Sources
Hacker News
- Known Purpose and Trusted Potential 43 min 43 sec old
- I Might've Been a Rocket Scientist (Like My Dad), but I Was a Girl 51 min 3 sec old
- Revengate Development Log 58 min 58 sec old
- Will Better Superconductors Transform the World? 1 hour 1 min old
- The Iberian lynx doubles its population in just three years 1 hour 6 min old
- Gemini In, Gemini Out 1 hour 9 min old
- The MSI Claw is an embarrassment 1 hour 16 min old
- RISC vs. CISC by John R. Mashey (1995) 1 hour 17 min old
- The Myth of Medieval Small Beer (2017) 1 hour 18 min old
- How do you guys monitor your cron jobs? 1 hour 20 min old
SlashDot
- Robot Dogs Armed With AI-aimed Rifles Undergo US Marines Special Ops Evaluation 2 hours 34 min old
- Why a 'Frozen' Distribution Linux Kernel Isn't the Safest Choice for Security 4 hours 45 min old
- Are AI-Generated Search Results Still Protected by Section 230? 7 hours 47 min old
- How an 'Unprecedented' Google Cloud Event Wiped Out a Major Customer's Account 8 hours 50 min old
- Eight Automakers Grilled by US Lawmakers Over Sharing of Connected Car Data With Police 9 hours 51 min old
- Study Confirms Einstein Prediction: Black Holes Have a 'Plunging Region' 11 hours 10 sec old
- 'Google Domains' Starts Migrating to Squarespace 11 hours 10 sec old
- Is America's Defense Department 'Rushing to Expand' Its Space War Capabilities? 12 hours 6 min old
- Cruise Reached an $8M+ Settlement With the Person Dragged Under Its Robotaxi 13 hours 12 min old
- Bruce Schneier Reminds LLM Engineers About the Risks of Prompt Injection Vulnerabilities 14 hours 14 min old
CNET Feed
- Best Office Chairs of 2024 - CNET 10 hours 7 min old
- Best Galaxy Watch Deals: Free With Trade-In or Get $60 Off a Galaxy Watch 6, Up to $197 Off Galaxy Watch 5 Pro - CNET 11 hours 13 min old
- Tyson Fury vs. Oleksandr Usyk Livestream: When It Starts and How to Watch Heavyweight Boxing Fight - CNET 11 hours 37 min old
- Best Vitamins for Hair Growth - CNET 11 hours 37 min old
- Bought a New iPhone 15? Try These USB-C Accessories First - CNET 11 hours 37 min old
- The 8 Best Grocery Delivery Services in 2024 - CNET 12 hours 7 min old
- Best iPhone 15 Deals: Get a Free Phone With a Trade-In or New Line - CNET 14 hours 7 min old
- I Could Never Afford a Home in LA. Then I Discovered Tiny Homes - CNET 14 hours 32 min old
- 7 Techniques to Transform How You Manage Your Depression - CNET 15 hours 37 min old
- The Preakness Stakes 2024: How to Watch Today's Race From Anywhere - CNET 16 hours 7 min old
Wired Security
- US Official Warns a Cell Network Flaw Is Being Exploited for Spying 20 hours 37 min old
- Android 15 Theft Detection Lock Knows When Your Phone Is Stolen 3 days 13 hours old
- Secrecy Concerns Mount Over Spy Powers Targeting US Data Centers 4 days 14 hours old
- Internal Emails Show How a Controversial Gun-Detection System Found Its Way to NYC 5 days 13 hours old
- The $2.3 Billion Tornado Cash Case Is a Pivotal Moment for Crypto Privacy 5 days 16 hours old
- Welcome to the Laser Wars 5 days 21 hours old
- Microsoft Deploys Generative AI for US Spies 1 week 20 hours old
- ‘TunnelVision’ Attack Leaves Nearly All VPNs Vulnerable to Spying 1 week 1 day old
- Top FBI Official Urges Agents to Use Warrantless Wiretaps on US Soil 1 week 3 days old
- A (Strange) Interview the Russian-Military-Linked Hackers Targeting US Water Utilities 1 week 3 days old
Security Week
- A Former OpenAI Leader Says Safety Has ‘Taken a Backseat to Shiny Products’ at the AI Company 1 day 11 hours old
- User Outcry as Slack Scrapes Customer Data for AI Model Training 1 day 13 hours old
- In Other News: MediSecure Hack, Scattered Spider Targeted by FBI, New Wi-Fi Attack 1 day 16 hours old
