Linkedin
Mail
X
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
Search
About Piracy Monitor
Be a Sponsor
About tvstrategies
Contact
Linkedin
Mail
X
Piracy Monitor
Home
News Feed
Resources
Piracy Monitor E-Newsletter Archive
Sources of legitimate online streaming offerings
Resources: Research from Government, Academia & NGOs
Resources: Research from Market Reseachers, Industry Orgs and Technology Suppliers
Resources: Technical Standards and Guidelines
Experts
Events
Soap Box
Consulting
Contact
Android vulnerability lets attackers install and run programs, change data, create...
October 1, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
MPA: The Criminal Infrastructure Hiding in Plain Sight: Unmasking Residential Proxies,...
September 24, 2025
IBM: 51% of data breaches resulted from malicious attacks. AI both...
August 5, 2025
Protecting streaming services from CDN leeching: a critical imperative
March 24, 2025
Protecting infrastructure: US agencies respond to Salt Typhoon cyberattack campaign, publish...
December 7, 2024
Leak Alert: 2 billion rows of sensitive data exposed on Telegram
November 21, 2024
Comcast publishes 2024 Cybersecurity Threat Report. Comcast contractor hit with cyberattack
October 8, 2024
Texas fines Meta $1.4B for biometric privacy violations. Could Google be...
August 5, 2024
Source code for Italy’s Piracy Shield platform published on GitHub, likely...
March 29, 2024
DISH Network: Cybercrooks took nearly 300,000 records, was costly to remediate
May 11, 2023
Australia’s 2022 Annual Cyber Threat Report applies to threats seen worldwide
November 4, 2022
Zoom: Are your video conferences safe?
April 7, 2020
New Jersey: US state warns of cyberthreats tied to coronavirus
March 16, 2020
How’s your cybersecurity game going?
February 27, 2020
“Cablehaunt” flaw exposes some cable modems to exploits
January 10, 2020
Industry consortium promotes cybersecurity interoperability
October 10, 2019
Northeastern U & Imperial College: Smart TVs send private information
September 19, 2019
1
2
Page 1 of 2
Recent News
US Trade Rep releases 2025 Review of Notorious Markets for Counterfeiting...
March 5, 2026
Tycoon 2FA phishing-as-a-service platform downed by Europol and a network of...
March 4, 2026
US Trade Representative 2026 ‘Special 301’ report: 87 comments received
February 25, 2026