CINXE.COM
Subscribe to Cyber Daily® from Recorded Future News
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>Subscribe to Cyber Daily® from Recorded Future News</title><meta property="og:site_name" content="The Record from Recorded Future"/><meta property="og:title" content="Subscribe to Cyber Daily® from Recorded Future News"/><meta property="og:type" content="website"/><meta property="og:description" content="The Cyber Daily® newsletter gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues."/><meta name="description" content="The Cyber Daily® newsletter gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues."/><meta property="og:image" content="https://cms.therecord.media/uploads/format_webp/2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg"/><meta name="twitter:title" content="Subscribe to Cyber Daily® from Recorded Future News"/><meta name="twitter:image" content="https://cms.therecord.media/uploads/format_webp/2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg"/><meta name="twitter:description" content="The Cyber Daily® newsletter gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues."/><meta name="twitter:card" content="summary_large_image"/><link rel="icon" href="/favicon.ico"/><link rel="alternate" hrefLang="x-default" href="https://therecord.media/subscribe"/><link rel="icon" sizes="16x16 32x32 64x64" href="/favicon.ico"/><link rel="icon" type="image/png" sizes="196x196" href="/favicon-192.png"/><link rel="icon" type="image/png" sizes="32x32" href="/favicon-32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/favicon-16.png"/><link rel="apple-touch-icon" sizes="180x180" href="/favicon-180.png"/><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PVJ5W86');</script><script>var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(["setDocumentTitle", document.domain + "/" + document.title]); _paq.push(["setCookieDomain", "*.therecord.media"]); _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="https://recordedfuture.matomo.cloud/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '2']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.type='text/javascript'; g.async=true; g.src='//cdn.matomo.cloud/recordedfuture.matomo.cloud/matomo.js'; s.parentNode.insertBefore(g,s); })();</script><script>var _mtm = window._mtm = window._mtm || []; _mtm.push({'mtm.startTime': (new Date().getTime()), 'event': 'mtm.Start'}); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.type='text/javascript'; g.async=true; g.src='https://cdn.matomo.cloud/recordedfuture.matomo.cloud/container_41sBJe2I.js'; s.parentNode.insertBefore(g,s);</script><link rel="preload" href="https://cms.therecord.media/uploads/The_Record_Centered_9b27d79125.svg" as="image" fetchpriority="high"/><link rel="preload" href="https://cms.therecord.media/uploads/2024_0502_cyberdaily_for_the_Record_61233a016d.webp" as="image" fetchpriority="high"/><meta name="next-head-count" content="23"/><link rel="preload" href="/_next/static/media/a34f9d1faa5f3315-s.p.woff2" as="font" type="font/woff2" crossorigin="anonymous" data-next-font="size-adjust"/><link rel="preload" href="/_next/static/css/013775c94cef4180.css" as="style"/><link rel="stylesheet" href="/_next/static/css/013775c94cef4180.css" data-n-g=""/><link rel="preload" href="/_next/static/css/ef46db3751d8e999.css" as="style"/><link rel="stylesheet" href="/_next/static/css/ef46db3751d8e999.css" data-n-p=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-6ef43a8d4a395f49.js" defer=""></script><script src="/_next/static/chunks/framework-64ad27b21261a9ce.js" defer=""></script><script src="/_next/static/chunks/main-be7cba59a887cc81.js" defer=""></script><script src="/_next/static/chunks/pages/_app-2b1ef596989b668c.js" defer=""></script><script src="/_next/static/chunks/61-d5fc4e6ac9a5e0d2.js" defer=""></script><script src="/_next/static/chunks/432-a989985b2b7ae427.js" defer=""></script><script src="/_next/static/chunks/pages/%5B%5B...slug%5D%5D-a5423bd655013129.js" defer=""></script><script src="/_next/static/wjcaPKSdTb3sCJ4t2_NPu/_buildManifest.js" defer=""></script><script src="/_next/static/wjcaPKSdTb3sCJ4t2_NPu/_ssgManifest.js" defer=""></script></head><body><div id="__next"><div class=""><main class="__variable_d65c78 font-sans"><section class="flex flex-col min-h-screen"><noscript><p><img alt="" src="https://recordedfuture.matomo.cloud/matomo.php?idsite=2&rec=1" style="border:0"/></p></noscript><noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PVJ5W86" style="display:none;visibility:hidden" title="Google Tag Manager" width="0"></iframe></noscript><header class="header z-30 bg-white"><div class="mx-auto px-5 md:px-8 lg:px-12 xl:px-20 2xl:px-40 max-w-layout w-full"><div class="flex flex-wrap items-center z-100"><div class="header__logo"><a href="/"><img alt="Cyber Security News | The Record" fetchpriority="high" decoding="async" data-nimg="fill" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;object-fit:contain;color:transparent" src="https://cms.therecord.media/uploads/The_Record_Centered_9b27d79125.svg"/></a></div><button class="header__nav-btn lg:hidden" id="nav-btn-mobile" role="button" aria-label="Toggle navigation menu"><span class="text-orange text-lg icon-menu"></span></button><div class="header__menu "><ul class="header__nav header__nav--primary"><li><a href="/news/leadership"><span class="wysiwyg-parsed-content"><p>Leadership</p></span></a></li><li><a href="/news/cybercrime"><span class="wysiwyg-parsed-content"><p>Cybercrime</p></span></a></li><li><a href="/news/nation-state"><span class="wysiwyg-parsed-content"><p>Nation-state</p></span></a></li><li><a href="/news/elections"><span class="wysiwyg-parsed-content"><p>Elections</p></span></a></li><li><a href="/news/technology"><span class="wysiwyg-parsed-content"><p>Technology</p></span></a></li></ul><ul