Sources
Computer Weekly Feed
- Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat intelligence and support 45 min 15 sec old
- Civil society organisations have urged the European Commissioner to not renew the UK’s data adequacy, given the country’s growing divergence from European data protection standards 1 hour 46 min old
- Eindhoven University of Technology has planned multi-factor authentication and regularly practised cyber crisis drills – yet it still fell victim to attackers who exploited gaps in its defences 2 hours 46 min old
- Legacy IT is a drag on profits and innovation, but AI agents will help companies rebuild their processes better than before, claims Pegasystems CTO Don Schuerman 4 hours 48 min old
- The UK mapping service has moved on a long way from paper maps as it now looks to use artificial intelligence to understand, interpret and derive insights from geographical data 4 hours 48 min old
- Project findings to be presented at Infosecurity Europe 2025 highlight vulnerability of SMEs to cyber attack 5 hours 50 min old
- Global fintech revenues reached £280bn in 2024, according to Boston Consulting Group report 1 day 2 hours old
- CISA is one of several US agencies facing drastic budget cuts under the Trump administration 1 day 5 hours old
- The National Grid has started work on building a new substation on the outskirts of Greater London to ease pressure on local electricity transmission and distribution networks 1 day 5 hours old
- Even when parts of a job are being automated, those who know how to work with artificial intelligence tools can expect higher salaries 1 day 8 hours old
SlashDot
- Code.org Changes Mission To 'Make CS and AI a Core Part of K-12 Education' 45 min 15 sec old
- Morgan Stanley Says Its AI Tool Processed 9 Million Lines of Legacy Code This Year And Saved 280,000 Developer Hours 1 hour 46 min old
- AI Startups Revolutionize Coding Industry, Leading To Sky-High Valuations 2 hours 46 min old
- 23andMe Founder Aims To Restart Auction With Major Corporate Backing 4 hours 48 min old
- James Webb Space Telescope Discovers the Earliest Galaxy Ever Seen 6 hours 53 min old
- 'Deliberate Attack' Deletes Shopping App's AWS and GitHub Resources 10 hours 3 min old
- World-First Biocomputing Platform Hits the Market 11 hours 5 min old
- Polish Engineer Creates Postage Stamp-Sized 1980s Atari Computer 13 hours 8 min old
- The Last 5-Speed Manual In the US Is Gone 14 hours 10 min old
- The OpenAI Board Drama Is Turning Into a Movie 14 hours 10 min old
Hacker News
- Why doesn't HN have dark mode yet? 47 min 3 sec old
- "Give me a few seconds to get everything ready for you so that I can help." 47 min 17 sec old
- I'm organizing a free class on design as a tool for change ⬛ 48 min 16 sec old
- The Gutting of America's Medical Research 48 min 46 sec old
- Assessing the Duration of the Paleocene-Eocene Thermal Maximum 48 min 56 sec old
- Startup Wants to Help Parents Rank Embryos for Longevity (Nuclear Genomics) 49 min 7 sec old
- Why finding a new job as an engineer is becoming so boring 49 min 23 sec old
- Precision is not limited by the second law of thermodynamics 50 min 25 sec old
- Show HN: The never-ending story, create your own 8-bit AI adventure. 52 min 2 sec old
- No More Shading Languages: Compiling C++ to Vulkan Shaders [pdf] 52 min 11 sec old
Security Week
- Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers 59 min 33 sec old
- Going Into the Deep End: Social Engineering and the AI Flood 1 hour 54 min old
- Compyl Raises $12 Million for GRC Platform 3 hours 20 min old
- Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift 3 hours 55 min old
- Webinar Today: Redefining Vulnerability Management With Exposure Validation 3 hours 59 min old
- ThreatSpike Raises $14 Million in Series A Funding 4 hours 10 min old
- Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach 4 hours 40 min old
- Thousands Hit by The North Face Credential Stuffing Attack 5 hours 6 min old
- 35,000 Solar Power Systems Exposed to Internet 6 hours 56 min old
- Trustifi Raises $25 Million for AI-Powered Email Security 10 hours 17 min old
CNET Feed
- Uber's Simplified App for Seniors Is Launching Nationwide 1 hour 59 min old
- Not Getting the Switch 2 on Launch Day? Why It's OK to Wait 2 hours 29 min old
- My Angry, Sensitive Skin Always Looks Better After I Use This Face Spray 2 hours 49 min old
