ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022
Security Week News Feed
- Healthcare IT Help Desk Employees Targeted in Payment-Hijacking Attacks April 8, 2024
- Key Lawmakers Float New Rules for Personal Data Protection; Bill Would Make Privacy a Consumer Right April 8, 2024
- Confidential VMs Hacked via New Ahoi Attacks April 8, 2024
- Company Offering $30 Million for Android, iOS, Browser Zero-Day Exploits April 8, 2024
- Google Adds V8 Sandbox to Chrome April 8, 2024
- NSA Appoints Dave Luber as Cybersecurity Director April 8, 2024
- Enterprise AI Security Firm TrojAI Raises $5.75M in Seed Funding April 7, 2024
- House to Take up Bill to Reauthorize Crucial US Spy Program as Expiration Date Looms April 6, 2024
- Browsing in Incognito Mode Doesn’t Protect You as Much as You Might Think April 6, 2024
- Cisco Warns of Vulnerability in Discontinued Small Business Routers April 5, 2024
WIRED Security News Feed
- AI Scam Calls: How to Protect Yourself, How to Detect April 8, 2024
- A Breakthrough Online Privacy Proposal Hits Congress April 7, 2024
- Best Privacy Browsers (2024): Brave, Safari, Ghostery, Firefox, DuckDuckGo April 6, 2024
- Identity Thief Lived as a Different Man for 33 Years April 6, 2024
- A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask April 4, 2024
- The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind April 3, 2024
- The XZ Backdoor: Everything You Need to Know April 2, 2024
- The Incognito Mode Myth Has Fully Unraveled April 1, 2024
- A Ghost Ship’s Doomed Journey Through the Gate of Tears April 1, 2024
- You Should Update Apple iOS and Google Chrome ASAP March 31, 2024
The Security Ledger News Feed
- Episode 257: Securing Software on Wheels with Dennis Kengo Oka of Synopsys March 28, 2024
- Malicious Python Packages Target Crypto Wallet Recovery Passwords March 12, 2024
- Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity February 21, 2024
- China Calls Out U.S. For Hacking. The Proof? TBD! February 13, 2024
- Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos January 23, 2024
- Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement December 19, 2023
- Dragos Community Defense Program Helps Small Utilities Facing Cyber Attacks December 6, 2023
- FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries December 4, 2023
- BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency November 30, 2023
- Spotlight Podcast: RADICL Is Coming To The Rescue Of Defense SMBs November 21, 2023
Bleeping Computer News Feed
- Notepad++ wants your help in "parasite website" shutdown April 8, 2024
- The new features coming in Windows 11 24H2, expected this fall April 7, 2024
- Home Depot confirms third-party data breach exposed employee info April 7, 2024
- New Windows driver blocks software from changing default web browser April 7, 2024
- US Health Dept warns hospitals of hackers targeting IT help desks April 6, 2024
- Over 92,000 exposed D-Link NAS devices have a backdoor account April 6, 2024
- Recent Windows updates break Microsoft Connected Cache delivery April 5, 2024
- The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack April 5, 2024
- New Ivanti RCE flaw may impact 16,000 exposed VPN gateways April 5, 2024
- Microsoft fixes Windows Sysprep issue behind 0x80073cf2 errors April 5, 2024
Dark Reading News Feed
- The Role of the CISO in Digital Transformation November 27, 2023
- Cyber Threats to Watch Out for in 2024 November 27, 2023
- CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines November 27, 2023
- Ardent Health Hospitals Disrupted After Ransomware Attack November 27, 2023
- General Electric, DARPA Hack Claims Raise National Security Concerns November 27, 2023
- Hamas-Linked APT Wields New SysJoker Backdoor Against Israel November 27, 2023
- Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity November 27, 2023
- Balancing Simplicity and Security in the Digital Experience November 27, 2023
- Hack The Box Launches 5th Annual University CTF Competition November 22, 2023
- Fake Browser Updates Targeting Mac Systems With Infostealer November 22, 2023
Krebs on Security News Feed
- Fake Lawsuit Threat Exposes Privnote Phishing Sites April 4, 2024
- ‘The Manipulaters’ Improve Phishing, Still Fail at Opsec April 3, 2024
- Thread Hijacking: Phishes That Prey on Your Curiosity March 28, 2024
- Recent ‘MFA Bombing’ Attacks Targeting Apple Users March 26, 2024
- Mozilla Drops Onerep After CEO Admits to Running People-Search Networks March 22, 2024
- The Not-so-True People-Search Network from China March 21, 2024
- CEO of Data Privacy Company Onerep.com Founded Dozens of People-Search Firms March 14, 2024
- Patch Tuesday, March 2024 Edition March 12, 2024
- Incognito Darknet Market Mass-Extorts Buyers, Sellers March 11, 2024
- A Close Up Look at the Consumer Data Broker Radaris March 8, 2024
The Hacker News Feed
- Watch Out for 'Latrodectus' - This Malware Could Be In Your Inbox April 8, 2024
- The Drop in Ransomware Attacks in 2024 and What it Means April 8, 2024
- Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme April 8, 2024
- Google Sues App Developers Over Fake Crypto Investment App Scam April 8, 2024
- Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites April 6, 2024
- AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks April 5, 2024
- CISO Perspectives on Complying with Cybersecurity Regulations April 5, 2024
- From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware April 5, 2024
- New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA April 5, 2024
- Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws April 5, 2024