class="header__nav header__nav--secondary"><li><a href="https://therecord.media/subscribe"><span class="wysiwyg-parsed-content"><p>Cyber Daily®</p></span></a></li><li><a href="/podcast"><span class="wysiwyg-parsed-content"><p>Click Here Podcast</p></span></a></li></ul><div class="header__search lg:hidden"><div class="search-bar search-bar--header"><form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""/><button type="submit">Go</button></form></div></div><div class="lg:hidden header__newsletter"><button class="flex items-center"><svg class="inline-block mr-[5px]" width="27px" height="27px" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M3.75 5.25L3 6V18L3.75 18.75H20.25L21 18V6L20.25 5.25H3.75ZM4.5 7.6955V17.25H19.5V7.69525L11.9999 14.5136L4.5 7.6955ZM18.3099 6.75H5.68986L11.9999 12.4864L18.3099 6.75Z" fill="#000000"></path></svg>Subscribe to The Record</button></div><button class="hidden lg:block header__search-btn " id="search-btn" role="button" aria-label="Open search input"><span class="text-black text-md icon-search"></span></button><a class="header__cta hidden lg:block !leading-[140%]" href="/subscribe"><span class="text-[16px] font-bold flex items-center justify-center"><span class="wysiwyg-parsed-content"><p>✉️ Free Newsletter</p></span></span></a></div></div></div></header><div class="flex-auto mx-auto px-5 md:px-8 lg:px-12 xl:px-20 2xl:px-40 max-w-layout w-full"><main class="page-main transition duration-500" style="filter:blur(0px)"><section class="my-10 lg:my-12 first-of-type:mt-0"><div class="side-by-side"><div><div class="subscribe-tile" id="subscribe-form"><h3>SUBSCRIBE TO CYBER DAILY®</h3><p>The Cyber Daily® newsletter from Recorded Future News gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues.</p><div class="hidden" id="hubspotForm"></div><div class="mb-[68px]" aria-hidden="true"><div class="h-[40px] border-b-2 border-b-[#cad5e2] px-[15px] pt-[6px] mt-[15px] mb-[44px] text-[#bfbfbf] zzzbg-[grey]">✉️ Your email address*</div><span class="cursor-default bg-black text-white text-base font-bold font-inter px-[24px] py-[12px] rounded-[3px]">Join Free</span></div></div><div class="py-[30px]"><div class="w-full"><h4 class="content-media-tile__title">DOWNLOAD THE RECORDED FUTURE MOBILE APP</h4><span class="wysiwyg-parsed-content"><p>Read, bookmark, and share all the latest news and reports from Recorded Future News directly within the app.</p></span><a target="_blank" class="content-text__cta" href="https://apps.apple.com/us/app/recorded-future/id1435597894"><span class="wysiwyg-parsed-content"><p>Download iOS</p></span></a><a target="_blank" class="content-text__cta" href="https://play.google.com/store/apps/details?id=com.recordedfuture.mobile"><span class="wysiwyg-parsed-content"><p>Download Android</p></span></a></div></div></div><div><section class="my-10 lg:my-12 first-of-type:mt-0"><figure class="relative pb-[56%]"><img alt="Cyber Daily" fetchpriority="high" width="500" height="500" decoding="async" data-nimg="1" style="color:transparent;object-fit:contain" src="https://cms.therecord.media/uploads/2024_0502_cyberdaily_for_the_Record_61233a016d.webp"/></figure></section></div></div></section></main></div><div class="mx-auto px-5 md:px-8 lg:px-12 xl:px-20 2xl:px-40 max-w-layout w-full"><div class="transition duration-500" style="filter:blur(0px)"><footer class="footer"><div class="flex flex-wrap items-center justify-between"><div class="footer__column-left"><div class="footer__logo"><a href="/"><img alt="The Record from Recorded Future News" fetchpriority="auto" loading="lazy" width="171" height="39" decoding="async" data-nimg="1" style="color:transparent" src="https://cms.therecord.media/uploads/The_Record_Centered_9b27d79125.svg"/></a></div><div class="footer__socials"><ul><li><a aria-label="Twitter social link" target="_blank" rel="noopener noreferrer" href="https://twitter.com/TheRecord_Media"><span class="text-black text-sm icon-twitter"></span></a></li><li><a aria-label="LinkedIn social link" target="_blank" rel="noopener noreferrer" href="https://www.linkedin.com/company/the-record-by-recorded-future"><span class="text-black text-sm icon-linkedin"></span></a></li><li><a aria-label="Instagram social link" target="_blank" rel="noopener noreferrer" href="https://www.instagram.com/therecord_media/"><span class="text-black text-sm icon-instagram"></span></a></li><li><a aria-label="Mastodon social link" target="_self" rel="noopener noreferrer" href="https://mastodon.social/@therecord_media"><span class="text-black text-sm icon-mastodon"></span></a></li><li><a aria-label="Bluesky social link" target="_blank" rel="noopener noreferrer" href="https://bsky.app/profile/therecordmedia.bsky.social"><span class="text-black text-sm icon-bluesky"></span></a></li><li><a aria-label="RSS Feed link" target="_blank" rel="noopener noreferrer" href="https://therecord.media/feed/"><span class="text-black text-sm icon-rss"></span></a></li></ul></div></div><div class="footer__column-right"><div class="footer__menu"><ul><li><a href="https://www.recordedfuture.com/privacy-policy"><span class="wysiwyg-parsed-content"><p>Privacy</p></span></a></li><li><a href="/about"><span class="wysiwyg-parsed-content"><p>About</p></span></a></li><li><a href="/contact"><span class="wysiwyg-parsed-content"><p>Contact Us</p></span></a></li></ul></div></div><div class="footer__column-middle"><div class="footer__copyright"><span class="wysiwyg-parsed-content"><p>© Copyright 2024 | The Record from Recorded Future