Sources
Hacker News
- ClaudeSmalltalk: An MCP implementation to interact with Smalltalk images 26 min 30 sec old
- Show HN: Mb-CLI – CLI for Metabase. Designed for humans and AI coding agents 28 min 47 sec old
- Show HN: Viral.ad – Turn any product URL into a UGC video ad in minutes 29 min 54 sec old
- Show HN: I built a tool to manage work and personal Git repos 31 min 29 sec old
- Show HN: Stopping OpenClaw from breaking your mails 36 min 16 sec old
- Girl Scout Cookies 37 min 25 sec old
- Codex for Open Source 47 min 24 sec old
- China completes 3k-km green belt around Taklamakan desert (2024) 48 min 36 sec old
- LLM Doesn't Write Correct Code. It Writes Plausible Code 52 min 35 sec old
- Show HN: CC Usage Bar – Check Claude Code usage from your macOS menu bar 54 min 18 sec old
Security Wire Weekly
- Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. 2 hours 30 min old
- Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. 1 day 9 hours old
- Check out the latest security news from the Informa TechTarget team. 1 day 14 hours old
- Loss of electric power presents a major risk to business continuity, and no organization is immune. Take these steps to create a solid business continuity plan for power outages. 3 days 6 hours old
- AI can improve the speed and effectiveness of risk management efforts. Here are the potential benefits, use cases and challenges your organization needs to know about. 1 week 21 hours old
- A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. 1 week 1 day old
- Several IT security frameworks and standards exist to help protect company data. Here's advice for choosing the right ones for your organization. 1 week 2 days old
- Mobile compliance now requires governance over how sensitive data is accessed across managed and personal devices. Here are practical steps for sustainable enterprise compliance. 1 week 4 days old
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 2 weeks 1 day old
- CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. 2 weeks 1 day old
CNET Feed
- Today's NYT Mini Crossword Answers for Saturday, March 7 3 hours 43 sec old
- Kids Online Safety Act Advances to House Amid Concerns Over Free Speech and Civil Rights 6 hours 17 min old
- MWC Is Where Cutting-Edge Phones Shine. Too Bad You'll Probably Never Buy Them 7 hours 52 min old
- This Tiny Smartphone Packs a Pocket-Friendly Physical Keyboard 8 hours 34 min old
- The Best Fantasy Movies to Stream on Prime Video Now 9 hours 9 min old
- United Can Now Ban Passengers Who Listen to Audio and Video Without Headphones 9 hours 19 min old
- 5 Signs You’re Aging Better Than You Think, According to Experts 9 hours 40 min old
- Indonesia to Ban YouTube, TikTok, Other Social Media Apps for Children Under 16 9 hours 53 min old
- Can You Run ChatGPT on a Dumb Phone? It Turns Out Yes, but With Caveats 9 hours 55 min old
- Today's NYT Connections: Sports Edition Hints and Answers for March 7, #530 10 hours 5 sec old
SlashDot
- Humanity Heating Planet Faster Than Ever Before, Study Finds 3 hours 31 min old
- Trump Administration Says It Can't Process Tariff Refunds Because of Computer Problems 5 hours 33 min old
- Oura Buys Gesture-Navigation Startup DoublePoint 7 hours 34 min old
- Apple Blocks US Users From Downloading ByteDance's Chinese Apps 7 hours 34 min old
- System76 Comments On Recent Age Verification Laws 9 hours 36 min old
- Mozilla Is Working On a Big Firefox Redesign 9 hours 36 min old
- Iran War Provides a Large-Scale Test For AI-Assisted Warfare 11 hours 37 min old
- Python 'Chardet' Package Replaced With LLM-Generated Clone, Re-Licensed 12 hours 38 min old
- Proton Mail Helped FBI Unmask Anonymous 'Stop Cop City' Protester 13 hours 41 min old
- AI Startup Sues Ex-CEO Saying He Took 41GB of Email, Lied On Resume 14 hours 41 min old
Security Week
- FBI Investigating ‘Suspicious’ Cyber Activity on System Holding Sensitive Surveillance Information 6 hours 8 min old
- ArmorCode Raises $16 Million for Exposure Management Platform 15 hours 3 min old
- In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike 15 hours 35 min old
- CISA Adds iOS Flaws From Coruna Exploit Kit to KEV List 17 hours 51 min old
- Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks 18 hours 37 min old
- James ‘Aaron’ Bishop Tapped to Serve as New Pentagon CISO 19 hours 25 min old
- Iranian APT Hacked US Airport, Bank, Software Company 19 hours 38 min old
- Data Security Firm Evervault Raises $25 Million in Series B Funding 22 hours 4 min old
- Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises 1 day 16 hours old
- Russian Ransomware Operator Pleads Guilty in US 1 day 18 hours old
Cloud Security Briefing: News and Advice
- Containers are an integral part of a growing number of production environments. But they can become security risks if not managed correctly. 6 hours 34 min old
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 17 hours 44 min old
- Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. 1 day 9 hours old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 1 day 14 hours old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 1 day 14 hours old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 1 day 14 hours old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 1 day 14 hours old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 1 day 14 hours old
- SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. 1 day 14 hours old
