investigation

investigation news search results

Developer news items we found relating to investigation

35 results
Airline-data-breach-hits-WestJet-exposing-over-1M-passengers

Airline data breach hits WestJet exposing over 1M passengers


Thursday, October 30, 2025 by

Canada’s second-largest airline, WestJet, disclosed that a data breach earlier this year compromised the personal information of approximately 1.2 million passengers. The airline reported the incident in a filing with Maine’s attorney general, confirming that 240 residents in the state were affected. Details of the information compromised The informati...


Salesforce-data-breach-linked-to-Tenable-via-Salesloft-Drift

Salesforce data breach linked to Tenable via Salesloft Drift


Friday, September 12, 2025 by

A recent Salesforce data breach involving the Salesloft Drift integration has affected multiple organizations, including cybersecurity company Tenable. The company confirmed that limited customer contact and support case data were exposed but emphasized that no core product data was compromised. Scope of exposed information Tenable reported that information access...


Hackers-steal-cryptocurrency-using-fake-job-offers-report-reveals

Hackers steal cryptocurrency using fake job offers report reveals


Tuesday, September 9, 2025 by

A recent investigation reveals that North Korean hacking groups are using elaborate fake job offers to steal cryptocurrency from blockchain professionals and investors. The scams, identified in a joint report by cybersecurity firms SentinelOne and Validin, include posing as recruiters for major crypto companies and directing applicants to download malicious software or ...


Tea-App-cybersecurity-incident-update

Tea App cybersecurity incident update


Thursday, August 14, 2025 by

The Tea App has issued an update regarding the cybersecurity incident that occurred on July 25, 2025. During the course of an ongoing investigation, it was discovered that some users’ direct messages (DMs) were accessed as part of the initial breach. As a precautionary measure, the company has disabled DM functionality and taken the affected system offline. Tea...


Microsoft-at-Black-Hat-USA-2025

Microsoft at Black Hat USA 2025


Monday, August 11, 2025 by

Microsoft will participate in Black Hat USA 2025, scheduled for August 5-7 in Las Vegas, offering attendees a practitioner-driven experience centered on real-world threat intelligence, incident response, and applied AI expertise. The company emphasizes that cybersecurity is most effective when intelligence, tools, and domain expertise are tightly integrated. To that end...


CoinDCX-launches-bounty-after-security-breach

CoinDCX launches bounty after security breach


Friday, August 1, 2025 by

CoinDCX, one of the largest cryptocurrency exchanges in India, has issued an official statement following a sophisticated security incident on July 19, 2025, which affected one of its internal operational accounts used solely for liquidity provisioning on a partner exchange. The company emphasized that no customer funds were impacted and that all assets remain secure in...


NIKKE-returns-to-Anime-Expo-2025

NIKKE returns to Anime Expo 2025


Sunday, July 13, 2025 by

Level Infinite recently announced that GODDESS OF VICTORY: NIKKE, the acclaimed sci-fi RPG shooter, is returning to Anime Expo 2025 in Los Angeles with its largest and most immersive showcase to date. Coinciding with the event, the highly anticipated NieR:Automata Collaboration Rerun also launches across PC and mobile platforms, bringing fan-favorite characters, mi...


Cribl-Copilot-Editor-brings-AI-driven-telemetry

Cribl Copilot Editor brings AI-driven telemetry


Wednesday, June 18, 2025 by

Cribl announced Copilot Editor, an advancement in Cribl’s AI-powered telemetry management solution that significantly increases productivity for IT and security professionals, reduces manual effort, all while preventing critical errors through human-in-the-loop controls.  Copilot Editor uses AI to help IT and security teams more easily do schema mapping, t...


Apple-charged-for-illegal-app-store-fees

Apple charged for illegal app store fees


Tuesday, May 13, 2025 by

The European Commission has recently found that Apple is violating the Digital Markets Act (DMA). The DMA requires Apple to allow developers to direct customers outside of apps to make purchases and find other app distribution channels without incurring any charges. Apple has been breaking the law by imposing illegal fees, displaying scare screens, and placing restricti...


Developers-Alliance-reacts-to-european-DMA-investigation

Developers Alliance reacts to european DMA investigation


Wednesday, April 16, 2025 by

Developers Alliance board chair Jake Ward released the following statement in reaction to the European Commission’s findings of non-compliance with the burdensome regulations under the Digital Markets Act (DMA). Developers Alliance reacts to European Commission’s DMA investigation findings "It was harder yesterday to be an app developer in Eu...