News</p></span></div></div></div></footer></div></div></section></main></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"analyticData":{"data":{"id":1,"attributes":{"facebookPixelCodeToken":"781647205981775","googleTagManagerToken":"GTM-PVJ5W86","createdAt":"2022-11-24T10:22:59.243Z","updatedAt":"2023-03-14T15:49:13.743Z","publishedAt":"2022-11-24T10:22:59.986Z"}},"meta":{}},"header":{"data":{"id":1,"attributes":{"createdAt":"2022-03-30T16:06:58.729Z","updatedAt":"2024-04-12T18:45:58.356Z","publishedAt":"2022-03-30T16:07:01.120Z","locale":"en","primaryCta":{"id":27,"target":"_self","externalUrl":"","label":"✉️ Free Newsletter","page":{"data":{"id":5,"attributes":{"title":"Subscribe to Cyber Daily®","slug":"/subscribe","createdAt":"2022-03-31T13:45:06.824Z","updatedAt":"2024-05-02T16:28:44.627Z","publishedAt":"2022-03-31T13:45:08.513Z","locale":"en","showTitle":true,"customArticleSidebar":null}}}},"ctas":[{"id":154,"target":"_blank","externalUrl":"https://therecord.media/subscribe","label":"Cyber Daily®","page":{"data":null}},{"id":3,"target":"_self","externalUrl":null,"label":"Click Here Podcast","page":{"data":{"id":8769,"attributes":{"title":"Click Here Podcasts","slug":"/podcast","createdAt":"2024-02-22T15:33:00.084Z","updatedAt":"2024-11-26T19:26:40.656Z","publishedAt":"2024-02-22T15:33:03.995Z","locale":"en","showTitle":false,"customArticleSidebar":null}}}}],"logo":{"id":16,"alt":"Cyber Security News | The Record","caption":null,"tablet":{"data":null},"mobile":{"data":null},"desktop":{"data":{"id":4355,"attributes":{"name":"The Record-Centered.svg","alternativeText":"The Record-Centered.svg","caption":"The Record-Centered.svg","width":null,"height":null,"formats":null,"hash":"The_Record_Centered_9b27d79125","ext":".svg","mime":"image/svg+xml","size":7.26,"url":"/uploads/The_Record_Centered_9b27d79125.svg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2023-01-12T17:06:51.335Z","updatedAt":"2024-04-15T13:35:29.457Z"}}}},"logoLink":{"id":10,"target":"_self","externalUrl":null,"label":"Go to homepage","page":{"data":{"id":4,"attributes":{"title":"Home","slug":"/","createdAt":"2022-03-31T13:42:22.553Z","updatedAt":"2025-02-25T13:09:50.493Z","publishedAt":"2022-03-31T13:42:26.218Z","locale":"en","showTitle":true,"customArticleSidebar":null}}}},"categories":[{"id":6,"target":"_self","externalUrl":"","label":"Leadership","page":{"data":{"id":30,"attributes":{"title":"Leadership News","slug":"/news/leadership","createdAt":"2022-07-18T10:45:47.247Z","updatedAt":"2025-02-07T19:04:54.815Z","publishedAt":"2022-07-18T10:46:18.049Z","locale":"en","showTitle":false,"customArticleSidebar":null}}}},{"id":4,"target":"_self","externalUrl":null,"label":"Cybercrime","page":{"data":{"id":33,"attributes":{"title":"Cybercrime News","slug":"/news/cybercrime","createdAt":"2022-10-04T13:41:45.475Z","updatedAt":"2025-02-07T19:03:47.119Z","publishedAt":"2022-10-04T13:42:16.623Z","locale":"en","showTitle":false,"customArticleSidebar":true}}}},{"id":5,"target":"_self","externalUrl":null,"label":"Nation-state","page":{"data":{"id":34,"attributes":{"title":"Nation-State News","slug":"/news/nation-state","createdAt":"2022-10-04T13:42:39.663Z","updatedAt":"2025-02-07T19:05:31.804Z","publishedAt":"2022-10-04T13:42:43.179Z","locale":"en","showTitle":false,"customArticleSidebar":null}}}},{"id":7,"target":"_self","externalUrl":null,"label":"Elections","page":{"data":{"id":8308,"attributes":{"title":"Elections News","slug":"/news/elections","createdAt":"2023-11-30T18:05:06.228Z","updatedAt":"2025-02-07T19:04:08.753Z","publishedAt":"2023-11-30T18:15:26.552Z","locale":"en","showTitle":false,"customArticleSidebar":null}}}},{"id":8,"target":"_self","externalUrl":null,"label":"Technology","page":{"data":{"id":36,"attributes":{"title":"Technology News","slug":"/news/technology","createdAt":"2022-10-04T13:43:48.898Z","updatedAt":"2025-02-07T19:07:25.938Z","publishedAt":"2022-10-04T13:43:50.140Z","locale":"en","showTitle":false,"customArticleSidebar":null}}}}]}},"meta":{}},"footer":{"data":{"id":1,"attributes":{"legalText":"© Copyright 2024 | The Record from Recorded Future News","createdAt":"2022-03-30T16:08:52.148Z","updatedAt":"2024-11-19T08:49:41.804Z","publishedAt":"2022-03-30T16:08:54.448Z","locale":"en","ctas":[{"id":16,"target":"_self","externalUrl":"https://www.recordedfuture.com/privacy-policy","label":"Privacy","page":{"data":null}},{"id":189,"target":"_self","externalUrl":null,"label":"About","page":{"data":{"id":1,"attributes":{"title":"About Us","slug":"/about","createdAt":"2022-03-28T10:14:39.247Z","updatedAt":"2024-01-03T14:49:08.232Z","publishedAt":"2022-11-24T10:26:17.561Z","locale":"en","showTitle":true,"customArticleSidebar":null}}}},{"id":190,"target":"_self","externalUrl":null,"label":"Contact Us","page":{"data":{"id":3,"attributes":{"title":"Contact Us","slug":"/contact","createdAt":"2022-03-31T13:40:52.362Z","updatedAt":"2024-05-10T13:32:27.715Z","publishedAt":"2022-03-31T13:40:54.206Z","locale":"en","showTitle":true,"customArticleSidebar":null}}}}],"logo":{"id":17,"alt":"The Record from Recorded Future News","caption":null,"tablet":{"data":null},"mobile":{"data":null},"desktop":{"data":{"id":4355,"attributes":{"name":"The Record-Centered.svg","alternativeText":"The Record-Centered.svg","caption":"The Record-Centered.svg","width":null,"height":null,"formats":null,"hash":"The_Record_Centered_9b27d79125","ext":".svg","mime":"image/svg+xml","size":7.26,"url":"/uploads/The_Record_Centered_9b27d79125.svg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2023-01-12T17:06:51.335Z","updatedAt":"2024-04-15T13:35:29.457Z"}}}},"socialMediaLinks":{"id":1,"blueskyLink":{"id":397,"target":"_blank","externalUrl":"https://bsky.app/profile/therecordmedia.bsky.social","label":"{\"time\":1732006179141,\"blocks\":[{\"id\":\"5xOnvzlFkL\",\"type\":\"paragraph\",\"data\":{\"text\":\"Bluesky\"}}],\"version\":\"2.29.0\"}"},"mastodonLink":{"id":333,"target":"_self","externalUrl":"https://mastodon.social/@therecord_media","label":"{\"time\":1713433528668,\"blocks\":[{\"id\":\"9lGq_NEt1X\",\"type\":\"paragraph\",\"data\":{\"text\":\"Mastodon\"}}],\"version\":\"2.29.0\"}"},"twitterLink":{"id":13,"target":"_blank","externalUrl":"https://twitter.com/TheRecord_Media","label":"Twitter"},"rssLink":{"id":12,"target":"_blank","externalUrl":"https://therecord.media/feed/","label":"RSS