- When it comes to adopting SASE or zero trust, it's not a question of either/or, but using SASE to establish and enable zero-trust network access. 1 day 14 hours old
Wired Security
- The Future of Iran’s Internet Is More Uncertain Than Ever 11 hours 3 min old
- From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’ 19 hours 40 min old
- Here’s Every Country Directly Impacted by the War on Iran 1 day 8 hours old
- The Controversies Finally Caught Up to Kristi Noem 1 day 11 hours old
- How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time 1 day 21 hours old
- How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers 2 days 19 hours old
- A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals 3 days 12 hours old
- How Journalists Are Reporting From Iran With No Internet 3 days 21 hours old
- Attacks on GPS Spike Amid US and Israeli War on Iran 4 days 12 hours old
- War in Iran Spiked Oil Prices. Trump Will Decide How High They Go 4 days 15 hours old
Malware Bytes Security
- One click on this fake Google Meet update can give attackers control of your PC 11 hours 34 min old
- Beware of fake OpenClaw installers, even if Bing points you to GitHub 19 hours 58 min old
- Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets 22 hours 25 min old
- Windows File Shredder: When deleting a file isn’t enough 1 day 20 hours old
- Supreme Court to decide whether geofence warrants are constitutional 1 day 20 hours old
- Does the UK really want to ban VPNs? And can it be done? 2 days 17 hours old
- Attackers abuse OAuth’s built-in redirects to launch phishing and malware attacks 2 days 18 hours old
- High-severity Qualcomm bug hits Android devices in targeted attacks 2 days 18 hours old
- Pentagon ditches Anthropic AI over “security risk” and OpenAI takes over 3 days 15 hours old
- Chrome flaw let extensions hijack Gemini’s camera, mic, and file access 3 days 18 hours old
Security Wire Daily News
- Follow this comprehensive contact center security checklist that encompasses technology safeguards, customer data protection procedures and common business sense. 11 hours 37 min old
- Top NGFWs excel in reliability, scalability, and advanced features such as post-quantum cryptography, but users face steep learning curves and complex licensing. 1 day 10 hours old
- Digital signatures verify document integrity and execute agreements. Learn how to remove digital signatures from a PDF for revisions or redaction. 2 days 16 hours old
- False positives in cybersecurity detection tools drain resources and distract from real threats. Once CISOs understand the root causes of false positives, they can implement strategies to reduce them. 3 days 16 hours old
- The techniques used to build hybrid cloud architectures have come a long way, but managing these environments long term is plenty more complex without the right software. 4 days 9 hours old
- Check out the latest security news from the Informa TechTarget team 1 week 7 hours old
- Network change management includes five principles, including risk analysis and peer review. These best practices can help network teams reduce failed network changes and outages. 1 week 14 hours old
- Forewarned is forearmed, and dark web monitoring can alert organizations when they're in attacker crosshairs. But for many, the risk and expense make it more trouble than it's worth. 1 week 1 day old
- The race by organizations to AI-enable their operations and business workflows is exposing them to new risks that AI firewalls aim to address. 1 week 2 days old
- Automated threat modeling tools make identifying threats simpler, but the tools themselves can be fairly complex. Understanding where risks exist is only one part of the process. 1 week 3 days old
Graham Cluely Security Blog
- How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down 13 hours 11 min old
- Smashing Security podcast #457: How a cybersecurity boss framed his own employee 2 days 6 hours old
- They seized $4.8m in crypto… then gave the master key to the internet 3 days 15 hours old
- Your staff are your biggest security risk: AI is making it worse 1 week 1 day old
- Notorious ransomware gang allegedly blackmailed by fake FSB officer 1 week 1 day old
- Smashing Security podcast #456: How to lose friends and DDoS people 1 week 2 days old
- $10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon 1 week 2 days old
- Spanish police say they have arrested hacker who booked luxury hotel rooms for just one cent 2 weeks 8 hours old
- Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch 2 weeks 2 days old
- Dutch police arrest man for “hacking” after accidentally sending him confidential files 2 weeks 2 days old
Computer Weekly Feed
- The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified platforms. 13 hours 41 min old
- The 2024 Scattered Spider attack on Transport for London affected approximately 10 million people, many of whom remain blissfully unaware their data was compromised 13 hours 41 min old
- Open Cloud Coalition survey, commissioned ahead of the CMA’s decision on measures against the two hyperscale giants, finds competing cloud providers demand regulation 14 hours 41 min old
- Former detective Clive Driscoll, who secured convictions in the Stephen Lawrence case, calls for better checks after Instagram ‘memorialised’ the account of a child without the family’s knowledge 14 hours 41 min old
- High street giant will increase proportion of total staff that work in technology and data 14 hours 41 min old