- CISA Warns of Exploited Vulnerabilities in EOL D-Link Products 1 day 17 hours old
- Critical Flaw in AI Python Package Can Lead to System and Data Compromise 1 day 17 hours old
- New ‘Antidot’ Android Trojan Allows Cybercriminals to Hack Devices, Steal Data 1 day 19 hours old
- Microsoft Quick Assist Tool Abused for Ransomware Delivery 1 day 19 hours old
- Woman Accused of Helping North Korean IT Workers Infiltrate Hundreds of US Firms 1 day 21 hours old
- C/side Emerges From Stealth Mode With $1.7 Million Investment 1 day 21 hours old
- Alkira Raises $100 Million for Secure Network Infrastructure Platform 2 days 15 hours old
EFF
- EFF to Court: Electronic Ankle Monitoring Is Bad. Sharing That Data Is Even Worse. 1 day 12 hours old
- EFF Urges Ninth Circuit to Hold Montana’s TikTok Ban Unconstitutional 1 day 13 hours old
- Fair Use Still Protects Histories and Documentaries—Even Tiger King 3 days 10 hours old
- The Cybertiger Strikes Again! EFF's 8th Annual Tech Trivia Night 3 days 12 hours old
- Coalition to Calexico: Think Twice About Reapproving Border Surveillance Tower Next to a Public Park 4 days 10 hours old
- One (Busy) Day in the Life of EFF’s Activism Team 4 days 11 hours old
- Speaking Freely: Mohamed El Gohary 4 days 12 hours old
- Big Tech to EU: "Drop Dead" 5 days 13 hours old
- Victory! FCC Closes Loopholes and Restores Net Neutrality 5 days 14 hours old
- The FBI is Playing Politics with Your Privacy 1 week 1 day old
Graham Cluely Security Blog
- Nissan reveals ransomware attack exposed 53,000 workers’ social security numbers 1 day 12 hours old
- BreachForums seized! One of the world’s largest hacking forums is taken down by the FBI… again 2 days 15 hours old
- Smashing Security podcast #372: The fake deepfake, and Estate insecurity 3 days 7 hours old
- Black Basta ransomware group’s techniques evolve, as FBI issues new warning in wake of hospital attack 4 days 20 hours old
- Prison for cybersecurity expert selling private videos from inside 400,000 homes 5 days 13 hours old
- Boeing refused to pay $200 million LockBit ransomware demand 1 week 1 day old
- $10 million reward offer for apprehension of unmasked LockBit ransomware leader 1 week 2 days old
- FBI warns US retailers that hackers are targeting their gift card systems 1 week 2 days old
- Cancer patients’ sensitive information accessed by “unidentified parties” after being left exposed by screening lab for years 1 week 2 days old
- Smashing Security podcast #371: Unmasking LockBitsupp, company extortion, and a Tinder fraudster 1 week 3 days old
Security Wire Daily News
- Balancing generative AI cybersecurity risks and rewards 1 day 14 hours old
- How AI-driven patching could transform cybersecurity 1 day 18 hours old
- An overview of storage encryption for enterprises 1 day 21 hours old
- What LockBitSupp charges mean for ransomware investigations 2 days 18 hours old
- IBM sells QRadar SaaS assets to Palo Alto Networks 2 days 19 hours old
- Worldcoin explained: Everything you need to know 2 days 19 hours old
- Lessons learned from high-profile data breaches 3 days 16 hours old
- Common Vulnerability Scoring System (CVSS) 3 days 21 hours old
- 8 WSUS alternatives for patch management 3 days 21 hours old
- AI-driven attacks seen as chief cloud security threat 3 days 22 hours old
Computer Weekly Feed
- Why the UK needs to fix its broken IT security market 1 day 17 hours old
- Report highlights disagreement among experts on AI safety 1 day 19 hours old
- Post Office CEO Paula Vennells ‘didn’t believe there were miscarriages of justice,’ inquiry told 1 day 21 hours old
- IT Sustainability Think Tank: Helping CIOs and IT directors navigate the green IT landscape 1 day 21 hours old