- Next-Level Role Play: Buying a Nintendo Power-Up Band or Harry Potter Wands at Epic Universe? Here's What to Know 2 hours 59 min old
- I Find Android Phones Too Complicated, and That's Why I Love Google's Pixel 9 Pro 2 hours 59 min old
- Is My Apple Watch Waterproof? How to Find Out if You Can Wear It While Swimming 2 hours 59 min old
- Best Senior Phone Plans of 2025 2 hours 59 min old
- I Played Switch 2's Launch Games: What to Look Forward to After June 5 Release Day 2 hours 59 min old
- Best Internet Providers in Bend, Oregon 3 hours 43 min old
- I Love GeForce Now on My Steam Deck -- Until It Starts 'Waiting for the Next Available Rig' 3 hours 59 min old
Wired Security
- The Race to Build Trump’s ‘Golden Dome’ Missile Defense System Is On 4 hours 29 min old
- You're Not Ready for Quantum Cracks 4 hours 59 min old
- You're Not Ready 4 hours 59 min old
- The US Grid Attack Looming on the Horizon 4 hours 59 min old
- Deepfake Scams Are Distorting Reality Itself 4 hours 59 min old
- The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare 4 hours 59 min old
- The Texting Network for the End of the World 4 hours 59 min old
- A GPS Blackout Would Shut Down the World 4 hours 59 min old
- How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Terrorists 22 hours 38 min old
- A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign 4 days 20 hours old
EFF
- Podcast Episode: Why Three is Tor's Magic Number 7 hours 50 min old
- San Diegans Push Back on Flock ALPR Surveillance 18 hours 46 min old
- Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant 19 hours 8 min old
- The Right to Repair Is Law in Washington State 22 hours 10 min old
- The Federal Government Demands Data from SNAP—But Says Nothing About Protecting It 22 hours 16 min old
- The PERA and PREVAIL Acts Would Make Bad Patents Easier to Get—and Harder to Fight 23 hours 36 min old
- The Defense Attorney’s Arsenal In Challenging Electronic Monitoring 1 day 18 hours old
- The EU’s “Encryption Roadmap” Makes Everyone Less Safe 1 day 18 hours old
- 245 Days Without Justice: Laila Soueif’s Hunger Strike and the Fight to Free Alaa Abd el-Fattah 1 day 19 hours old
- CCTV Cambridge: Digital Equity in 2025 4 days 18 hours old
ZDNet Security
- Best travel VPNs 2025: The top travel VPNs for unblocking services and avoiding censorship 20 hours 58 min old
- Wyze's new Bulb Cam turns any light socket into a 2K camera - for just $50 1 day 1 hour old
- Southwest has new rule that changes how you charge your phone mid-flight 1 day 21 hours old
- Is T-Mobile secretly recording your phone's screen? How to check and turn it off 5 days 14 min old
- 96% of IT pros say AI agents are a security risk, but they're deploying them anyway 5 days 4 hours old
- How AI coding agents could infiltrate and destroy open source software 5 days 5 hours old
- Best home automation systems 2025: I'm a smart home reviewer and these are the top ones 5 days 14 hours old
- Your Asus router may be compromised - here's how to tell and what to do 5 days 23 hours old
- Our favorite budget video doorbell gets an upgrade - see what's new with Amazon's Blink 6 days 59 min old
- Is that extension safe? This free tool lets you know before you install 1 week 5 min old
Microsoft Malware Protection Center
- How Microsoft Defender for Endpoint is redefining endpoint security 22 hours 59 min old
- Discover how automatic attack disruption protects critical assets while ensuring business continuity 1 day 21 hours old
- Announcing a new strategic collaboration to bring clarity to threat actor naming 1 day 22 hours old
- Defending against evolving identity attack techniques 5 days 21 hours old
- How to deploy AI safely 5 days 22 hours old
- The future of AI agents—and why OAuth must evolve 1 week 22 hours old
- New Russia-affiliated actor Void Blizzard targets critical sectors for espionage 1 week 1 day old
- Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer 1 week 6 days old
- Microsoft extends Zero Trust to secure the agentic workforce 2 weeks 1 day old
- How the Microsoft Secure Future Initiative brings Zero Trust to life 2 weeks 5 days old
Malware Bytes Security
- Scammers are constantly changing the game, but so are we. Introducing Malwarebytes Scam Guard 23 hours 2 min old
- The North Face warns customers about potentially stolen data 23 hours 40 min old
- Juice jacking warnings are back, with a new twist 1 day 2 hours old
