Categories
CNET
- Project Astra Is the Secret Sauce for Google's Gemini Live AI Advances 2 hours 16 min old , CNET Feed
- Amazon Music Rolls Out AI-Powered Search Feature to Select Users 2 hours 52 min old , CNET Feed
- Google's AI Mode Will Change Your Search Experience. Here's How 3 hours 11 min old , CNET Feed
- Google Positions FireSat to Better Identify Forest Fires From Orbit 3 hours 39 min old , CNET Feed
- Xreal Unveils Project Aura, New AI-Powered Android XR Glasses, at Google I/O 3 hours 39 min old , CNET Feed
- Google's AI-Generated Content Looks a Lot Like Slop to Me 3 hours 56 min old , CNET Feed
- Today's NYT Connections: Sports Edition Hints and Answers for May 21, #240 4 hours 2 min old , CNET Feed
- Today's NYT Strands Hints, Answers and Help for May 21, #444 4 hours 2 min old , CNET Feed
- Today's NYT Connections Hints, Answers and Help for May 21, #710 4 hours 2 min old , CNET Feed
- Today's Wordle Hints, Answer and Help for May 21, #1432 4 hours 2 min old , CNET Feed
Computer Weekly
- In what has been described as a historical first, hackers in Berlin have been able to demo successful attacks on the ESXi hypervisor 8 hours 1 min old , Computer Weekly Feed
- Ireland has a long history of attracting high-tech firms. Building on the EU Chip Act, it now aims to be a leader in semiconductors 9 hours 1 min old , Computer Weekly Feed
- Cold chain services provider Peter Green Chilled, which supplies the likes of Aldi, Sainsbury’s and Tesco, has been forced to halt operations after succumbing to a ransomware attack 9 hours 1 min old , Computer Weekly Feed
- Millions more pounds of public money spent by the Post Office as a result of an IT error that exposed the personal details of Horizon victims 9 hours 1 min old , Computer Weekly Feed
- Computer Weekly speaks to Jatin Aythora, director of BBC Research and Development, about self-belief and learning from different industries 11 hours 3 min old , Computer Weekly Feed
- Windows machine learning is one of the highlights of this year’s Microsoft annual developer event. The company is also paving the way to multi-agent artificial intelligence in Windows 12 hours 6 min old , Computer Weekly Feed
- Microsoft has moved to assure its European customers that it will fight any attempt by President Trump to disrupt their ability to access its services, but can UK customers take the company at its word? 14 hours 15 min old , Computer Weekly Feed
- Tackling the UK’s cyber threats 20 hours 32 min old , Computer Weekly Feed
- A new AI datacentre is among the initiatives the White House announced during the president’s Middle East visits 1 day 7 hours old , Computer Weekly Feed
- A Washington DC-based think tank has published evidence that Chinese intelligence services have been running a network of digital ‘front’ companies targeting laid-off government workers as recruits 1 day 7 hours old , Computer Weekly Feed
US-CERT Feed
- CISA Releases Thirteen Industrial Control Systems Advisories 12 hours 2 min old , US-Cert Current Activity
- CISA Adds Six Known Exploited Vulnerabilities to Catalog 1 day 12 hours old , US-Cert Current Activity
- CISA Releases Twenty-Two Industrial Control Systems Advisories 5 days 12 hours old , US-Cert Current Activity
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 5 days 12 hours old , US-Cert Current Activity
- CISA Adds One Known Exploited Vulnerability to Catalog 6 days 12 hours old , US-Cert Current Activity
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 1 week 12 hours old , US-Cert Current Activity
- Update to How CISA Shares Cyber-Related Alerts and Notifications 1 week 1 day old , US-Cert Current Activity
- CISA Releases Five Industrial Control Systems Advisories 1 week 5 days old , US-Cert Current Activity
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 6 days old , US-Cert Current Activity
- CISA Releases Three Industrial Control Systems Advisories 2 weeks 12 hours old , US-Cert Current Activity
Krebs
- KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS 2 hours 32 min old , KrebsOnSecurity
- Breachforums Boss to Pay $700k in Healthcare Breach 5 days 4 hours old , KrebsOnSecurity
- Patch Tuesday, May 2025 Edition 6 days 12 hours old , KrebsOnSecurity
- Pakistani Firm Shipped Fentanyl Analogs, Scams to US 1 week 6 days old , KrebsOnSecurity
- xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs 2 weeks 4 days old , KrebsOnSecurity
- Alleged ‘Scattered Spider’ Member Extradited to U.S. 2 weeks 6 days old , KrebsOnSecurity
- DOGE Worker’s Code Supports NLRB Whistleblower 3 weeks 6 days old , KrebsOnSecurity
SecurityWeek
- NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch 10 hours 4 min old , Security Week
- Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 11 hours 24 min old , Security Week
- Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit 11 hours 31 min old , Security Week
