Linkedin
Mail
X
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
Search
About Piracy Monitor
Be a Sponsor
About tvstrategies
Contact
Linkedin
Mail
X
Piracy Monitor
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
FBI Alert: Evading Residential Proxy Networks – Protecting your devices from...
March 16, 2026
Android vulnerability lets attackers install and run programs, change data, create...
October 1, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
IBM: 51% of data breaches resulted from malicious attacks. AI both...
August 5, 2025
Protecting streaming services from CDN leeching: a critical imperative
March 24, 2025
Protecting infrastructure: US agencies respond to Salt Typhoon cyberattack campaign, publish...
December 7, 2024
Leak Alert: 2 billion rows of sensitive data exposed on Telegram
November 21, 2024
Comcast publishes 2024 Cybersecurity Threat Report. Comcast contractor hit with cyberattack
October 8, 2024
Texas fines Meta $1.4B for biometric privacy violations. Could Google be...
August 5, 2024
Source code for Italy’s Piracy Shield platform published on GitHub, likely...
March 29, 2024
DISH Network: Cybercrooks took nearly 300,000 records, was costly to remediate
May 11, 2023
Australia’s 2022 Annual Cyber Threat Report applies to threats seen worldwide
November 4, 2022
Zoom: Are your video conferences safe?
April 7, 2020
New Jersey: US state warns of cyberthreats tied to coronavirus
March 16, 2020
How’s your cybersecurity game going?
February 27, 2020
“Cablehaunt” flaw exposes some cable modems to exploits
January 10, 2020
Industry consortium promotes cybersecurity interoperability
October 10, 2019
1
2
Page 1 of 2
Recent News
Analysis: Protect content from unauthorized exploitation by using Visual Semantic Search
March 30, 2026
France: 35% of Ligue 1 Football consumers watch illegally. Pirate blocking...
March 28, 2026
Indonesia: App with 5 million registered users hosted over 60 TB...
March 26, 2026