CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders

  • Home
  • News
  • Insights
  • Resources
Hands on laptop showing data theft of social security data
Cyber SecurityNews

Whistleblower Complaint Alleges Former DOGE Engineer Stole Social Security Data

Handcuffs lying on keyboard showing law enforcement on scam accounts

Meta and Law Enforcement Take Down 150,000 Scam Accounts and Arrest 21 Suspects

Iran flag with program code showing cyber attack by Iranian hackers

Cyber Attack on Medtech Firm Stryker Linked to Iranian Government Hacking Group

WhatsApp Icon on the screen showing phishing campaign by Russian hackers

Newly Discovered Phishing Campaign by Russian Hackers Targets Messaging Accounts of Government Employees, Journalists

Digital shield showing cyber strategy

New “Cyber Strategy for America” Plan Turns Up Heat on International Criminal Gangs While Directing Federal Agencies to Adopt AI Defenses

Stethoscope on keyboard showing data breach of health data
Cyber SecurityNews

Year-Long TriZetto Health Data Breach Leaks Sensitive Healthcare Information of 3.4 Million People

Hacker hands on laptop showing data breach
Cyber SecurityNews

LexisNexis L&P Confirms Data Breach After Hacker Leaks Stolen Information

China Flag on circuit board showing Chinese hackers security breach of surveillance systems
Cyber SecurityNews

Chinese Hackers Accused of Security Breach Involving FBI Surveillance Systems

Data Privacy

Hammer showing privacy lawsuit for AI smart glasses
Data PrivacyNews

Privacy Lawsuit Brought Against Meta Over Contractor Access to Videos From AI Smart Glasses

Discord logo on a smartphone showing age verification postponed

Discord Delays Age Verification After User Backlash

School teacher teaching students showing data privacy

Privacy Shouldn’t Depend on Your ZIP Code: A Decade of Student Data Privacy Implementation and the Role of Cooperative Infrastructure

WhatsApp app on screen and lock showing WhatsApp chats end-to-end encryption

Lawsuit Claims WhatsApp Chats Do Not Really Have End-to-End Encryption, But NSO Group Connections Raise Doubts

Google logo on building showing AI assistant lawsuit

Lawsuit Accuses Google AI Assistant of Surreptitiously Accessing Gmail and Messaging Files

Hand touching screen on tablet showing privacy sandbox

RIP Google Privacy Sandbox: “Cookie Replacement” Project Officially Terminated Due to “Low Adoption”

Meta logo on device screen showing AI chatbot to feed targeted ads

Meta Announces Its AI Chatbot Will Use Conversations To Feed Targeted Ads

Sacramento city hall showing AI safety law

California’s Pioneering AI Safety Law Forces Greater Transparency, Establishes Whistleblower Protections

Sunset on the Westminster Bridge showing privacy concerns with digital ID plan

Controversial “BritCard” Digital ID Plan Raises Privacy Concerns

Data Protection

Finger reaches for the Reddit logo showing children's privacy fines
Data ProtectionNews

Reddit on the Hook for £14.47M in Children’s Privacy Fines Due To Inadequate Age Checks

Medical data on tablet showing health records lawsuit

Health Records Giant Epic Systems Suing Over Alleged Sale of Medical Data to Attorneys

Virtual image of brain showing AI and compliance

2026 AI Legal Forecast: From Innovation to Compliance

Digital brain showing AI governance

An AI Checkup for 2026: Best Practices for the Next Stage

Binary code with EU flag showing GDPR privacy law reform

European Commission Changes to EU Privacy Laws Skewered by Privacy Advocates

Phone with Meta logo showing privacy compliance staff replaced by AI

Meta Announces New Layoff of Privacy Compliance Employees in Favor of Agentic AI

Justice mallet and CCPA with US flag showing privacy fine

Broken Opt-Outs, Big Fines: Tractor Supply Shows Privacy Enforcement Has Arrived for Retail

Scales of Justice EU flag showing EU AI law

Italy’s First-In-Bloc EU AI Law Establishes Prison Sentence for “Harm-Causing” Content

Face recognition technology in street showing violation of privacy laws

Kmart Facial Recognition Technology Pilot Program Violated Privacy Laws, Australian Privacy Commissioner Rules

Cyber Security

Digital lock showing ransomware attack
Cyber SecurityNews

Ransomware Attack at the University of Hawaii Cancer Center Affects 1.2 Million People

Skull and crossbones showing AI security tools and malware

AI Security Tools Have a Serious File-Based Blind Spot, and Attackers Know It

Doctor working with digital medical interface showing data breach exposed medical records