OceanGate-Titan-sub-tracking-relied-on-hand-typed-Excel-spreadsheet

OceanGate Titan sub tracking relied on hand-typed Excel spreadsheet


Friday, September 27, 2024 by

In a series of hearings and testimonies surrounding the tragic implosion of the OceanGate Titan submersible, key insights have emerged that shed light on the events leading up to the incident. OceanGate’s founder, Stockton Rush, is currently facing scrutiny as multiple stakeholders examine the safety protocols and operational decisions made by the company. During ...


GenAI-cybersecurity-assistant-lands-from-IBM

GenAI cybersecurity assistant lands from IBM


Friday, August 16, 2024 by

IBM recently announced the introduction of generative AI capabilities to its managed Threat Detection and Response Services utilized by IBM Consulting analysts to advance and streamline security operations for clients. Built on IBM's watsonx data and AI platform, the new IBM Consulting Cybersecurity Assistant is designed to accelerate and improve the identification,...


EU-says-Apple-breached-DMA-regulations

EU says Apple breached DMA regulations


Wednesday, July 10, 2024 by

The AP is among outlets reporting that Apple becomes first target of EU’s new digital competition rules aimed at big tech, reporting: “European Union regulators leveled their first charges under the bloc’s new digital competition rulebook, accusing Apple of preventing app makers from pointing users to cheaper options outside its App Store. The European...


Veracode-acquires-Longbow-Security

Veracode acquires Longbow Security


Thursday, April 18, 2024 by

Veracode announced the acquisition of Longbow Security, a security risk management platform for cloud-native environments. The acquisition marks the next exciting phase of Veracode, underscoring the company’s commitment to help organizations effectively manage and reduce application risk across the growing attack surface. The integration of Longbow in...


Cybersecurity-performance-optimization-updates-from-Logpoint

Cybersecurity performance optimization updates from Logpoint


Friday, February 2, 2024 by

Logpoint is releasing new capabilities to its Converged SIEM platform, enhancing threat detection and security operations and streamlining case management. Organizations can focus on essential security matters with the new capabilities by reducing workload, simplifying automation, and freeing up resources. The new release delivers increased system stability and ...


AI-performance-monitoring-from-Datadog-and-Vertex-AI

AI performance monitoring from Datadog and Vertex AI


Thursday, November 16, 2023 by

Datadog, Inc., the monitoring and security platform for cloud applications, announced an expanded strategic partnership with Google Cloud, which enables Google Cloud customers to proactively observe and secure their cloud-native and hybrid applications within Datadog’s unified platform. As part of the expanded partnership and integrations, Datadog is one of the fi...


Runtime-code-review-from-AppMap-enhances-productivity

Runtime code review from AppMap enhances productivity


Tuesday, November 14, 2023 by

AppMap has announced its innovative Runtime Code Review solution that will transform software quality and the developer experience. AppMap's mission is to deliver actionable insights to developers where they work, and AppMap continues to deliver on the promise with its latest release for the GitHub Marketplace. Unexpected runtime defects account fo...


Is-Temu-safe,-legit,-or-dangerous:-Perspective-from-an-app-developer

Is Temu safe, legit, or dangerous: Perspective from an app developer


Wednesday, July 12, 2023 by

Temu is a shopping website, and app chalked full of products from overseas at ridiculously dirt cheap prices. They have almost everything you can imagine too. From laser pointer slingshots to Expresso makers, the entire ecosystem is built around keeping you shopping with a gamified experience, and it gets addicting quickly. Some of the ADM staff have placed orders an...


Identity-will-hold-the-keys-to-the-kingdom-for-cybercriminals

Identity will hold the keys to the kingdom for cybercriminals


Wednesday, February 8, 2023 by

In 2023, identity will continue to hold the keys to the kingdom for cybercriminals. This is a continuation from 2022, with the Verizon Data Breach Investigations Report (DBIR) attributing 80% of basic web application attacks to the use of stolen credentials like passwords. Security incidents usually involve a variety of techniques, from social engineering to supply chai...


Cryptocurrency-donations-for-churches

Cryptocurrency donations for churches


Thursday, January 27, 2022 by

Each year, River Valley Church hosts an annual event called Kingdom Builders, where they ask church attendees to give generously to different projects including global missions, future leadership development, and local church investment. With eight campuses spread across the Twin Cities of Minnesota, River Valley Church recently partnered with Engiven, a leading cryptoc...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Universal-source-code-search-engine-emerges

Universal source code search engine emerges


Friday, November 22, 2019 by

Sourcegraph announced a new collaboration with GitLab, along with the world’s first universal source code search engine. The company has experienced exponential growth fueled by its expanding community of over 10,000 paid developers and tens of thousands of free open source developers who actively use its platform. “GitLab and Sourcegraph are both oriente...


