Sources
Computer Weekly Feed
- US lawyers representing families of children harmed by social media are at the vanguard of fighting back against the impact of technologies that may be causing lifelong damage 8 min 25 sec old
- Google's threat intel analysts are aware of a number of in-progress cyber attacks against US retailers linked to the same Scattered Spider gang that supposedly attacked M&S and Co-op in the UK. 9 hours 14 min old
- Britain’s outdated hacking laws are leaving the UK’s cyber practitioners hamstrung and afraid. Security professional Simon Whittaker reveals how he nearly ran afoul of the Computer Misuse Act, and why he’s speaking out for reform 16 hours 21 min old
- It's not really a surprise so many organisations missed the EU's DORE compliance deadline, but there's no excuse for delaying, says Azul EMEA VP James Johnston 16 hours 21 min old
- The EU’s new vulnerability database is designed to offer a broader, more transparent source of information on new cyber vulnerabilities 16 hours 21 min old
- Electronic visa data and biometric technologies will be used by the UK’s immigration enforcement authorities to surveil migrants living in the country and to ‘tighten control of the border’, attracting strong criticism from migrant support groups 19 hours 25 min old
- Data reveals that bank employees are saving an average of almost three hours every week by using ChatGPT 20 hours 30 min old
- M&S is instructing all of its customers to change their account passwords after a significant amount of data was stolen in a DragonForce ransomware attack 21 hours 30 min old
- At Nutanix’s recent .Next event in the US, customers talked about why they migrated away from VMware and the pain points that accelerated their decision to switch hypervisor 21 hours 30 min old
- Microsoft fixes five exploited, and two publicly disclosed, zero-days in the fifth Patch Tuesday update of 2025 22 hours 31 min old
SlashDot
- First US Hub For Experimental Medical Treatments Is Coming 8 min 25 sec old
- Klarna Pivots Back To Humans After AI Experiment Fails 2 hours 9 min old
- Google DeepMind Creates Super-Advanced AI That Can Invent New Algorithms 4 hours 11 min old
- Microsoft Cuts Off Access To Bing Search Data as It Shifts Focus To Chatbots 6 hours 13 min old
- 'Aggressive' Hackers of UK Retailers Are Now Targeting US Stores, Says Google 7 hours 13 min old
- Netflix Says Its Ad Tier Now Has 94 Million Monthly Active Users 7 hours 13 min old
- iPhone Shipments Crash 50% In China As Local Brands Dominate 8 hours 14 min old
- Microsoft Is Open-Sourcing Its Linux Integration Services Automation Image-Testing Service 9 hours 14 min old
- NordVPN Finally Gets a Proper GUI On Linux 9 hours 14 min old
- Uber To Introduce Fixed-Route Shuttles In Major US Cities 10 hours 16 min old
Hacker News
- Hotline Webring 19 min 15 sec old
- Theory of the Café Central (1926) 20 min 7 sec old
- Real-time webcam demo with SmolVLM and llama.cpp server 20 min 33 sec old
- Speedrunning Is Not Such a Waste of Talent 23 min 7 sec old
- The Professors Are Using ChatGPT, and Some Students Aren't Happy About It 25 min 49 sec old
- Arduino Lab for MicroPython 0.20.0 27 min 56 sec old
- Toward Practical Quantum Cryptography 29 min 17 sec old
- Temporal Super Resolution via Multisampling 29 min 49 sec old
- Distributing command line tools for macOS 32 min 43 sec old
- Are developers falling out of love with Apple? 32 min 45 sec old
CNET Feed
- Today's NYT Mini Crossword Answers for Thursday, May 15 5 hours 59 min old
- Marvel Rivals' Galacta's Gift Event Makes Ranking Up Even Easier 8 hours 35 min old
- PGA Championship 2025: TV Schedule and How to Watch All the PGA Tour Golf From Anywhere 11 hours 11 min old
- See if You're Able to Survive Five Nights at Freddy's on PlayStation Plus Soon 11 hours 32 min old
- Today's NYT Connections: Sports Edition Hints and Answers for May 15, #234 11 hours 55 min old
- Today's NYT Strands Hints, Answers and Help for May 15, #438 12 hours 11 min old
- Today's NYT Connections Hints, Answers and Help for May 15, #704 12 hours 11 min old
- Today's Wordle Hints, Answer and Help for May 15, #1426 12 hours 11 min old
- DreamCloud Mattress Memorial Day Deals Have Begun 12 hours 17 min old
- If You Deposit $10,000 Into a CD Today, Here's How Much Interest You'll Earn 12 hours 24 min old
EFF
- Stopping States From Passing AI Laws for the Next Decade is a Terrible Idea 8 hours 29 min old
- Montana Becomes First State to Close the Law Enforcement Data Broker Loophole 9 hours 7 min old
- How Signal, WhatsApp, Apple, and Google Handle Encrypted Chat Backups 5 days 10 hours old
- The FCC Must Reject Efforts to Lock Up Public Airwaves 1 week 8 hours old
- Appeals Court Sidesteps The Big Questions on Geofence Warrants 1 week 14 hours old
- Podcast Episode: Digital Autonomy for Bodily Autonomy 1 week 1 day old
- No Postal Service Data Sharing to Deport Immigrants 1 week 1 day old
- Nominations Open for 2025 EFF Awards! 1 week 1 day old
- Beware the Bundle: Companies Are Banking on Becoming Your Police Department’s Favorite "Public Safety Technology” Vendor 1 week 1 day old
- Washington’s Right to Repair Bill Heads to the Governor 1 week 6 days old
Graham Cluely Security Blog
- Smashing Security podcast #417: Hello, Pervert! – Sextortion scams and Discord disasters 9 hours 11 min old
- The AI Fix #50: AI brings dead man back for killer’s trial, and the judge loves it 1 day 16 hours old
- Two years’ jail for down-on-his-luck man who sold ransomware online 1 day 19 hours old
- LockBit ransomware gang breached, secrets exposed 5 days 20 hours old
- Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for “Donnie” Trump 5 days 23 hours old
- Smashing Security podcast #416: High street hacks, and Disney’s Wingdings woe 1 week 7 hours old
- NCSC warns of IT helpdesk impersonation trick being used by ransomware gangs after UK retailers attacked 1 week 21 hours old
- TeleMessage, the Signal clone used by US government officials, suffers hack 1 week 23 hours old
