Tag: Germany
-
The Register: Boffins devise technique that lets users prove location without giving it away
Source URL: https://www.theregister.com/2025/05/17/privacy_preserving_location_sharing/ Source: The Register Title: Boffins devise technique that lets users prove location without giving it away Feedly Summary: ZKLP system allows apps to confirm user presence in a region without exposing exactly where Computer scientists from universities in Germany, Hong Kong, and the United Kingdom have proposed a way to provide verifiable…
-
The Cloudflare Blog: Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report
Source URL: https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/ Source: The Cloudflare Blog Title: Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report Feedly Summary: DDoS attacks are surging. In 2025 Q1, Cloudflare blocked +20M attacks (a 358% YoY spike) along with 5.6 Tbps and 4.8 Bpps record-breaking attacks. AI Summary and Description: Yes **Summary:**…
-
Cloud Blog: Google Cloud and Oracle accelerate enterprise modernization with new offerings, regions, and capabilities
Source URL: https://cloud.google.com/blog/products/databases/google-cloud-and-oracle-accelerate-enterprise-modernization/ Source: Cloud Blog Title: Google Cloud and Oracle accelerate enterprise modernization with new offerings, regions, and capabilities Feedly Summary: Supporting customers where they want to be is a core value at Google Cloud, and a big part of the reason that we have partnered with Oracle — so that you can innovate…
-
Cloud Blog: DPRK IT Workers Expanding in Scope and Scale
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/dprk-it-workers-expanding-scope-scale/ Source: Cloud Blog Title: DPRK IT Workers Expanding in Scope and Scale Feedly Summary: Written by: Jamie Collier Since our September 2024 report outlining the Democratic People’s Republic of Korea (DPRK) IT worker threat, the scope and scale of their operations has continued to expand. These individuals pose as legitimate remote workers…
-
Cloud Blog: Cloud CISO Perspectives: How digital sovereignty builds better borders for the future
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-digital-sovereignty-builds-better-borders-future/ Source: Cloud Blog Title: Cloud CISO Perspectives: How digital sovereignty builds better borders for the future Feedly Summary: Welcome to the second Cloud CISO Perspectives for March 2025. Today, Archana Ramamoorthy, senior director of product management, Google Cloud, explains our approach to digital sovereignty and we believe strongly in meeting this vital…
-
AlgorithmWatch: Automating Injustice: “Predictive” policing in Germany
Source URL: https://algorithmwatch.org/en/automating-injustice-predictive-policing-germany/ Source: AlgorithmWatch Title: Automating Injustice: “Predictive” policing in Germany Feedly Summary: The police, criminal justice authorities, and prisons in Germany are increasingly exploring digital possibilities for “predicting" and "preventing" crimes. The report Automating Injustice gives an overview of such systems being developed and deployed in Germany. AI Summary and Description: Yes Summary:…
-
Cisco Talos Blog: Gamaredon campaign abuses LNK files to distribute Remcos backdoor
Source URL: https://blog.talosintelligence.com/gamaredon-campaign-distribute-remcos/ Source: Cisco Talos Blog Title: Gamaredon campaign abuses LNK files to distribute Remcos backdoor Feedly Summary: Cisco Talos is actively tracking an ongoing campaign, targeting users in Ukraine with malicious LNK files which run a PowerShell downloader since at least November 2024. AI Summary and Description: Yes **Summary:** The text details a…
-
Hacker News: Strings Attached: Talking about Russia’s agenda for laws in cyberspace
Source URL: https://bytesandborscht.com/strings-attached-talking-about-russias-agenda-for-laws-in-cyberspace/ Source: Hacker News Title: Strings Attached: Talking about Russia’s agenda for laws in cyberspace Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a critical examination of Russia’s historical and ongoing efforts to reshape international cyberspace regulations under the guise of “information security.” The author argues that these efforts…
-
Cloud Blog: BigQuery datasets now available on Google Cloud Marketplace
Source URL: https://cloud.google.com/blog/topics/partners/get-bigquery-datasets-on-google-cloud-marketplace/ Source: Cloud Blog Title: BigQuery datasets now available on Google Cloud Marketplace Feedly Summary: We are excited to announce the availability of datasets on Google Cloud Marketplace through BigQuery Analytics Hub, opening up new avenues for organizations to power innovative analytics use cases and procure data for enterprise business needs. As a…
-
AlgorithmWatch: As of February 2025: Harmful AI applications prohibited in the EU
Source URL: https://algorithmwatch.org/en/ai-act-prohibitions-february-2025/ Source: AlgorithmWatch Title: As of February 2025: Harmful AI applications prohibited in the EU Feedly Summary: Bans under the EU AI Act become applicable now. Certain risky AI systems which have been already trialed or used in everyday life are from now on – at least partially – prohibited. AI Summary and…