- TrustCloud Raises $15 Million for Security Assurance Platform 11 hours 32 min old , Security Week
- CloudSEK Raises $19 Million for Threat Intelligence Platform 13 hours 32 min old , Security Week
- O2 Service Vulnerability Exposed User Location 13 hours 59 min old , Security Week
- Madhu Gottumukkala Officially Announced as CISA Deputy Director 14 hours 14 min old , Security Week
- BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software 1 day 4 hours old , Security Week
- Printer Company Procolored Served Infected Software for Months 1 day 7 hours old , Security Week
- UK Legal Aid Agency Finds Data Breach Following Cyberattack 1 day 11 hours old , Security Week
Security Wire Daily News
- Corporate boards must play an increasingly active role in overseeing cybersecurity strategies. Here's what they need to know, from SEC disclosure requirements to best practices. 3 hours 59 min old , Security Wire Daily News
- Data security posture management, or DSPM, is an approach that combines technologies and processes to provide a holistic view of a company's sensitive data, including where the data is, who has access to it, how it has been used and its security posture. 5 hours 28 sec old , Security Wire Daily News
- Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy. 11 hours 3 min old , Security Wire Daily News
- Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices. 1 day 3 hours old , Security Wire Daily News
- Universal 2nd Factor (U2F) is a physical device that can act as a form of authentication for an account. 1 day 8 hours old , Security Wire Daily News
- A firewall is a network security device that prevents unauthorized access to a network by inspecting incoming and outgoing traffic using a set of predetermined security rules. 1 day 9 hours old , Security Wire Daily News
- Enterprises are spending big bucks on developing and training proprietary AI models. But cybercriminals are also eyeing this valuable intellectual property. 1 day 11 hours old , Security Wire Daily News
- Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value. 4 days 3 hours old , Security Wire Daily News
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 6 days 5 hours old , Security Wire Daily News
- Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity. 6 days 7 hours old , Security Wire Daily News
Security Wire Weekly
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 6 days 5 hours old , Security Wire Weekly
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 1 week 1 day old , Security Wire Weekly
- The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. 1 week 5 days old , Security Wire Weekly
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 2 weeks 5 days old , Security Wire Weekly
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 2 weeks 6 days old , Security Wire Weekly
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 2 weeks 6 days old , Security Wire Weekly
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 2 weeks 6 days old , Security Wire Weekly
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 2 weeks 6 days old , Security Wire Weekly
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 2 weeks 6 days old , Security Wire Weekly
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 2 weeks 6 days old , Security Wire Weekly
Security News White Papers
Cloud Security Briefing New and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 2 weeks 5 days old , Cloud Security Briefing: News and Advice
- RSAC Conference 2025 2 weeks 5 days old , Cloud Security Briefing: News and Advice
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 2 weeks 6 days old , Cloud Security Briefing: News and Advice
Threat Post
Naked Security
CSO Online
InfoSec Island
Schneier on Security
Tripwire
Wired Security
- What to Expect When You’re Convicted 14 hours 2 min old , Wired Security
- Trump Signs Controversial Law Targeting Nonconsensual Sexual Content 1 day 4 hours old , Wired Security
- A Silicon Valley VC Says He Got the IDF Starlink Access Within Days of October 7 Attack 1 day 7 hours old , Wired Security
- For Tech Whistleblowers, There’s Safety in Numbers 1 day 14 hours old , Wired Security
- How to Win Followers and Scamfluence People 1 day 14 hours old , Wired Security
- Who Even Is a Criminal Now? 1 day 14 hours old , Wired Security
- We 3D-Printed Luigi Mangione’s Ghost Gun. It Was Entirely Legal 1 day 14 hours old , Wired Security
- How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes 2 days 13 hours old , Wired Security
- Coinbase Will Reimburse Customers Up to $400 Million After Data Breach 3 days 13 hours old , Wired Security
- The Internet's Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge 6 days 4 hours old , Wired Security
Dark Reading
NoticeBored
The Security Ledger
- Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant 6 days 4 hours old , The Security Ledger
- INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense 6 days 14 hours old , The Security Ledger
- INE Security Alert: Top 5 Takeaways from RSAC 2025 1 week 13 hours old , The Security Ledger
- SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks 1 week 6 days old , The Security Ledger
- Link11 brings three brands together on one platform with new branding 2 weeks 6 days old , The Security Ledger
- SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI 3 weeks 8 hours old , The Security Ledger
- Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy 3 weeks 1 day old , The Security Ledger
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 3 weeks 6 days old , The Security Ledger
Electronic Freedom Foundation
- Please Drone Responsibly: C-UAS Legislation Needs Civil Liberties Safeguards 1 day 1 hour old , EFF
- Security Theater REALized and Flying without REAL ID 4 days 54 min old , EFF
- Standing Up for LGBTQ+ Digital Safety this International Day Against Homophobia 4 days 57 min old , EFF
- House Moves Forward With Dangerous Proposal Targeting Nonprofits 4 days 3 hours old , EFF
- The U.S. Copyright Office’s Draft Report on AI Training Errs on Fair Use 4 days 19 hours old , EFF
- In Memoriam: John L. Young, Cryptome Co-Founder 5 days 4 hours old , EFF
- The Kids Online Safety Act Will Make the Internet Worse for Everyone 5 days 6 hours old , EFF
- EFF to California Lawmakers: There’s a Better Way to Help Young People Online 5 days 8 hours old , EFF
- Keeping People Safe Online – Fundamental Rights Protective Alternatives to Age Checks 5 days 15 hours old , EFF
- Stopping States From Passing AI Laws for the Next Decade is a Terrible Idea 6 days 20 min old , EFF
Network World
InfoWorld
Cisco
- Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco Catalyst Center Insufficient Access Control Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco Catalyst Center Unauthenticated API Access Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability 1 week 6 days old , Cisco Security Advisories
- Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability 1 week 6 days old , Cisco Security Advisories
Corero Security
SlashDot
- Coinbase Data Breach Will 'Lead To People Dying,' TechCrunch Founder Says 58 min 38 sec old , SlashDot
- Google Is Rolling Out AI Mode To Everyone In the US 1 hour 59 min old , SlashDot
- Google Launches Veo 3, an AI Video Generator That Incorporates Audio 1 hour 59 min old , SlashDot
- Chicago Sun-Times Prints Summer Reading List Full of Fake Books 2 hours 59 min old , SlashDot
- Google's Gemini 2.5 Models Gain "Deep Think" Reasoning 3 hours 59 min old , SlashDot
- Delta Can Sue CrowdStrike Over Global Outage That Caused 7,000 Canceled Flights 3 hours 59 min old , SlashDot
- Adobe Forces Creative Cloud Users Into Pricier AI-Focused Plan 6 hours 37 sec old , SlashDot
- Google Brings AI-Powered Live Translation To Meet 6 hours 37 sec old , SlashDot
- Microsoft is Putting AI Actions Into the Windows File Explorer 7 hours 39 sec old , SlashDot
- France Barred Telegram Founder Pavel Durov From Traveling To US 8 hours 1 min old , SlashDot
Hacker News
- Lex Fridman twisted my arm into using Cursor and Lovable – welcome Åndra 1 hour 10 min old , Hacker News
- Computex 2025: Intel Arc Pro B-Series – By George Cozma 1 hour 10 min old , Hacker News
- Multiple systems to estimate the number of unattributed paintings by Modigliani 1 hour 13 min old , Hacker News
- Subprocess.run (Domain) 1 hour 14 min old , Hacker News
- You can try Imagen 4 at Krea 1 hour 18 min old , Hacker News
- A demographic projection of Spain's native-born population 1 hour 18 min old , Hacker News
- Monks Behaving Badly: Explaining Buddhist Violence in Asia 1 hour 18 min old , Hacker News
- NYC Restaurant Interior or Black and White Drawing? 1 hour 19 min old , Hacker News
- GameDev Assistant for Godot 1.0 walkthrough [video] 1 hour 22 min old , Hacker News
- Open Source Maintainers Demand Ability to Block Copilot-Generated Issues and PRs 1 hour 25 min old , Hacker News
Security Now
- SN 1025: Secure Conversation Records Retention - FBI Says to Toss Your Old Router 6 days 21 hours old , Security Now
- SN 1024: Don't Blame Signal - The Real Story Behind the TM SGNL Breach 1 week 6 days old , Security Now
- SN 1023: Preventing Windows Sandbox Abuse - Microsoft Says "Don't Delete This Folder" 2 weeks 6 days old , Security Now
- SN 1022: The Windows Sandbox - Short-life Certs, Ransomware Payout Stats 3 weeks 6 days old , Security Now
Tao Security
Graham Cluely
- The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain 10 hours 1 min old , Graham Cluely Security Blog
- SEC Twitter hack: Man imprisoned for role in attack that caused Bitcoin’s price to soar. 14 hours 31 min old , Graham Cluely Security Blog
