such as work emails, Microsoft Teams, and shared documents was initially restricted to corporate-issued devices to protect...Read More
Under the proposed legislation, anyone under the age of 15 would be barred from using social media, with parents or guardians required to install an app enforcing the restriction across all devices — whether they agree with the reform or not. The ban will come up in parliament during the summer and is expected to...Read More
Got story updates? Submit your updates here. › A sophisticated cyberattack exposes the fragility of digital infrastructure in modern schools.Spring Lake Park Today Spring Lake Park Schools in Minnesota were forced to close on Monday due to a suspected ransomware attack that disrupted the district’s computer systems. Local authorities are investigating the cybersecurity incident, which...Read More
Artificial intelligence (AI) has not only established itself as one of the most disruptive technologies of our time, but also as the driving force reshaping both cybersecurity and cybercrime. This is one of the key findings of the “Security Report 2026”, Check Point Software Technologies’ fourteenth annual analysis of global cyberattack trends . According to the...Read More
Renault UK said affected people would be notified and that victims of the hack may include a wider pool of people who had entered competitions or shared data with the car company, without purchasing a vehicle. The carmaker said the data that had been accessed by the cyber-attack included some or all of: customer names,...Read More