Centralized Healthcare System Data Breach Leaks Medical Records of 15 Million French Citizens

Google building showing API keys exploited for Gemini AI

Researchers Warn Benign Google API Keys Could be Exploited to Rack Up Gemini AI Bills

Laptop with glowing circuit brain showing AI agent vulnerability

Security Research Finds OpenClaw AI Agent “Trivially Vulnerable” to Hijacking

Hacker touching lock showing third-party data breach

Third-Party Data Breach at Online DIY Firm ManoMano Affects Nearly 38 Million People

Hacker on the phone showing vishing attack on ad tech firm

Suspected ShinyHunters’ Vishing Attack Hits Ad Tech Firm Optimizely, Leaking Business Information

Mobile phone with Paypal app logo showing data breach of loan app

PayPal Loan App Customer Data Breach Results in Unauthorized Transactions and Refunds

Chinese flag overlaid on chip showing Chinese hackers cyber espionage

Google Disrupted Chinese GRIDTIDE Cyber Espionage Operation Active Since 2017

Latest News

Man in dark hoodie touching lock showing security breach exposed bank accounts
Cyber SecurityNews

Security Breach at the French National Bank Registry Compromises 1.2 Million Bank Accounts

Man in handcuffs on the street showing law enforcement operations on online scams

INTERPOL-led Law Enforcement Operation Arrests 651 Suspects Linked to Online Scams Across Africa

Microsoft building showing AI tools and confidential emails

Bug in Copilot AI Tool Creates Summaries of Confidential Emails

Two rows of keys with numbers in a metal box showing password managers

New Research Raises Serious Concerns About Security of Cloud-Based Password Managers

Fintech company icons showing data breach

Data Breach at Fintech Company Figure Technology Solutions Impacts Nearly 1 Million People

Hacker working on machines showing data breach of customer records

Data Breach Hits Canada Goose, Exposing Over 600,000 Customer Records

Data center showing zero-day vulnerability for VMs exploited by Chinese hackers

Dell Zero-Day Vulnerability Found in RecoverPoint for VMs Has Been Present (And Exploited by Chinese Hackers) Since 2024

Use of mobile phone in trendy neon lights showing cyber attack on mobile network operator

Cyber Attack on the Largest Dutch Mobile Network Operator Odido Affects 6.2 Million Customers

Hammer on dollar notes showing legal action over data breach

Legal Action Over Coupang Data Breach Escalates as US Investors Join With Claims

Latest Insights

Analytics screens in office showing AI and telemetry
Cyber SecurityInsights

AI Will Automate 80% of Telemetry Pipeline Work by 2026: Here’s What That Means for DevOps Teams

Computer keyboard with dollar notes showing fraud and AI

From Burnout to Breakthrough: How AI Agents Help Fraud Teams Upscale for the Future

CISO standing in board meeting room

How CISOs Can Better Communicate With the C-Suite and Board Members

Digital locks and data showing cybersecurity

Cybersecurity in 2026: Cutting Through the Noise and Rethinking Control

Hacker working showing AI cyber threats

Detecting Intent Is the Only Way To Keep Pace With AI-Enabled Threats

People working in office showing cybersecurity training

From Checkbox to Catalyst: How the C-Suite is Reframing Cybersecurity Training

Man standing in hallway of data center showing AI agents and security operation centers

AI SOC Agents Are Only as Good as the Data They Are Fed

Team in meeting showing security operations and compliance

Compliance vs. Creativity: Why Security Needs Both Rule Books and Rebels

Virtual shields over globe showing AI and cyber risk

The 2026 Cyber Risk Forecast: Entering the AI-Versus-AI Battlefield

Recent Posts

Hands on laptop showing data theft of social security data

Whistleblower Complaint Alleges Former DOGE Engineer Stole Social Security Data

Handcuffs lying on keyboard showing law enforcement on scam accounts

Meta and Law Enforcement Take Down 150,000 Scam Accounts and Arrest 21 Suspects

Iran flag with program code showing cyber attack by Iranian hackers

Cyber Attack on Medtech Firm Stryker Linked to Iranian Government Hacking Group

WhatsApp Icon on the screen showing phishing campaign by Russian hackers

Newly Discovered Phishing Campaign by Russian Hackers Targets Messaging Accounts of Government Employees, Journalists

Digital shield showing cyber strategy

New “Cyber Strategy for America” Plan Turns Up Heat on International Criminal Gangs While Directing Federal Agencies to Adopt AI Defenses

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2025 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Cyber Attack Regulations Ransomware Attack
    See all results