Online platforms are running large language models at every stage of LLM content moderation, from generating training data to auditing…
Browsing: Abuse
OpenAI has announced a new public safety bug bounty program focused on AI-specific abuse and safety risks in its products.…
The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware…
Ravie LakshmananMar 19, 2026Cybersecurity / Hacking News ThreatsDay Bulletin is back on The Hacker News, and this week feels off…
Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a new security feature as part of Android Advanced…
Cloud intrusions are unfolding on shorter timelines, with attackers leaning more on unpatched software and compromised identities. H2 2025 distribution…
Threat actors are abusing the special-use “.arpa” domain and IPv6 reverse DNS in phishing campaigns that more easily evade…
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to…
Microsoft has rewritten the Bing Webmaster Guidelines to cover how content appears in both traditional search results and Copilot’s AI-generated…
SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide…
