6 Google Chrome Extensions Expose User Information Jordyn Alger June 10, 2025 Research reveals 6 widely used Google Chrome extensions unintentionally transmit user data over simple HTTP. Read More
Lawsuit Alleges Roblox Tracks Children’s Data Without Parental Consent Jordyn Alger May 15, 2025 Is Roblox collecting and disclosing children’s data without their parents’ consent? Read More
27,000 records in Australian fintech database were exposed Security Staff March 28, 2025 Research has revealed that an Australia-based fintech company had a database exposed. Read More
1.6M clinical research records exposed in data leakage Security Staff February 21, 2025 Research reveals a non-password-protected database associated with a clinical trial site network.Read More
600,000 sensitive files exposed by data broker SL Data Services Jordyn Alger December 5, 2024 A non-password protected database belonging to data broker SL Data Services has exposed more than 600,000 sensitive files. Read More
80% of data experts believe AI increases data security challenges Security Staff May 7, 2024 A new report reveals that a majority of data experts agree that artificial intelligence is increasing data security challenges.Read More
Why banning TikTok will not solve data security challenges Rich Vibert April 26, 2024 Legislators and others in favor of banning TikTok often cite data security issues, but it’s an invalid argument that will do little in terms of data security protections.Read More
Are AI data poisoning attacks the new software supply chain attack? Sitaram Iyer April 18, 2024 With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.Read More
How do security leaders protect PII and other important data? Security Staff April 3, 2024 With rapidly changing restrictions and guidelines, security leaders have to be careful when protecting personally identifiable information.Read More
Today’s SIEM data challenges require data decoupling Paul Kivikink December 1, 2023 Threat hunters face siloed data challenges like time-consuming data preparation for hunting and high-latency from compute-intensive queries.Read More