Numerous Google Chrome extensions have been found to steal private information. Apple consents to pay $95 million to resolve a protracted class action lawsuit in the United States. A proof-of-concept (PoC) exploit for a Windows security vulnerability that has since been fixed has been made public.

Like Taylor Swift, generative AI has experienced tremendous growth in the last two years. It's currently unknown how many customers were affected by Apple's Siri Privacy Lawsuit, filed in August

2019.

U.S. Treasury sanctions Beijing-based cybersecurity company for cyber attacks. Chinese threat actors gained access to a Remote Support SaaS API key associated with BeyondTrust.

"DoubleClickjacking" bypasses browser isolation to trick users into performing unauthorized actions. The most recent development coincides with the United States' ongoing battle against cyberattacks by other Chinese hacking groups known as Volt Typhoon and Salt Typhoon, which have both targeted the nation's vital infrastructure and telecom networks. and documents that are not classified.

Docomo Pacific and Guam.gov are among the organizations in Guam that Volt Typhoon is reported to have targeted. China has even gone so far as to call the Volt Typhoon a disinformation campaign in order to deny any role in these attacks. Ahmed Maqbul Syed, 57, and Rupesh Chandra Chintakindi, 27, are two Indian nationals accused of conspiring to launder money.

Marriott International and its subsidiary Starwood Hotels are required by the FTC to develop and execute a thorough data security program. Last year, wallet drainer attacks by malicious actors resulted in the theft of $494 million worth of cryptocurrency. The most common attack methods were phishing and private key breaches.

It has been noted that EC2 Grouper uses AWS Tools for PowerShell to execute their attacks. Boost the security of your network with effective, free tools that are made to ward off threats. Every week, CNN Tech takes a unique look at what's going on in the tech industry with The Daily Discussion.

Follow us on Twitter at @jennifer_smith and @cnntech. Being safe online involves more than just technology; it also involves the decisions we make on a daily basis. Small actions can have a big impact, such as refusing to click "yes," keeping your apps up to date, or ignoring a dubious email.

The digital world is changing quickly, but we can stay ahead if we pay a little attention to it. Remember that we are all in this together, keep asking questions, and remain vigilant. I'll see you next week with more information to keep you prepared and informed.