Linkedin
Mail
Twitter
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
Search
About Piracy Monitor
Be a Sponsor
About tvstrategies
Contact
Linkedin
Mail
Twitter
Piracy Monitor
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
Android vulnerability lets attackers install and run programs, change data, create...
October 1, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
IBM: 51% of data breaches resulted from malicious attacks. AI both...
August 5, 2025
Protecting streaming services from CDN leeching: a critical imperative
March 24, 2025
Protecting infrastructure: US agencies respond to Salt Typhoon cyberattack campaign, publish...
December 7, 2024
Leak Alert: 2 billion rows of sensitive data exposed on Telegram
November 21, 2024
Comcast publishes 2024 Cybersecurity Threat Report. Comcast contractor hit with cyberattack
October 8, 2024
Texas fines Meta $1.4B for biometric privacy violations. Could Google be...
August 5, 2024
Source code for Italy’s Piracy Shield platform published on GitHub, likely...
March 29, 2024
DISH Network: Cybercrooks took nearly 300,000 records, was costly to remediate
May 11, 2023
Australia’s 2022 Annual Cyber Threat Report applies to threats seen worldwide
November 4, 2022
Zoom: Are your video conferences safe?
April 7, 2020
New Jersey: US state warns of cyberthreats tied to coronavirus
March 16, 2020
How’s your cybersecurity game going?
February 27, 2020
“Cablehaunt” flaw exposes some cable modems to exploits
January 10, 2020
Industry consortium promotes cybersecurity interoperability
October 10, 2019
Northeastern U & Imperial College: Smart TVs send private information
September 19, 2019
1
2
Page 1 of 2
Recent News
Google Gemini AI can data-mine you and now, your Google Workspace....
November 6, 2025
UEFA and Europol renew collaboration MOU for joint investigations and other...
November 5, 2025
Philippines: Popular actors appeal against piracy and cyber risks in new...
November 3, 2025