feed"},"instagramLink":{"id":11,"target":"_blank","externalUrl":"https://www.instagram.com/therecord_media/","label":"Instagram"},"linkedInLink":{"id":14,"target":"_blank","externalUrl":"https://www.linkedin.com/company/the-record-by-recorded-future","label":"LinkedIn"}}}},"meta":{}},"page":{"data":[{"id":5,"attributes":{"title":"Subscribe to Cyber Daily®","slug":"/subscribe","createdAt":"2022-03-31T13:45:06.824Z","updatedAt":"2024-05-02T16:28:44.627Z","publishedAt":"2022-03-31T13:45:08.513Z","locale":"en","showTitle":true,"customArticleSidebar":null,"article":{"data":null},"category":{"data":null},"editor":{"data":null},"main":[],"mainLeft":[{"id":69,"__component":"blocks.subscribe-tile","title":"SUBSCRIBE TO CYBER DAILY®","subtitle":null,"description":"The Cyber Daily® newsletter from Recorded Future News gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues.","form":{"id":69,"title":"signup","region":"na1","portalId":"252628","formId":"3f0b2328-44d5-429f-b354-8b109bef6527"}},{"id":1,"__component":"blocks.content-text-cta","title":"DOWNLOAD THE RECORDED FUTURE MOBILE APP","description":"Read, bookmark, and share all the latest news and reports from Recorded Future News directly within the app.","cta":[{"id":193,"target":"_blank","externalUrl":"https://apps.apple.com/us/app/recorded-future/id1435597894","label":"Download iOS","page":{"data":null}},{"id":194,"target":"_blank","externalUrl":"https://play.google.com/store/apps/details?id=com.recordedfuture.mobile","label":"Download Android","page":{"data":null}}]}],"mainRight":[{"id":1,"__component":"blocks.image-single","image":{"id":4307,"alt":"Cyber Daily","caption":null,"desktop":{"data":{"id":7288,"attributes":{"name":"2024_0502- cyberdaily for the Record.webp","alternativeText":null,"caption":null,"width":675,"height":478,"formats":{"small":{"ext":".webp","url":"/uploads/small_2024_0502_cyberdaily_for_the_Record_61233a016d.webp","hash":"small_2024_0502_cyberdaily_for_the_Record_61233a016d","mime":"image/webp","name":"small_2024_0502- cyberdaily for the Record.webp","path":null,"size":24.21,"width":500,"height":354,"sizeInBytes":24206},"thumbnail":{"ext":".webp","url":"/uploads/thumbnail_2024_0502_cyberdaily_for_the_Record_61233a016d.webp","hash":"thumbnail_2024_0502_cyberdaily_for_the_Record_61233a016d","mime":"image/webp","name":"thumbnail_2024_0502- cyberdaily for the Record.webp","path":null,"size":6.24,"width":220,"height":156,"sizeInBytes":6240}},"hash":"2024_0502_cyberdaily_for_the_Record_61233a016d","ext":".webp","mime":"image/webp","size":44.5,"url":"/uploads/2024_0502_cyberdaily_for_the_Record_61233a016d.webp","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2024-05-02T16:28:40.209Z","updatedAt":"2024-05-02T16:28:40.209Z"}}}}}],"metaData":{"id":4016,"title":"Subscribe to Cyber Daily® from Recorded Future News","description":"The Cyber Daily® newsletter gives you all the important news in the world of cyber and intelligence, from the latest on breaches and ransomware to industry news and geopolitical issues.","hideFromSearchEngines":false,"image":{"data":{"id":6555,"attributes":{"name":"2023_1107 - cyberdaily mobile_lots (1).jpg","alternativeText":null,"caption":null,"width":1350,"height":956,"formats":{"large":{"ext":".jpg","url":"/uploads/large_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg","hash":"large_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e","mime":"image/jpeg","name":"large_2023_1107 - cyberdaily mobile_lots (1).jpg","path":null,"size":168.47,"width":1000,"height":708},"small":{"ext":".jpg","url":"/uploads/small_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg","hash":"small_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e","mime":"image/jpeg","name":"small_2023_1107 - cyberdaily mobile_lots (1).jpg","path":null,"size":43.9,"width":500,"height":354},"medium":{"ext":".jpg","url":"/uploads/medium_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg","hash":"medium_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e","mime":"image/jpeg","name":"medium_2023_1107 - cyberdaily mobile_lots (1).jpg","path":null,"size":98.1,"width":750,"height":531},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg","hash":"thumbnail_2023_1107_cyberdaily_mobile_lots_1_4c8215f34e","mime":"image/jpeg","name":"thumbnail_2023_1107 - cyberdaily mobile_lots (1).jpg","path":null,"size":8.93,"width":220,"height":156}},"hash":"2023_1107_cyberdaily_mobile_lots_1_4c8215f34e","ext":".jpg","mime":"image/jpeg","size":286.13,"url":"/uploads/2023_1107_cyberdaily_mobile_lots_1_4c8215f34e.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2023-12-18T16:53:54.524Z","updatedAt":"2023-12-18T16:53:54.524Z"}}}},"sidebar":[],"tag":{"data":null}}}],"meta":{"pagination":{"page":1,"pageSize":25,"pageCount":1,"total":1}}},"newsTickerData":null,"briefs":[{"id":6173,"attributes":{"date":"2025-02-24T21:05:11.259Z","title":"Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans","publishedAt":"2025-02-24T21:05:14.317Z","page":{"data":{"id":10723,"attributes":{"slug":"/hackers-pose-as-esports-gamers-to-steal-crypto-from-fans"}}}}},{"id":6172,"attributes":{"date":"2025-02-24T20:02:30.905Z","title":"Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments","publishedAt":"2025-02-24T20:04:57.918Z","page":{"data":{"id":10722,"attributes":{"slug":"/botnet-credentials-microsoft-spraying-attack"}}}}},{"id":6169,"attributes":{"date":"2025-02-24T17:44:12.496Z","title":"Screens at HUD display AI video of Donald Trump sucking Elon Musk’s