|
|
|
OpenAI CISO to step down. Matt Knight plans to leave OpenAI after more than five years as CISO and the company's first security hire, he said in a post on X. He pointed to his leadership of Aardvark, a platform for securing and defending software, as "one of the most fulfilling chapters of my career." Knight didn't elaborate on his plans.
|
|
|
|
WhatsApp's new "Strict Account Settings" feature aims to protect the messaging app's users from hacks. Users can now block attachments from unknown senders, for example, and receive warnings of suspicious code related to someone they chat with. These and other features for "new extreme protection" are aimed at journalists and public figures, Meta said.
|
|
|
UnitedHealth books hefty charges, issues soft full-year revenue outlook. Charges in the fourth quarter of 2025 included costs related to a major cyberattack on UnitedHealth’s Change Healthcare unit in 2024, as well as restructuring. (WSJ)
|
|
|
|
BlueCat Networks for sale: Private equity firm Audax Group is looking to sell network security provider BlueCat at a potential price of $1.5 billion, Reuters reported, citing people familiar with the matter. The companies didn't respond to requests for comment.
|
|
|
Sentenced: A Chinese national was sentenced Tuesday to nearly four years in prison for his part in laundering $36.9 million from 174 U.S. victims of a crypto scam centered in Cambodia, the Justice Department said. Eight co-conspirators have pleaded guilty in the case.
|
|
|
|
Her Client Was Deepfaked. She Says xAI Is to Blame.
|
|
Ashley St. Clair, a conservative influencer who had a child with Elon Musk, sued Musk’s artificial intelligence company xAI, alleging that its chatbot Grok generated and shared nonconsensual, sexually explicit images of her.
|
|
|
|
|
|
|
|
|
|
60%
|
|
Percentage of 523 IT students who said they would leak health information about a famous patient for payments ranging from $10,000 to $10 million, according to research from the State University of New York at Buffalo. (Healthcare Info Security)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|