Skip to content
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X’s malvertising protections and propagate malicious links using its artificial intelligence (AI)… 

Google Fined 9 Million by French Regulator for Cookie Consent Violations

Google Fined $379 Million by French Regulator for Cookie Consent Violations

Sep 04, 2025Ravie LakshmananGDPR / Data Privacy The French data protection authority has fined Google and Chinese e-commerce giant Shein $379 million (€325 million) and $175 million (€150 million), respectively, for violating cookie rules. Both… 

CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited

CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited

Sep 04, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, noting that there… 

New HDMI Specification and Authentic HDMI Products Drive High-Performance PC Ecosystem

New HDMI Specification and Authentic HDMI Products Drive High-Performance PC Ecosystem

The latest HDMI® 2.2 Specification was launched in June of this year and it’s important to consider the impact on new product development, upcoming launches and integration support designs and systems. HDMI Technology is the…