toes","publishedAt":"2025-02-24T17:47:39.263Z","page":{"data":{"id":10719,"attributes":{"slug":"/hud-fake-video-musk-trump"}}}}},{"id":6166,"attributes":{"date":"2025-02-21T19:49:06.392Z","title":"Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms","publishedAt":"2025-02-21T19:49:09.117Z","page":{"data":{"id":10716,"attributes":{"slug":"/hackers-drained-bybit-crypto-exchange-hack"}}}}},{"id":6165,"attributes":{"date":"2025-02-21T19:13:18.305Z","title":"Top Polish anti-corruption official resigns amid spyware probe","publishedAt":"2025-02-21T19:13:21.331Z","page":{"data":{"id":10715,"attributes":{"slug":"/top-polish-anti-corruption-official-resigns-spyware-probe"}}}}},{"id":6162,"attributes":{"date":"2025-02-21T15:01:08.378Z","title":"Ukrainian hackers claim breach of Russian loan company linked to Putin’s ex-wife","publishedAt":"2025-02-21T15:01:14.634Z","page":{"data":{"id":10712,"attributes":{"slug":"/russia-carmoney-data-breach-ukrainian-cyber-alliance"}}}}},{"id":6154,"attributes":{"date":"2025-02-20T16:54:31.807Z","title":"SEC replaces cryptocurrency fraud unit with team aimed more broadly at emerging tech","publishedAt":"2025-02-20T16:56:43.404Z","page":{"data":{"id":10704,"attributes":{"slug":"/sec-replaces-crypto-fraud-unit"}}}}},{"id":6153,"attributes":{"date":"2025-02-20T16:32:03.600Z","title":"Major Australian IVF provider investigating cyber incident","publishedAt":"2025-02-20T16:35:41.821Z","page":{"data":{"id":10703,"attributes":{"slug":"/australian-ivf-provider-cyber-incident"}}}}},{"id":6151,"attributes":{"date":"2025-02-19T21:09:30.866Z","title":"Recent Ghost/Cring ransomware activity prompts alert from FBI, CISA","publishedAt":"2025-02-19T21:09:32.621Z","page":{"data":{"id":10701,"attributes":{"slug":"/ghost-cring-ransomware-activity-fbi-cisa-alert"}}}}}],"latestNewsItems":[{"id":6174,"attributes":{"date":"2025-02-25T13:03:20.190Z","title":"UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution","editor":{"data":{"id":33,"attributes":{"name":"Alexander Martin"}}},"editors":{"data":[]},"page":{"data":{"id":10724,"attributes":{"slug":"/uk-home-office-vulnerability-disclosure-ethical-hackers"}}},"image":{"id":6660,"alt":"U.K. Home Office","caption":"The U.K. Home Office, in Westminster. Image: Steve Cadman via Flickr / CC BY-SA 2.0","desktop":{"data":{"id":8724,"attributes":{"name":"uk_home_office_Marsham_Street.jpg","alternativeText":"The U.K. Home Office, in Westminster. Image: Steve Cadman via Flickr / CC BY-SA 2.0","caption":"The U.K. Home Office, in Westminster. Image: Steve Cadman via Flickr / CC BY-SA 2.0","width":1085,"height":630,"formats":{"large":{"ext":".jpg","url":"/uploads/large_uk_home_office_Marsham_Street_68a36b4233.jpg","hash":"large_uk_home_office_Marsham_Street_68a36b4233","mime":"image/jpeg","name":"large_uk_home_office_Marsham_Street.jpg","path":null,"size":135.65,"width":1000,"height":581,"sizeInBytes":135650},"small":{"ext":".jpg","url":"/uploads/small_uk_home_office_Marsham_Street_68a36b4233.jpg","hash":"small_uk_home_office_Marsham_Street_68a36b4233","mime":"image/jpeg","name":"small_uk_home_office_Marsham_Street.jpg","path":null,"size":38.73,"width":500,"height":290,"sizeInBytes":38734},"medium":{"ext":".jpg","url":"/uploads/medium_uk_home_office_Marsham_Street_68a36b4233.jpg","hash":"medium_uk_home_office_Marsham_Street_68a36b4233","mime":"image/jpeg","name":"medium_uk_home_office_Marsham_Street.jpg","path":null,"size":81.86,"width":750,"height":435,"sizeInBytes":81855},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_uk_home_office_Marsham_Street_68a36b4233.jpg","hash":"thumbnail_uk_home_office_Marsham_Street_68a36b4233","mime":"image/jpeg","name":"thumbnail_uk_home_office_Marsham_Street.jpg","path":null,"size":10.34,"width":245,"height":142,"sizeInBytes":10341}},"hash":"uk_home_office_Marsham_Street_68a36b4233","ext":".jpg","mime":"image/jpeg","size":158.82,"url":"/uploads/uk_home_office_Marsham_Street_68a36b4233.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-25T13:01:39.319Z","updatedAt":"2025-02-25T13:02:20.755Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6173,"attributes":{"date":"2025-02-24T21:05:11.259Z","title":"Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans","editor":{"data":{"id":12,"attributes":{"name":"Daryna Antoniuk"}}},"editors":{"data":[]},"page":{"data":{"id":10723,"attributes":{"slug":"/hackers-pose-as-esports-gamers-to-steal-crypto-from-fans"}}},"image":{"id":6659,"alt":"video games","caption":"Image: Fredrick Tendong via Unsplash","desktop":{"data":{"id":8723,"attributes":{"name":"video-games.jpg","alternativeText":"video games","caption":"Image: Fredrick Tendong via Unsplash","width":1085,"height":632,"formats":{"large":{"ext":".jpg","url":"/uploads/large_video_games_cf3b5f475b.jpg","hash":"large_video_games_cf3b5f475b","mime":"image/jpeg","name":"large_video-games.jpg","path":null,"size":43.64,"width":1000,"height":582,"sizeInBytes":43643},"small":{"ext":".jpg","url":"/uploads/small_video_games_cf3b5f475b.jpg","hash":"small_video_games_cf3b5f475b","mime":"image/jpeg","name":"small_video-games.jpg","path":null,"size":16.08,"width":500,"height":291,"sizeInBytes":16081},"medium":{"ext":".jpg","url":"/uploads/medium_video_games_cf3b5f475b.jpg","hash":"medium_video_games_cf3b5f475b","mime":"image/jpeg","name":"medium_video-games.jpg","path":null,"size":28.68,"width":750,"height":437,"sizeInBytes":28675},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_video_games_cf3b5f475b.jpg","hash":"thumbnail_video_games_cf3b5f475b","mime":"image/jpeg","name":"thumbnail_video-games.jpg","path":null,"size":5.97,"width":245,"height":143,"sizeInBytes":5969}},"hash":"video_games_cf3b5f475b","ext":".jpg","mime":"image/jpeg","size":49.33,"url":"/uploads/video_games_cf3b5f475b.