- Victims risk AsyncRAT infection after being redirected to fake Booking.com sites 2 days 1 hour old
- A week in security (May 26 – June 1) 2 days 7 hours old
- What does Facebook know about me? (Lock and Code S06E11) 2 days 16 hours old
- Porn sites probed for allegedly failing to prevent minors from accessing content 6 days 1 hour old
- Take back control of your browser—Malwarebytes Browser Guard now blocks search hijacking attempts 6 days 2 hours old
- Deepfake-posting man faces huge $450,000 fine 6 days 21 hours old
- Deepfake-posting man faces huge $450,000 fine 6 days 21 hours old
Security Wire Daily News
- Organizations must carefully balance security and UX when implementing account lockout policies. 23 hours 30 min old
- The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses. 1 day 21 hours old
- Compliance automation, also known as automated compliance, is the practice of using technology -- such as applications with AI features -- to perform and simplify compliance procedures. 1 day 22 hours old
- The DOGE effect on cyber: What's happened and what's next? 2 days 3 hours old
- Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge. 2 days 3 hours old
- Triple extortion ransomware is a type of ransomware attack in which a cybercriminal extorts their victim multiple times -- namely by encrypting data, exposing exfiltrated data and then threatening an additional third attack vector. 4 days 18 hours old
- Foreign adversaries now infiltrate rival nation resources by using cyberattackers to pose as remote workers. Learn how to protect your organization with tips from this CISO. 4 days 20 hours old
- Fourth-party risk management (FPRM) is the process of identifying, assessing and mitigating risks that originate from the subcontractors and service providers that an organization's third-party vendors use. 4 days 22 hours old
- An explanation of ransomware 5 days 1 hour old
- Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. 5 days 1 hour old
Graham Cluely Security Blog
- The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better 1 day 58 min old
- Damascened Peacock: Russian hackers targeted UK Ministry of Defence 5 days 1 hour old
- Interlock ransomware: what you need to know 5 days 6 hours old
- Smashing Security podcast #419: Star Wars, the CIA, and a WhatsApp malware mirage 6 days 15 hours old
- Adidas customers’ personal information at risk after data breach 1 week 20 hours old
- The AI Fix #52: AI adopts its own social norms, and AI DJ creates diversity scandal 1 week 1 day old
- 3AM ransomware attack poses as a call from IT support to compromise networks 1 week 5 days old
- DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals 1 week 6 days old
- Smashing Security podcast #418: Grid failures, Instagram scams, and Legal Aid leaks 1 week 6 days old
- The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain 2 weeks 1 day old
US-Cert Current Activity
- CISA Releases Three Industrial Control Systems Advisories 1 day 2 hours old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 1 day 2 hours old
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 2 days 2 hours old
- CISA Releases Five Industrial Control Systems Advisories 6 days 2 hours old
- CISA Releases One Industrial Control Systems Advisory 1 week 1 day old
- New Guidance for SIEM and SOAR Implementation 1 week 1 day old
- CISA Releases Two Industrial Control Systems Advisories 1 week 6 days old
- Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic) 1 week 6 days old
- New Best Practices Guide for Securing AI Data Released 1 week 6 days old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 6 days old
Cisco Security Advisories
- Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities 1 day 17 hours old
- Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability 1 day 17 hours old
- Cisco Unified Communications Products Privilege Escalation Vulnerability 1 week 6 days old
- Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities 1 week 6 days old
- Cisco Duo Self-Service Portal Command Injection Vulnerability 1 week 6 days old
- Cisco Identity Services Engine RADIUS Denial of Service Vulnerability 1 week 6 days old
- Cisco Identity Services Stored Cross-Site Scripting Vulnerability 1 week 6 days old
- Cisco Secure Network Analytics Manager API Authorization Vulnerability 1 week 6 days old
- Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability 1 week 6 days old
- Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability 1 week 6 days old
The Security Ledger
- INE Security Alert: $16.6 Billion in Cyber Losses Underscore Critical Need for Advanced Security Training 1 day 20 hours old
- Criminal IP to Debut at Infosecurity Europe 2025 6 days 59 min old
- Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform 1 week 5 days old
- INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia 1 week 6 days old
- Attaxion Becomes the First EASM Platform to Integrate ENISA’s EU Vulnerability Database (EUVD) 2 weeks 7 hours old
- Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant 2 weeks 6 days old
- INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense 3 weeks 4 hours old
- INE Security Alert: Top 5 Takeaways from RSAC 2025 3 weeks 1 day old
Security Wire Weekly
- A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors. 1 day 21 hours old
- Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. 5 days 1 hour old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 5 days 18 hours old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 6 days 14 hours old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 6 days 14 hours old
- Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users. 6 days 14 hours old
- A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web. 6 days 14 hours old
- Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal. 6 days 14 hours old
- The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals. 6 days 14 hours old
- Malvertising is an up-and-coming cybersecurity threat, but marketing and IT teams alike can take several important steps to avoid and remove this threat. 6 days 14 hours old
Google Security Blog
- Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store 5 days 33 sec old
- Tracking the Cost of Quantum Factoring 1 week 5 days old
- Advanced Protection: Google’s Strongest Security for Mobile Devices 3 weeks 22 hours old
- What’s New in Android Security and Privacy in 2025 3 weeks 22 hours old
- Using AI to stop tech support scams in Chrome 3 weeks 5 days old
KrebsOnSecurity
- U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams 5 days 13 hours old
- Pakistan Arrests 21 in ‘Heartsender’ Malware Service 6 days 21 hours old
- Oops: DanaBot Malware Devs Infected Their Own PCs 1 week 5 days old
- KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS 2 weeks 17 hours old
- Breachforums Boss to Pay $700k in Healthcare Breach 2 weeks 5 days old
- Patch Tuesday, May 2025 Edition 3 weeks 3 hours old
- Pakistani Firm Shipped Fentanyl Analogs, Scams to US 3 weeks 6 days old
Cloud Security Briefing: News and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 5 days 16 hours old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 6 days 14 hours old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 6 days 14 hours old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 6 days 14 hours old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 6 days 14 hours old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 6 days 14 hours old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 6 days 14 hours old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 6 days 14 hours old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 6 days 14 hours old
- SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. 6 days 14 hours old
Security Now
- SN 1027: Artificial Intelligence - The Status of Encrypted Client Hello 1 week 12 hours old
- SN 1026: Rogue Comms Tech Found in US Power Grid - Is AI Replicating Itself? 2 weeks 12 hours old
- SN 1025: Secure Conversation Records Retention - FBI Says to Toss Your Old Router 3 weeks 12 hours old
- SN 1024: Don't Blame Signal - The Real Story Behind the TM SGNL Breach 4 weeks 11 hours old
Guardian Security
- Russian-led cybercrime network dismantled in global operation 1 week 4 days old
- What to do if you can’t get into your Facebook or Instagram account 2 weeks 8 hours old
US-Cert Alerts
- Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 2 weeks 19 hours old
- AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems 2 weeks 1 day old
- Russian GRU Targeting Western Logistics Entities and Technology Companies 3 weeks 1 day old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tao Security
Tech Crunch Security
Techworld Security
Threat Post
