
AI training and content piracy – issues and prospects
In the first part of this article we reported that several major artificial intelligence models have been trained—at least partially—on copyrighted content obtained illegally. This

In the first part of this article we reported that several major artificial intelligence models have been trained—at least partially—on copyrighted content obtained illegally. This

Artificial intelligence, particularly in its form based on Large Language Models (LLMs), relies on the ingestion of very large amounts of textual data. However, revelations

In the first part of our article, we looked at some of the most significant cyberattacks of the past decade. Here, we continue the analysis

Over the past decade, the IT threat landscape has changed radically, marked by spectacular cyberattacks that have shaken businesses, governments, and individuals alike. In our

We saw in the first part of our article why humans can be considered the weakest link in cybersecurity. Faced with the numerous human-induced vulnerabilities,

Despite technological advancements and massive investments in cybersecurity solutions, security breaches continue to occur. The main reason for this is that one of the most

The current video streaming landscape is marked by extreme fragmentation, with more subscriptions required to access a wide catalogue of content. Behind the impressive figures

The terms “pirates” or “hackers” often conjure up stereotypical images from the collective imagination or media representations. We visualize them as computer geniuses, frantically tapping

The year 2024 was marked by a series of significant events in the field of online piracy, reflecting both the ingenuity of cybercriminals and the