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-24T21:04:57.616Z","updatedAt":"2025-02-24T21:04:57.616Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6172,"attributes":{"date":"2025-02-24T20:02:30.905Z","title":"Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments","editor":{"data":{"id":23,"attributes":{"name":"Joe Warminsky"}}},"editors":{"data":[]},"page":{"data":{"id":10722,"attributes":{"slug":"/botnet-credentials-microsoft-spraying-attack"}}},"image":{"id":6658,"alt":"Botnet","caption":"Image: Getty Images / Unsplash","desktop":{"data":{"id":8722,"attributes":{"name":"botnet PP.jpg","alternativeText":null,"caption":null,"width":1085,"height":630,"formats":{"large":{"ext":".jpg","url":"/uploads/large_botnet_PP_3a15251faf.jpg","hash":"large_botnet_PP_3a15251faf","mime":"image/jpeg","name":"large_botnet PP.jpg","path":null,"size":66.14,"width":1000,"height":581,"sizeInBytes":66144},"small":{"ext":".jpg","url":"/uploads/small_botnet_PP_3a15251faf.jpg","hash":"small_botnet_PP_3a15251faf","mime":"image/jpeg","name":"small_botnet PP.jpg","path":null,"size":23.8,"width":500,"height":290,"sizeInBytes":23799},"medium":{"ext":".jpg","url":"/uploads/medium_botnet_PP_3a15251faf.jpg","hash":"medium_botnet_PP_3a15251faf","mime":"image/jpeg","name":"medium_botnet PP.jpg","path":null,"size":43.63,"width":750,"height":435,"sizeInBytes":43634},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_botnet_PP_3a15251faf.jpg","hash":"thumbnail_botnet_PP_3a15251faf","mime":"image/jpeg","name":"thumbnail_botnet PP.jpg","path":null,"size":7.96,"width":245,"height":142,"sizeInBytes":7956}},"hash":"botnet_PP_3a15251faf","ext":".jpg","mime":"image/jpeg","size":69.7,"url":"/uploads/botnet_PP_3a15251faf.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-24T20:00:31.262Z","updatedAt":"2025-02-24T20:00:31.262Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6171,"attributes":{"date":"2025-02-24T18:28:46.752Z","title":"North Korea’s Lazarus hackers behind $1.4 billion crypto theft from Bybit, researchers say ","editor":{"data":{"id":21,"attributes":{"name":"James Reddick"}}},"editors":{"data":[]},"page":{"data":{"id":10721,"attributes":{"slug":"/lazarus-hackers-behind-bybit-crypto-heist"}}},"image":{"id":6657,"alt":"ethereum crypto","caption":"Image: Drawkit Illustrations via Unsplash","desktop":{"data":{"id":8721,"attributes":{"name":"ethereum-crypto.jpg","alternativeText":"ethereum crypto","caption":"Image: Drawkit Illustrations via Unsplash","width":1085,"height":610,"formats":{"large":{"ext":".jpg","url":"/uploads/large_ethereum_crypto_905572ae21.jpg","hash":"large_ethereum_crypto_905572ae21","mime":"image/jpeg","name":"large_ethereum-crypto.jpg","path":null,"size":120.76,"width":1000,"height":562,"sizeInBytes":120761},"small":{"ext":".jpg","url":"/uploads/small_ethereum_crypto_905572ae21.jpg","hash":"small_ethereum_crypto_905572ae21","mime":"image/jpeg","name":"small_ethereum-crypto.jpg","path":null,"size":37.67,"width":500,"height":281,"sizeInBytes":37667},"medium":{"ext":".jpg","url":"/uploads/medium_ethereum_crypto_905572ae21.jpg","hash":"medium_ethereum_crypto_905572ae21","mime":"image/jpeg","name":"medium_ethereum-crypto.jpg","path":null,"size":75.9,"width":750,"height":422,"sizeInBytes":75898},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_ethereum_crypto_905572ae21.jpg","hash":"thumbnail_ethereum_crypto_905572ae21","mime":"image/jpeg","name":"thumbnail_ethereum-crypto.jpg","path":null,"size":10.26,"width":245,"height":138,"sizeInBytes":10255}},"hash":"ethereum_crypto_905572ae21","ext":".jpg","mime":"image/jpeg","size":136.52,"url":"/uploads/ethereum_crypto_905572ae21.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-24T18:28:31.427Z","updatedAt":"2025-02-24T18:28:31.427Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6170,"attributes":{"date":"2025-02-24T18:25:49.360Z","title":"EU sanctions North Korean tied to Lazarus group over involvement in Ukraine war ","editor":{"data":{"id":12,"attributes":{"name":"Daryna Antoniuk"}}},"editors":{"data":[]},"page":{"data":{"id":10720,"attributes":{"slug":"/eu-sanctions-north-korea-ukraine-war-lazarus-group"}}},"image":{"id":6656,"alt":"Kaja Kallas, EU","caption":"Kaja Kallas, EU high representative for foreign affairs and security policy, speaks at a news conference on February 24, 2025, in Brussels. Image: European Council","desktop":{"data":{"id":8720,"attributes":{"name":"560ea35b-a824-4998-a0a4-745b387f4f71.jpg","alternativeText":"Kaja Kallas, EU high representative for foreign affairs and security policy, speaks at a news conference on February 24, 2025, in Brussels. Image: European Council","caption":"Kaja Kallas, EU high representative for foreign affairs and security policy, speaks at a news conference on February 24, 2025, in Brussels. Image: European Council","width":1085,"height":630,"formats":{"large":{"ext":".jpg","url":"/uploads/large_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332.jpg","hash":"large_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332","mime":"image/jpeg","name":"large_560ea35b-a824-4998-a0a4-745b387f4f71.jpg","path":null,"size":51.01,"width":1000,"height":581,"sizeInBytes":51006},"small":{"ext":".jpg","url":"/uploads/small_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332.jpg","hash":"small_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332","mime":"image/jpeg","name":"small_560ea35b-a824-4998-a0a4-745b387f4f71.jpg","path":null,"size":18.79,"width":500,"height":290,"sizeInBytes":18792},"medium":{"ext":".jpg","url":"/uploads/medium_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332.jpg","hash":"medium_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332","mime":"image/jpeg","name":"medium_560ea35b-a824-4998-a0a4-745b387f4f71.jpg","path":null,"size":33.3,"width":750,"height":435,"sizeInBytes":33302},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332.jpg","hash":"thumbnail_560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332","mime":"image/jpeg","name":"thumbnail_560ea35b-a824-4998-a0a4-745b387f4f71.jpg","path":null,"size":6.95,"width":245,"height":142,"sizeInBytes":6947}},"hash":"560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332","ext":".jpg","mime":"image/jpeg","size":57.63,"url":"/uploads/560ea35b_a824_4998_a0a4_745b387f4f71_c6763b8332.