- Nordic petrostate is preparing for war and turning the spotlight on vulnerabilities in its critical industries, as adversaries look for ways to damage the most important oil and gas producer to the EU 17 hours 44 min old
- Baltic and Nordic countries work together on a common certification system to support digital wallet applications 18 hours 45 min old
- Machine-readable indelible watermarking in content supply chain is among proposals that could protect copyrighted content 19 hours 45 min old
- Almost every NHS trust will have moved onto a digital system by this spring. Experts have cautioned many patients are still struggling to access their own health data 1 day 14 hours old
- Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report 1 day 15 hours old
Microsoft Malware Protection Center
- AI as tradecraft: How threat actors operationalize AI 14 hours 10 min old
- Women’s History Month: Encouraging women in cybersecurity at every career stage 1 day 14 hours old
- Malicious AI Assistant Extensions Harvest LLM Chat Histories 1 day 15 hours old
- Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale 2 days 15 hours old
- Signed malware impersonating workplace apps deploys RMM backdoors 3 days 9 hours old
- OAuth redirection abuse enables phishing and malware delivery 4 days 11 hours old
- Threat modeling AI applications 1 week 1 day old
- Developer-targeting campaign using malicious Next.js repositories 1 week 3 days old
- Scaling security operations with Microsoft Defender autonomous defense and expert-led services 1 week 3 days old
- New e-book: Establishing a proactive defense with Microsoft Security Exposure Management 2 weeks 1 day old
Security Now
- SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026 1 day 12 hours old
- SN 1067: KongTuke's CrashFix - Click, Paste, Pwned 3 days 7 hours old
- SN 1066: Password Leakage - Zero Trust, Zero Knowledge 1 week 3 days old
- SN 1065: Attestation - Code Signing Gets Tough 2 weeks 3 days old
- SN 1064: Least Privilege - Cybercrime Goes Pro 3 weeks 3 days old
US-Cert Current Activity
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 1 day 19 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 3 days 19 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 2 days old
- CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems 1 week 2 days old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 3 days old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 19 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 2 days old
- CISA Adds Four Known Exploited Vulnerabilities to Catalog 2 weeks 3 days old
- CISA Adds One Known Exploited Vulnerability to Catalog 3 weeks 19 hours old
- CISA Adds Four Known Exploited Vulnerabilities to Catalog 3 weeks 1 day old
Cisco Security Advisories
- Cisco Secure Firewall Management Center Software SQL Injection Vulnerability 2 days 1 hour old
- Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability 2 days 1 hour old
- Cisco Webex Services Cross-Site Scripting Vulnerability 2 days 2 hours old
- Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities 2 days 2 hours old
- Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability 2 days 2 hours old
- Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability 2 days 2 hours old
- Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities 2 days 2 hours old
- Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Cross-Site Scripting Vulnerability 2 days 2 hours old
- Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability 2 days 2 hours old
- Cisco Secure Firewall Management Center Software Command Injection Vulnerability 2 days 2 hours old
The Security Ledger
- Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap 2 days 16 hours old
- Archipelo and Checkmarx Announce Partnership Connecting AppSec Detection with DevSPM 3 days 17 hours old
- Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026 4 days 17 hours old
- Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat 4 days 21 hours old
- One Identity Appoints Michael Henricks as Chief Financial and Operating Officer 1 week 2 days old
- Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr 1 week 3 days old
- AI Under Control: Link11 Launches AI Management Dashboard for Clean Traffic 2 weeks 1 day old
- CredShields Leads OWASP Smart Contract Top 10 2026 as Governance and Access Failures Drive Onchain Risk 2 weeks 3 days old
- Cybersecurity Excellence Awards Reveal Nomination Shift from AI Hype to Governance Execution 2 weeks 3 days old
- GitGuardian Raises $50M Series C to Address Non-Human Identities Crisis and AI Agent Security Gap 3 weeks 2 days old
KrebsOnSecurity
- Who is the Kimwolf Botmaster “Dort”? 6 days 19 hours old
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA 2 weeks 11 hours old
- Kimwolf Botnet Swamps Anonymity Network I2P 3 weeks 2 days old
- Patch Tuesday, February 2026 Edition 3 weeks 3 days old
Google Security Blog
- Cultivating a robust and efficient quantum-safe HTTPS 1 week 14 hours old
- Staying One Step Ahead: Strengthening Android’s Lead in Scam Protection 1 week 2 days old
- Keeping Google Play & Android app ecosystems safe in 2025 2 weeks 1 day old
Guardian Security
EFF
- EFF Joins Internet Advocates Calling on the Iranian Government to Restore Full Internet Connectivity 1 month 2 weeks old
- EFF Condemns FBI Search of Washington Post Reporter’s Home 1 month 2 weeks old
- EFF to California Appeals Court: First Amendment Protects Journalist from Tech Executive’s Meritless Lawsuit 1 month 2 weeks old
- Baton Rouge Acquires a Straight-Up Military Surveillance Drone 1 month 2 weeks old
