{"entity": "IEEE Spectrum", "url": "https://wpnews.pro/entity/IEEE Spectrum", "count": 2, "articles": [{"slug": "hidden-audio-attacks-on-voice-ai-how-transcription-pipelines-get-hijacked", "title": "Hidden Audio Attacks on Voice AI: How Transcription Pipelines Get Hijacked", "url": "https://wpnews.pro/news/hidden-audio-attacks-on-voice-ai-how-transcription-pipelines-get-hijacked", "published_at": "2026-05-19 00:42:31+00:00"}, {"slug": "learn-what-it-takes-to-become-a-cybersecurity-consultant", "title": "Learn What It Takes to Become a Cybersecurity Consultant", "url": "https://wpnews.pro/news/learn-what-it-takes-to-become-a-cybersecurity-consultant", "published_at": "2026-05-06 18:00:01+00:00"}]}