A surge in artificial intelligence (AI), generative AI (GenAI), and machine learning (ML) technologies is creating a massive online appetite for data. These tools are hungry for training data, this has boosted AI web scraping, which sits in a legal gray zone. Sometimes it's legal, sometimes it's not, but what's clear is that it's having ripple effects across online businesses.
We talked to Nick Rieniets, field CTO of Kasada, to learn more about the impact of web scraping and what companies can do to protect their content.
After a period of intense public and political debate, Australia has approved laws that will ban anyone under the age of 16 from using social media.
While the laws were passed yesterday, it may well be a year until they come into effect -- and they will be the strictest in the world. Once in force, tech companies such as Meta could be hit with fines of up to AUS$50 million (US $32.5 million) for failing to comply.
Cyber threats are becoming more complex and it can be difficult for defenders to see the big picture and make decisions accordingly.
Now though help is at hand as ImmuniWeb is launching a free online tool making historical data on the security of internet-accessible resources available to the global cybersecurity community, educational institutions, government agencies, and even individual researchers.
A new report finds that 75 percent of the 100 most visited websites in the US and Europe are not compliant with current privacy regulations.
The study from privacy solution provider Privado.ai shows despite stricter privacy enforcement in Europe a surprising 74 percent of top websites do not honor opt-in consent as required by Europe's General Data Protection Regulation (GDPR).
According to a new report, 80 percent of registered web domains that resemble a Global 2000 brand do not actually belong to that brand.
The report from enterprise-class domain registrar CSC shows that of the homoglyph (look-alike fake) domains owned by third parties other than the Global 2000 brand owners, 42 percent have MX records (email exchange records) compared with 40 percent in 2023. These MX records can be used to send phishing emails or to intercept email.
A new survey of over 7,000 individuals suggests a growing wave of pessimism among workers regarding cybersecurity practices.
The study from CybSafe and the National Cybersecurity Alliance shows 53 percent believe staying safe online is possible, down by five percent from last year, while only 60 percent think online safety is worth the effort, marking a nine percent drop.
It was 175 years ago that Italian inventor Antonio Meucci came up with the technology that would later be improved and popularized by Alexander Graham Bell to become the telephone.
New research from cloud communications company Sinch finds that newer technologies are starting to change how we communicate -- particularly with businesses -- offering richer, more interactive, and personalized experiences.
It's a pretty fair bet that if you asked most people they would skeptical about the effects of social media on well-being. However, new research from the Saïd Business School at the University of Oxford suggests there are positive benefits of social media usage on adults' mental health.
Academics conducted a six-month study of 1029 adults, with participants' daily time using social platforms on their Android mobile device unobtrusively tracked and their well-being measured every two weeks.
According to Gartner, 60 percent of organizations work with over 1,000 third parties, and a new report shows many of these supply misconfigured or vulnerable hardware and software, putting customers at risk.
The study from CyCognito finds web server environments, including platforms like Apache, NGINX, Microsoft IIS, and Google Web Server, were the host of 34 percent of all severe issues across surveyed assets. They accounted for more severe issues than 54 other environments combined (out of 60 environments surveyed),
More than 65 percent of websites are unprotected against simple bot attacks and 95 percent of advanced bot attacks go undetected on websites.
A new report from DataDome reveals that eCommerce and luxury goods sites are at greatest risk. Just five percent of luxury brand websites and 10 percent of eCommerce websites are fully protected against bad bots.
A new zero-trust stealth mode browser is being launched by SlashNext, designed to see through obfuscation techniques commonly used by threat actors, and deliver enhanced protection against phishing and malware.
In recent years, well-intentioned companies offering free services such as CAPTCHA solutions and content delivery networks have inadvertently aided threat actors. For example, Cloudflare's Turnstile Services and similar CAPTCHA solutions are commonly exploited as obfuscation techniques. CAPTCHAs are used to block the crawlers employed by security services from accessing and analyzing phishing sites.
Changing your broadband service provider has always been a hassle. Usually it takes around 10 days, not to mention that you have to put up with phone calls and emails from your old supplier offering you better deals and pleading with you not to go.
For people in the UK, however, things are about to get a whole lot simpler. The One Touch Switching Company (TOTSCo) is a non-profit organization that has set up a messaging platform called the TOTSCo Hub.
Recent attacks have highlighted the vulnerability of industrial control systems to attack and a new report has found 18,000 exposed devices that are likely used to control industrial systems.
The report, from internet intelligence platform Censys, focuses on ICS devices in the US and UK and also finds that almost 50 percent of the human-machine interfaces associated with water and wastewater systems (WWS) identified could be manipulated without any authentication required.
Take up of passkeys as a more secure means of accessing websites has been a little disappointing to date, but new research from Dashlane shows that passkeys are starting to gain traction with consumers.
It finds that early passkey adoption is largely being driven by the consumer space, with 'sticky' apps (those used frequently on a daily basis -- including Facebook and X) leading the way.
Cybercriminals are abusing legitimate URL protection services to hide malicious URLs in phishing emails, according to a new Threat Spotlight from Barracuda Networks.
Researchers have observed phishing attacks taking advantage of three different URL protection services to mask their phishing URLs. The services are provided by trusted, legitimate brands. To date, these attacks have targeted hundreds of companies.