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-24T18:23:28.153Z","updatedAt":"2025-02-24T18:25:02.837Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6169,"attributes":{"date":"2025-02-24T17:44:12.496Z","title":"Screens at HUD display AI video of Donald Trump sucking Elon Musk’s toes","editor":{"data":{"id":39,"attributes":{"name":"Suzanne Smalley"}}},"editors":{"data":[]},"page":{"data":{"id":10719,"attributes":{"slug":"/hud-fake-video-musk-trump"}}},"image":{"id":6655,"alt":"HUD building","caption":"Image: HUD via Flickr","desktop":{"data":{"id":8719,"attributes":{"name":"42079974750_23c36f3756_o.jpg","alternativeText":"Department of Housing and Urban Development building, Washington, D.C. Image: HUD via Flickr","caption":"Department of Housing and Urban Development building, Washington, D.C. Image: HUD via Flickr","width":1085,"height":630,"formats":{"large":{"ext":".jpg","url":"/uploads/large_42079974750_23c36f3756_o_e41635b43a.jpg","hash":"large_42079974750_23c36f3756_o_e41635b43a","mime":"image/jpeg","name":"large_42079974750_23c36f3756_o.jpg","path":null,"size":96.25,"width":1000,"height":581,"sizeInBytes":96245},"small":{"ext":".jpg","url":"/uploads/small_42079974750_23c36f3756_o_e41635b43a.jpg","hash":"small_42079974750_23c36f3756_o_e41635b43a","mime":"image/jpeg","name":"small_42079974750_23c36f3756_o.jpg","path":null,"size":34,"width":500,"height":290,"sizeInBytes":34002},"medium":{"ext":".jpg","url":"/uploads/medium_42079974750_23c36f3756_o_e41635b43a.jpg","hash":"medium_42079974750_23c36f3756_o_e41635b43a","mime":"image/jpeg","name":"medium_42079974750_23c36f3756_o.jpg","path":null,"size":62.73,"width":750,"height":435,"sizeInBytes":62730},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_42079974750_23c36f3756_o_e41635b43a.jpg","hash":"thumbnail_42079974750_23c36f3756_o_e41635b43a","mime":"image/jpeg","name":"thumbnail_42079974750_23c36f3756_o.jpg","path":null,"size":11.31,"width":245,"height":142,"sizeInBytes":11307}},"hash":"42079974750_23c36f3756_o_e41635b43a","ext":".jpg","mime":"image/jpeg","size":106.93,"url":"/uploads/42079974750_23c36f3756_o_e41635b43a.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-24T17:43:18.707Z","updatedAt":"2025-02-24T17:43:54.972Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6168,"attributes":{"date":"2025-02-24T15:01:58.892Z","title":"Australia bans government use of Kaspersky software over Russian espionage concerns","editor":{"data":{"id":12,"attributes":{"name":"Daryna Antoniuk"}}},"editors":{"data":[]},"page":{"data":{"id":10718,"attributes":{"slug":"/kaspersky-australia-government-ban"}}},"image":{"id":6654,"alt":"Kaspersky","caption":"Image: Eugene Kaspersky via Flickr / CC BY-NC-SA 2.0","desktop":{"data":{"id":7589,"attributes":{"name":"53198625970_2fe605bc38_o.jpg","alternativeText":"Image: Eugene Kaspersky / Flickr / CC BY-NC-SA 2.0","caption":"Image: Eugene Kaspersky / Flickr / CC BY-NC-SA 2.0","width":1085,"height":630,"formats":{"large":{"ext":".jpg","url":"/uploads/large_53198625970_2fe605bc38_o_5c2faef58c.jpg","hash":"large_53198625970_2fe605bc38_o_5c2faef58c","mime":"image/jpeg","name":"large_53198625970_2fe605bc38_o.jpg","path":null,"size":32.5,"width":1000,"height":581,"sizeInBytes":32504},"small":{"ext":".jpg","url":"/uploads/small_53198625970_2fe605bc38_o_5c2faef58c.jpg","hash":"small_53198625970_2fe605bc38_o_5c2faef58c","mime":"image/jpeg","name":"small_53198625970_2fe605bc38_o.jpg","path":null,"size":12.24,"width":500,"height":290,"sizeInBytes":12236},"medium":{"ext":".jpg","url":"/uploads/medium_53198625970_2fe605bc38_o_5c2faef58c.jpg","hash":"medium_53198625970_2fe605bc38_o_5c2faef58c","mime":"image/jpeg","name":"medium_53198625970_2fe605bc38_o.jpg","path":null,"size":21.31,"width":750,"height":435,"sizeInBytes":21311},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_53198625970_2fe605bc38_o_5c2faef58c.jpg","hash":"thumbnail_53198625970_2fe605bc38_o_5c2faef58c","mime":"image/jpeg","name":"thumbnail_53198625970_2fe605bc38_o.jpg","path":null,"size":4.55,"width":245,"height":142,"sizeInBytes":4546}},"hash":"53198625970_2fe605bc38_o_5c2faef58c","ext":".jpg","mime":"image/jpeg","size":36.12,"url":"/uploads/53198625970_2fe605bc38_o_5c2faef58c.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2024-06-20T20:03:36.503Z","updatedAt":"2025-02-24T15:00:57.852Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6167,"attributes":{"date":"2025-02-21T20:38:53.717Z","title":"GOP megadonor becomes new Clearview AI co-CEO","editor":{"data":{"id":39,"attributes":{"name":"Suzanne Smalley"}}},"editors":{"data":[]},"page":{"data":{"id":10717,"attributes":{"slug":"/clearview-ai-new-top-executives"}}},"image":{"id":6653,"alt":"Clearview