The Future Jobs: Robots, Artificial Intelligence, and Digital Platforms in East Asia and Pacific by the World Bank explores how new technologies are reshaping jobs. Robots and automation increase productivity but can replace some routine manual jobs. AI can both replace and assist workers depending on the tasks involved. Dgital platforms are creating new flexible […]
China’s National Computer Network Emergency Response Technical Team warned that the open-source AI agent OpenClaw has weak default security settings that attackers could exploit to gain system control. Attackers can use prompt injection, embedding malicious instructions in web pages to trick the AI into leaking sensitive data. Researchers showed that features like link previews in […]
An international operation led by Europol dismantled LeakBase, a major online forum trading stolen databases and login credentials. Active since 2021, the platform had 142,000+ users and served as a key hub for cybercriminals buying and selling leaked data. On 3–4 March, coordinated actions across multiple countries led to arrests, house searches, and about 100 […]
Security researchers uncovered “Coruna,” a powerful iPhone exploit toolkit containing 23 exploits and five attack chains that can compromise devices. The toolkit can infect iPhones simply by visiting a malicious website, requiring little or no user interaction. Evidence suggests it was originally built for U.S. intelligence contractors, but the tools were leaked. After the leak, […]
On 23 February 2026, a coalition led by the Global Privacy Assembly warned about AI systems generating realistic images and videos of individuals without consent. They highlighted rising harms such as non-consensual intimate imagery, defamation, cyberbullying, and risks to children. Organizations are urged to follow privacy laws, build strong safeguards, ensure transparency, and provide fast […]
The EU Digital Identity Wallet (EUDI Wallet) will allow citizens to create Electronic Signatures legally equivalent to handwritten signatures across the EU. Users can sign contracts directly in their wallet or via certified trust providers, using PIN or biometrics for strong authentication. Such services enable secure online processes like employment contracts, bank onboarding, tax declarations, […]
Switzerland rejected Palantir after a technical review found data leakage cannot be reliably prevented—an architectural, not legal, flaw. The concern isn’t analytics power, but loss of control over data flows, updates, access, and revocation. Germany faces a contradiction: promoting digital sovereignty while using Palantir in several federal states. Bavaria’s Palantir-based VeRA system triggered legal challenges, […]
Europe’s EUDI Wallet can technically replace passwords today with cryptographic, verifiable, privacy-preserving login. Passwords persist only because institutions keep them as legacy fallback options. Public-sector mandates for wallet-based login will spark mass adoption and force IAM vendors to follow. Enterprises and AI-agents will accelerate the shift, as both require verifiable credentials and cannot rely on […]
Logitech reports attackers stole data likely belonging to customers, employees, and suppliers. The breach stemmed from a zero-day flaw in a third-party software platform that has since been patched. Logitech has not disclosed which data types or which platform were affected. The Cl0p ransomware group claims it exploited an Oracle E-Business Suite vulnerability to access […]
One in five top public concerns in the U.S. now involves information manipulation. About 70% of Americans see misinformation/disinformation as major problems, back to 2021 levels. Two-thirds support combating disinformation via education, social media labels, and tougher laws 8 in 10 want schools to teach media literacy and critical evaluation skills. Disinformation ranks alongside illegal […]

