Llama Nemotron Models Accelerate Agentic AI Workflows with Accuracy and Efficiency
Agentic AI, the next wave of generative AI, is a paradigm shift with the potential to revolutionize industries...
NVIDIA RTX Neural Rendering Introduces Next Era of AI-Powered Graphics Innovation
NVIDIA today unveiled next-generation hardware for gamers, creators, and developers—the GeForce RTX 50 Series desktop and laptop GPUs....
UFC boss to join board of Facebook owner Meta
It comes days after former UK deputy PM Sir Nick Clegg left his top job at the social...
US says tech giant Tencent works with Chinese military
The Chinese embassy in Washington called the decision “unreasonable suppression of Chinese companies”. Source:: BBC News – Technology
Product Recall: Amika Mirrorball High Shine + Protect Antioxidant Shampoo (2501-0013)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
CISA says recent government hack limited to US Treasury
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today that the Treasury Department breach disclosed last week...
Apple says it will update AI feature after BBC complaint
One of Apple’s new artificial intelligence features is facing criticism for generating inaccurate news alerts. Source:: BBC News...
Microsoft will invest $80B in AI data centers in fiscal 2025
Microsoft is on track to invest around $80 billion this fiscal year to build out AI-enabled data centers,...
Vulnerable Moxa devices expose industrial networks to attacks
Industrial networking and communications provider Moxa is warning of a high-severity and a critical vulnerability that impact various...
2025 ransomware predictions, trends, and how to prepare
Zscaler ThreatLabz research team has revealed critical insights and predictions on ransomware trends for 2025. The latest Ransomware...
Chinese hackers also breached Charter and Windstream networks
More U.S. companies have been added to the list of telecommunications firms hacked in a wave of breaches...
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs
New variants of the Eagerbee malware framework are being deployed against government organizations and internet service providers (ISPs)...
India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements
The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public...
Microsoft Bing shows misleading Google-like page for ‘Google’ searches
Microsoft Bing is displaying what is being categorized as a misleading Google-esque search page when users search for...
More telecom firms were breached by Chinese hackers than previously reported
Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we...
Study Highlights Need for Standardized Measurement Methods in Gene Therapy
Scientists looked at multiple techniques used to measure the modified viruses deployed in some gene therapy research and...
From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch
In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a...
FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices
An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram...
What to expect from NaaS in 2025
Enterprises have been slow to adopt NaaS for a number of reasons, including lack of clarity on exactly...