radar

ONE Sentinel

article

All Articles

ALL TIME

Browse all curated articles across categories

74 articles
security

Samsung TVs to stop collecting Texans’ data without express consent

Samsung Settles with Texas Over Smart TV Data Collection Practices

Bleeping ComputerTHREATS28d
security

Microsoft testing Windows 11 batch file security improvements

Microsoft Enhances Windows 11 Security for Batch Files

Bleeping ComputerTHREATS30d
security

Third-Party Patching and the Business Footprint We All Share

The Hidden Risks of Third-Party Software and the Importance of Patching

Bleeping ComputerTHREATS1 month
security

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Meta Targets Global Advertisers in Legal Crackdown on Scams

The Hacker NewsTHREATS1 month
security

Threat modeling AI applications

Enhancing AI Security Through Threat Modeling

Microsoft Security BlogM3651 month
security

Olympique Marseille confirms 'attempted' cyberattack after data leak

Olympique Marseille Faces Cyberattack Amid Data Leak Concerns

Bleeping ComputerTHREATS1 month
security

New York sues Valve for promoting illegal gambling via game loot boxes

New York Sues Valve Over Alleged Illegal Gambling via Game Loot Boxes

Bleeping ComputerTHREATS1 month
security

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Broken Triage Processes: A Hidden Risk to Business Security

The Hacker NewsTHREATS1 month
security

The OpenClaw Hype: Analysis of Chatter from Open-Source Deep and Dark Web

OpenClaw: More Hype Than Threat in Cybersecurity Circles

Bleeping ComputerTHREATS1 month
security

Illinois Law Trumps Meta’s California Choice-of-Law Provision in BIPA Class Action

Illinois Law Overrides Meta's Legal Strategy in BIPA Case

DLA Piper Privacy MattersCOMPLIANCE1 month
security

Microsoft adds Copilot data controls to all storage locations

Microsoft Enhances Copilot DLP Controls Across All Storage Locations

Bleeping ComputerTHREATS1 month
security

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

Rethinking Identity Risk: Beyond Traditional IT Ticket Prioritization

The Hacker NewsTHREATS1 month