Instana-announces-new-capabilities

Instana announces new capabilities


Wednesday, November 6, 2019 by

Instana announced new capabilities that make it the only application management solution that can jump right into a log analysis tool with all context of the application and component under investigation. “IT teams responsible for deploying and maintaining today’s mission critical applications must react quickly, especially when attacking service issues,&...


The-DMV-is-selling-driver-data-and-Eve-Maler-weighs-in

The DMV is selling driver data and Eve Maler weighs in


Tuesday, September 24, 2019 by

Motherboard broke the news on September 6 that Departments of Motor Vehicles (DMVs) around the nation have been making millions by selling drivers’ personally identifiable information to thousands of businesses. Amongst the DMVs customers are insurance agencies, tow companies, data brokers and even private investigators – all who are able to purchase records...


Artificial-Intelligence-capabilities-in-Siren-10.3-release

Artificial Intelligence capabilities in Siren 10.3 release


Wednesday, August 21, 2019 by

Siren, an investigative intelligence platform released Siren 10.3. The latest version of Siren launches five new artificial intelligence (AI) capabilities: entity resolution, deep learning-based predictive analytics and alerting, deep learning-based times series anomaly detection, real-time topic clustering for textual corpuses and associative model technology...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


IAST-supports-AppSec-efficiencies-while-cutting-costs-and-headaches

IAST supports AppSec efficiencies while cutting costs and headaches


Monday, November 26, 2018 by

It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....


Changes-to-the-way-notifications-work-in-iOS-12-you-need-to-know

Changes to the way notifications work in iOS 12 you need to know


Wednesday, September 19, 2018 by

iOS 12’s public release has brought about key changes to the way we do notifications. With these changes, Urban Airship urges app publishers to adopt customer-centric messaging best practices to accommodate new user behavior, improve notification visibility and maximize the value that their app can deliver. Granular user controls over notifications, new Grouped No...


DevSecOps-showcase-by-Sumo-Logic-unravels-all-their-new-changes

DevSecOps showcase by Sumo Logic unravels all their new changes


Monday, September 17, 2018 by

Sumo Logic announced a number of new solutions and enhancements to its platform to empower enterprises to "win in the analytics economy." These innovations, as well as those from DevSecOps ecosystem partners, will be showcased this week at Sumo Logic’s user conference, Illuminate, in Burlingame, Calif. Illuminate will gather over 600 experts in machine d...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


Perspective-on-the-Microsoft-v.-US-Supreme-Court-decision-

Perspective on the Microsoft v. US Supreme Court decision


Saturday, April 21, 2018 by

The U.S. Supreme Court has recently decided on a ruling for the Microsoft v. U.S. Supreme Court case. Because of the very important implications that this decision could have on the technology industry, we thought it best to get a legal opinion on what the ruling could mean in the future.Geoffrey Sant is a Partner at the international law firm Dorsey & Whitney LLP a...


Sensory-brings-low-power-wake-words-to-mobile-apps

Sensory brings low power wake words to mobile apps


Monday, April 9, 2018 by

Sensory has announced that it has made a significant breakthrough in running its TrulyHandsfree wake word and speech recognition AI engine directly on Android and iOS smartphone applications at low-power. As a software component, TrulyHandsfree can be adapted to any app without requiring special purpose hardware or DSPs to capture efficiencies in computing.Until now, al...


Featured Stories


Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026




Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026


Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance
Stop Using Business Jargon: 5 Ways Buzzwords Damage Job Performance Tuesday, April 14, 2026


IT spending rises as banks balance legacy and innovation
IT spending rises as banks balance legacy and innovation Monday, April 13, 2026


FCC prohibits new foreign router models citing critical infrastructure risks
FCC prohibits new foreign router models citing critical infrastructure risks Thursday, April 9, 2026


Enviromates tech startup launches global participation platform
Enviromates tech startup launches global participation platform Friday, March 27, 2026


Private Repository Secures the AI-driven Development Boom
Private Repository Secures the AI-driven Development Boom Friday, March 27, 2026


UK Fintech Platform Enviromates Connects Projects Brands and Consumers
UK Fintech Platform Enviromates Connects Projects Brands and Consumers Thursday, March 26, 2026


How Industrial AI Is Transforming Operations in 2026
How Industrial AI Is Transforming Operations in 2026 Wednesday, March 25, 2026


Foresight Secures $25M to Bridge Infrastructure Execution Gap
Foresight Secures $25M to Bridge Infrastructure Execution Gap Tuesday, March 24, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>