- Post Office considered asking Computer Weekly to review Horizon IT system 2 days 49 min old
- Post Office IT boss failed to raise concern over false Horizon statements 2 days 18 hours old
- Sunak warned against changing foreign student visa rules 2 days 22 hours old
- US authorities crack BreachForums for a second time 3 days 16 hours old
- GCHQ to protect politicians and election candidate’s from cyber-attacks 3 days 17 hours old
- Cyber Safety Force wants to change conversation around risk 3 days 18 hours old
ZDNet Security
- Are all Linux vendor kernels insecure? A new study says yes, but there's a fix 2 days 10 hours old
- Google patches another zero-day exploit in Chrome - and this one affects Edge too 2 days 15 hours old
- Google unveils new Android 15 security updates: What you need to know 3 days 13 hours old
- Hacker claims to have stolen Dell customer data - here's how to protect yourself 3 days 22 hours old
- Lawmakers' Section 230 ultimatum to Big Tech: Work together to make the internet safer, or else 4 days 10 hours old
- Meet Hackbat: An open-source, more powerful Flipper Zero alternative 4 days 12 hours old
- iOS and Android owners will now be alerted if an unknown tracker is moving with them 4 days 18 hours old
- Google is planning on a fix to prevent accidental password deletion in Chrome 4 days 19 hours old
- The best VPN deals right now 5 days 9 hours old
- Update your Chrome browser ASAP. Google has confirmed a zero-day exploited in the wild 1 week 1 day old
The Security Ledger
- Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk 2 days 17 hours old
- Screening Your Supply Chain: How Far Will You Go For Cybersecurity? 3 days 19 hours old
- Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape 2 weeks 2 days old
Malware Bytes Security
- Deleted iPhone photos show up again after iOS update 2 days 17 hours old
- Scammers can easily phish your multi-factor authentication codes. Here’s how to avoid it 2 days 18 hours old
- Notorious data leak site BreachForums seized by law enforcement 3 days 10 hours old
- Apple and Google join forces to stop unwanted tracking 3 days 18 hours old
- Update Chrome now! Google releases emergency security patch 4 days 17 hours old
- Why car location tracking needs an overhaul 5 days 19 hours old
- A week in security (May 6 – May 12) 5 days 23 hours old
- Dell notifies customers about data breach 1 week 1 day old
- DocGo patient health data stolen in cyberattack 1 week 2 days old
- Desperate Taylor Swift fans defrauded by ticket scams 1 week 3 days old
US-Cert Current Activity
- Cisco Releases Security Updates for Multiple Products 2 days 18 hours old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 2 days 18 hours old
- CISA Releases Seventeen Industrial Control Systems Advisories 2 days 18 hours old
- Adobe Releases Security Updates for Multiple Products 3 days 18 hours old
- CISA and Partners Release Guidance for Civil Society Organizations on Mitigating Cyber Threats with Limited Resources 4 days 18 hours old
- CISA Releases Four Industrial Control Systems Advisories 4 days 18 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 4 days 18 hours old
- Microsoft Releases May 2024 Security Updates 4 days 18 hours old
- Apple Releases Security Updates for Multiple Products 4 days 18 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 5 days 18 hours old
Google Security Blog
- I/O 2024: What’s new in Android security and privacy 3 days 13 hours old
- Google and Apple deliver support for unwanted tracking alerts in Android and iOS 5 days 13 hours old
- Your Google Account allows you to create passkeys on your phone, computer and security keys 2 weeks 2 days old