- The AI Fix nominated for top podcast award. Vote now! 1 day 12 hours old , Graham Cluely Security Blog
- Prescription for disaster: Sensitive patient data leaked in Ascension breach 4 days 12 hours old , Graham Cluely Security Blog
- Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters 6 days 1 hour old , Graham Cluely Security Blog
- The AI Fix #50: AI brings dead man back for killer’s trial, and the judge loves it 1 week 8 hours old , Graham Cluely Security Blog
- Two years’ jail for down-on-his-luck man who sold ransomware online 1 week 11 hours old , Graham Cluely Security Blog
- LockBit ransomware gang breached, secrets exposed 1 week 4 days old , Graham Cluely Security Blog
- Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for “Donnie” Trump 1 week 4 days old , Graham Cluely Security Blog
- Smashing Security podcast #416: High street hacks, and Disney’s Wingdings woe 1 week 5 days old , Graham Cluely Security Blog
Google Security Blog
- Advanced Protection: Google’s Strongest Security for Mobile Devices 1 week 7 hours old , Google Security Blog
- What’s New in Android Security and Privacy in 2025 1 week 7 hours old , Google Security Blog
- Using AI to stop tech support scams in Chrome 1 week 5 days old , Google Security Blog
Microsoft
- Microsoft announces the 2025 Security Excellence Awards winners 3 weeks 9 hours old , Microsoft Malware Protection Center
- Microsoft announces the 2025 Security Excellence Awards winners 3 weeks 9 hours old , Microsoft Malware Protection Center
- Faster, more personalized service begins at the frontline with Microsoft Intune 3 weeks 1 day old , Microsoft Malware Protection Center
- Faster, more personalized service begins at the frontline with Microsoft Intune 3 weeks 1 day old , Microsoft Malware Protection Center
- Explore practical best practices to secure your data with Microsoft Purview 3 weeks 4 days old , Microsoft Malware Protection Center
- Explore practical best practices to secure your data with Microsoft Purview 3 weeks 4 days old , Microsoft Malware Protection Center
- New whitepaper outlines the taxonomy of failure modes in AI agents 3 weeks 5 days old , Microsoft Malware Protection Center
- New whitepaper outlines the taxonomy of failure modes in AI agents 3 weeks 5 days old , Microsoft Malware Protection Center
- Understanding the threat landscape for Kubernetes and containerized assets 3 weeks 6 days old , Microsoft Malware Protection Center
Tech Crunch
PC Magazine Security
Paul's Security Weekly
ZDNet Security
- AI agent adoption is driving increases in opportunities, threats, and IT budgets 7 hours 45 min old , ZDNet Security
- A security key for every employee? Yubikey-as-a-Service goes global 11 hours 2 min old , ZDNet Security
- A drug developer is buying 23andMe - what does that mean for your DNA data? 1 day 4 hours old , ZDNet Security
- Microsoft goes all in on Anthropic's MCP standard for safer AI agent deployments 1 day 8 hours old , ZDNet Security
- The best Bluetooth trackers of 2025: Expert tested 4 days 7 hours old , ZDNet Security
- I tested a TCL smart lock, and its palm vein recognition feature blew me away 4 days 14 hours old , ZDNet Security
- LastPass can now monitor employees' rogue reliance on shadow SaaS - including AI tools 6 days 9 hours old , ZDNet Security
- Rebooting your phone daily is your best defense against zero-click attacks - here's why 6 days 15 hours old , ZDNet Security
- The best VPN services for iPhone in 2025: Expert tested and reviewed 1 week 4 hours old , ZDNet Security
- Your Android phone is getting a huge security upgrade for free - what's new 1 week 7 hours old , ZDNet Security
The Gaurdian
- ‘Source of data’: are electric cars vulnerable to cyber spies and hackers? 3 weeks 19 hours old , Guardian Security
TechWorld Security
Malware Bytes
- 23andMe and its customers’ genetic data bought by a pharmaceutical org 11 hours 33 min old , Malware Bytes Security
- Malware-infected printer delivered something extra to Windows users 12 hours 58 min old , Malware Bytes Security
- How Los Angeles banned smartphones in schools (Lock and Code S06E10) 1 day 7 hours old , Malware Bytes Security
- Update your Chrome to fix serious actively exploited vulnerability 1 day 9 hours old , Malware Bytes Security
- A week in security (May 12 – May 18) 1 day 16 hours old , Malware Bytes Security
- Data broker protection rule quietly withdrawn by CFPB 4 days 12 hours old , Malware Bytes Security
- Meta sent cease and desist letter over AI training 4 days 12 hours old , Malware Bytes Security
- Google to pay $1.38 billion over privacy violations 6 days 2 hours old , Malware Bytes Security
- Android users bombarded with unskippable ads 6 days 2 hours old , Malware Bytes Security
- A week in security (May 4 – May 10) 1 week 1 day old , Malware Bytes Security