A Critical Part of Enterprise AI Governance
Sep 02, 2025The Hacker NewsData Privacy / SaaS Security The Harsh Truths…
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans…
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
Cybersecurity researchers have demonstrated a new prompt injection technique called PromptFix that…
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback
Aug 19, 2025Ravie LakshmananEncryption / Cloud Security The U.K. government has apparently…
Overcoming Risks from Chinese GenAI Tool Usage
Jul 25, 2025The Hacker NewsArtificial Intelligence / Data Privacy A recent analysis…
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them
Jul 24, 2025The Hacker News Is Managing Customer Logins and Data Giving…
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
Jul 05, 2025Ravie LakshmananNational Security / Privacy Taiwan's National Security Bureau (NSB)…
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Jun 25, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have detailed two…
Empower Users and Protect Against GenAI Data Loss
Jun 06, 2025The Hacker NewsArtificial Intelligence / Zero Trust When generative AI…