AI","caption":null,"desktop":{"data":{"id":8718,"attributes":{"name":"clearview-ai-crowd2.png","alternativeText":null,"caption":null,"width":1080,"height":630,"formats":{"large":{"ext":".png","url":"/uploads/large_clearview_ai_crowd2_75fa281ac8.png","hash":"large_clearview_ai_crowd2_75fa281ac8","mime":"image/png","name":"large_clearview-ai-crowd2.png","path":null,"size":795.85,"width":1000,"height":583,"sizeInBytes":795847},"small":{"ext":".png","url":"/uploads/small_clearview_ai_crowd2_75fa281ac8.png","hash":"small_clearview_ai_crowd2_75fa281ac8","mime":"image/png","name":"small_clearview-ai-crowd2.png","path":null,"size":222.85,"width":500,"height":292,"sizeInBytes":222848},"medium":{"ext":".png","url":"/uploads/medium_clearview_ai_crowd2_75fa281ac8.png","hash":"medium_clearview_ai_crowd2_75fa281ac8","mime":"image/png","name":"medium_clearview-ai-crowd2.png","path":null,"size":466.28,"width":750,"height":438,"sizeInBytes":466276},"thumbnail":{"ext":".png","url":"/uploads/thumbnail_clearview_ai_crowd2_75fa281ac8.png","hash":"thumbnail_clearview_ai_crowd2_75fa281ac8","mime":"image/png","name":"thumbnail_clearview-ai-crowd2.png","path":null,"size":67.77,"width":245,"height":143,"sizeInBytes":67771}},"hash":"clearview_ai_crowd2_75fa281ac8","ext":".png","mime":"image/png","size":186.71,"url":"/uploads/clearview_ai_crowd2_75fa281ac8.png","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-21T20:45:52.469Z","updatedAt":"2025-02-21T20:45:52.469Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}},{"id":6166,"attributes":{"date":"2025-02-21T19:49:06.392Z","title":"Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms","editor":{"data":{"id":21,"attributes":{"name":"James Reddick"}}},"editors":{"data":[]},"page":{"data":{"id":10716,"attributes":{"slug":"/hackers-drained-bybit-crypto-exchange-hack"}}},"image":{"id":6652,"alt":"bybit","caption":"Image: Unsplash/Bybit","desktop":{"data":{"id":8716,"attributes":{"name":"bybit.jpg","alternativeText":"bybit","caption":"Image: Unsplash/Bybit","width":1085,"height":610,"formats":{"large":{"ext":".jpg","url":"/uploads/large_bybit_5758daf8b7.jpg","hash":"large_bybit_5758daf8b7","mime":"image/jpeg","name":"large_bybit.jpg","path":null,"size":24.67,"width":1000,"height":562,"sizeInBytes":24668},"small":{"ext":".jpg","url":"/uploads/small_bybit_5758daf8b7.jpg","hash":"small_bybit_5758daf8b7","mime":"image/jpeg","name":"small_bybit.jpg","path":null,"size":9.8,"width":500,"height":281,"sizeInBytes":9804},"medium":{"ext":".jpg","url":"/uploads/medium_bybit_5758daf8b7.jpg","hash":"medium_bybit_5758daf8b7","mime":"image/jpeg","name":"medium_bybit.jpg","path":null,"size":16.82,"width":750,"height":422,"sizeInBytes":16824},"thumbnail":{"ext":".jpg","url":"/uploads/thumbnail_bybit_5758daf8b7.jpg","hash":"thumbnail_bybit_5758daf8b7","mime":"image/jpeg","name":"thumbnail_bybit.jpg","path":null,"size":4.03,"width":245,"height":138,"sizeInBytes":4027}},"hash":"bybit_5758daf8b7","ext":".jpg","mime":"image/jpeg","size":26.8,"url":"/uploads/bybit_5758daf8b7.jpg","previewUrl":null,"provider":"local","provider_metadata":null,"createdAt":"2025-02-21T19:48:13.232Z","updatedAt":"2025-02-21T19:48:13.232Z"}}},"tablet":{"data":null},"mobile":{"data":null}}}}],"rfFeedArticles":[{"title":"Stimmen aus Moskau: Russian Influence Operations Target German Elections","link":"https://www.recordedfuture.com/research/stimmen-aus-moskau-russian-influence-operations-target-german-elections","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/Main_Feature_65c13c676d.png","length":"0","type":"image/png"}},{"title":"RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers","link":"https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/Main_Feature_2_08af644e66.png","length":"0","type":"image/png"}},{"title":"Inside the Scam: North Korea’s IT Worker Threat","link":"https://www.recordedfuture.com/research/inside-the-scam-north-koreas-it-worker-threat","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/Main_Feature_1_dd9f012ba7.png","length":"0","type":"image/png"}},{"title":"The Risk of a Taiwan Invasion Is Rising Fast","link":"https://www.recordedfuture.com/research/risk-taiwan-invasion-rising","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/risk_taiwan_invasion_rising_953050d7fe.png","length":"0","type":"image/png"}},{"title":"TAG-124’s Multi-Layered TDS Infrastructure and Extensive User Base","link":"https://www.recordedfuture.com/research/tag-124-multi-layered-tds-infrastructure-extensive-user-base","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/tag_124_multi_layered_TDS_infrastructure_extensive_user_base_420a021258.jpg","length":"0","type":"image/jpg"}},{"title":"2024 Annual Report","link":"https://www.recordedfuture.com/research/2024-annual-report","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/2024_annual_report_46f62c51ea.jpg","length":"0","type":"image/jpg"}},{"title":"\"Crazy Evil\" Cryptoscam Gang: Unmasking a Global Threat in 2024","link":"https://www.recordedfuture.com/research/crazy-evil-cryptoscam-gang","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/crazy_evil_cryptoscam_gang_329447bf75.jpg","length":"0","type":"image/jpg"}},{"title":"Annual Payment Fraud Intelligence Report: 2024","link":"https://www.recordedfuture.com/research/annual-payment-fraud-intelligence-report-2024","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/annual_payment_fraud_Main_700596c9df.jpg","length":"0","type":"image/jpg"}},{"title":"Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain","link":"https://www.recordedfuture.com/research/reddelta-chinese-state-sponsored-group-targets-mongolia-taiwan-southeast-asia","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/reddelta_chinese_state_sponsored_group_targets_mongolia_taiwan_southeast_asia_Main_d14be68739.jpg","length":"0","type":"image/jpg"}},{"title":"Tracking Deployment of Russian Surveillance Technologies in Central Asia and Latin America","link":"https://www.recordedfuture.com/research/tracking-deployment-russian-surveillance-technologies-central-asia-latin-america","enclosure":{"url":"https://cms.recordedfuture.com/uploads/format_webp/tracking_deployment_russian_surveillance_technologies_central_asia_and_latin_america_3294a281df.jpg","length":"0","type":"image/jpg"}}],"previewMode":false},"__N_SSG":true},"page":"/[[...slug]]","query":{"slug":["subscribe"]},"buildId":"wjcaPKSdTb3sCJ4t2_NPu","isFallback":false,"isExperimentalCompile":false,"gsp":true,"scriptLoader":[]}</script></body></html>