- Detecting browser data theft using Windows Event Logs 2 weeks 4 days old
- How we fought bad apps and bad actors in 2023 2 weeks 5 days old
- Accelerating incident response using generative AI 3 weeks 1 day old
- Uncovering potential threats to your web application by leveraging security reports 3 weeks 4 days old
Microsoft Malware Protection Center
- Threat actors misusing Quick Assist in social engineering attacks leading to ransomware 3 days 14 hours old
- Microsoft is again named a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management 5 days 14 hours old
- How implementing a trust fabric strengthens identity and network 1 week 3 days old
- Microsoft announces the 2024 Microsoft Security Excellence Awards winners 1 week 4 days old
- New capabilities to help you secure your AI transformation 1 week 5 days old
- Security above all else—expanding Microsoft’s Secure Future Initiative 2 weeks 1 day old
- Microsoft introduces passkeys for consumer accounts 2 weeks 2 days old
- Microsoft named overall leader in KuppingerCole Leadership Compass for ITDR 2 weeks 3 days old
- “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps 2 weeks 3 days old
- Investigating industrial control systems using Microsoft’s ICSpector open-source framework 3 weeks 2 days old
Security Now
- SN 974: Microsoft's Head in the Clouds - 4-Digit Pins, Long Range Navigation, Microsoft 4 days 6 hours old
- SN 973: Not So Fast - GPS Vulnerabilites, VPN Flaw 1 week 4 days old
- SN 972: Passkeys: A Shattered Dream? - IoT Default Passwords, Passkeys 2 weeks 4 days old
- SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo 3 weeks 4 days old
KrebsOnSecurity
- Patch Tuesday, May 2024 Edition 4 days 10 hours old
- How Did Authorities Identify the Alleged Lockbit Boss? 5 days 19 hours old
- U.S. Charges Russian Man as Boss of LockBit Ransomware Group 1 week 4 days old
- Why Your VPN May Not Be As Secure As It Claims 1 week 5 days old
- Man Who Mass-Extorted Psychotherapy Patients Gets Six Years 2 weeks 4 days old
- FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data 2 weeks 5 days old
- Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme 3 weeks 5 days old
Guardian Security
- AFL players call for data protection overhaul as concerns include drug test results 4 days 21 hours old
- MoD contractor hacked by China failed to report breach for months 1 week 1 day old
- UK armed forces’ personal data hacked in MoD breach 1 week 5 days old
- No more 12345: devices with weak passwords to be banned in UK 2 weeks 6 days old
- Change the law on computer evidence with an amendment to data protection bill | Letter 3 weeks 5 days old
InfoWorld
- 7 application security startups at RSAC 2024 4 days 21 hours old
- GitHub takes aim at software supply chain security 1 week 2 days old
- Does cloud security have a bad reputation? 1 week 4 days old
- Understanding Microsoft’s Trusted Signing service 2 weeks 2 days old
Cloud Security Briefing: News and Advice
- How to create a cloud security policy, step by step 5 days 21 hours old
- RSA Conference 2024 focuses on collaboration, resilience 2 weeks 4 days old
- Cloud Security Alliance (CSA) 2 weeks 4 days old
- How SASE convergence affects organizational silos 2 weeks 4 days old
- Top 11 cloud security challenges and how to combat them 2 weeks 5 days old
- Explore CASB use cases before you decide to buy 3 weeks 5 days old
US-Cert Alerts
- #StopRansomware: Black Basta 1 week 1 day old
- Delta Electronics CNCSoft-G2 DOPSoft DPAX 2 weeks 4 days old
Security Wire Weekly
- What is PCI DSS (Payment Card Industry Data Security Standard)? 2 weeks 2 days old
- Cloud Security Alliance (CSA) 2 weeks 4 days old