- The AI Fix #49: The typo from hell 1 week 1 day old
- Smashing Security podcast #415: Hacking hijinks at the hospital, and WASPI scams 2 weeks 9 hours old
Malware Bytes Security
- Google to pay $1.38 billion over privacy violations 10 hours 43 min old
- Android users bombarded with unskippable ads 10 hours 51 min old
- A week in security (May 4 – May 10) 2 days 21 hours old
- Google Chrome will use AI to block tech support scam websites 5 days 14 hours old
- Cyber criminals impersonate payroll, HR and benefits platforms to steal information and funds 6 days 15 hours old
- Tired of Google sponsored ads? So are we! That’s why we’re introducing the option to block them on iOS 6 days 15 hours old
- Passwords in the age of AI: We need to find alternatives 6 days 18 hours old
- WhatsApp hack: Meta wins payout over NSO Group spyware 6 days 21 hours old
- FBI issues warning as scammers target victims of crime 1 week 18 hours old
- “Your privacy is a promise we don’t break”: Dating app Raw exposes sensitive user data 1 week 1 day old
Wired Security
- The Internet's Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge 12 hours 11 min old
- CFPB Quietly Kills Rule to Shield Americans From Data Brokers 15 hours 18 min old
- North Korean IT Workers Are Being Exposed on a Massive Scale 22 hours 11 min old
- Google’s Advanced Protection for Vulnerable Users Comes to Android 1 day 13 hours old
- Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud 1 day 15 hours old
- An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado 1 day 18 hours old
- Deepfakes, Scams, and the Age of Paranoia 2 days 22 hours old
- ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador 4 days 21 hours old
- US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car 5 days 14 hours old
- US Customs and Border Protection Quietly Revokes Protections for Pregnant Women and Infants 6 days 10 hours old
The Security Ledger
- Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant 12 hours 43 min old
- INE Security Alert: Continuous CVE Practice Closes Critical Gap Between Vulnerability Alerts and Effective Defense 22 hours 11 min old
- INE Security Alert: Top 5 Takeaways from RSAC 2025 1 day 21 hours old
- SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks 1 week 19 hours old
- Link11 brings three brands together on one platform with new branding 2 weeks 23 hours old
- SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI 2 weeks 1 day old
- Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy 2 weeks 2 days old
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 3 weeks 19 hours old
- Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 3 weeks 1 day old
- Industry First: StrikeReady AI Platform Moves Security Teams Beyond Basic, One-Dimensional AI-Driven Triage Solutions 3 weeks 2 days old
Security Wire Daily News
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 13 hours 19 min old
- Business resilience is an organization's ability to adapt quickly to disruptions while maintaining continuous business operations and safeguarding people, assets and overall brand equity. 15 hours 21 min old
- Recent Enterprise Strategy Group research found data loss prevention product churn combined with undiscovered data and shadow IT are changing the DLP landscape. 18 hours 25 min old
- To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more. 1 day 12 hours old
- Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN. 1 day 14 hours old
- Check out the latest security news from the Informa TechTarget team. 5 days 10 hours old
- The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies. 5 days 12 hours old
- A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks. 5 days 16 hours old
- RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security. 5 days 17 hours old
- Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term. 6 days 11 hours old
Security Wire Weekly
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 13 hours 19 min old
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 2 days 15 hours old
- The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. 6 days 16 hours old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 1 week 6 days old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 2 weeks 9 hours old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 2 weeks 9 hours old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 2 weeks 9 hours old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 2 weeks 9 hours old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 2 weeks 9 hours old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 2 weeks 9 hours old
Security Week
- Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware 13 hours 56 min old
- Is AI Use in the Workplace Out of Control? 17 hours 25 min old
- Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks 17 hours 46 min old
- Kosovar Administrator of Cybercrime Marketplace Extradited to US 20 hours 9 min old
- EU Cybersecurity Agency ENISA Launches European Vulnerability Database 20 hours 28 min old
- Vulnerabilities Patched by Juniper, VMware and Zoom 21 hours 36 min old
- Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances 22 hours 14 min old
- Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers 1 day 18 min old
- ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact 1 day 41 min old
- Adobe Patches Big Batch of Critical-Severity Software Flaws 1 day 12 hours old
ZDNet Security
- LastPass can now monitor employees' rogue reliance on shadow SaaS - including AI tools 17 hours 57 min old
- Rebooting your phone daily is your best defense against zero-click attacks - here's why 23 hours 11 min old
- The best VPN services for iPhone in 2025: Expert tested and reviewed 1 day 12 hours old
- Your Android phone is getting a huge security upgrade for free - what's new 1 day 15 hours old
- No, Microsoft has not changed Windows 10 or Microsoft 365 support deadlines (again) 1 day 15 hours old
- I wanted a privacy screen protector - until I put one on my Galaxy S25 Ultra 1 day 23 hours old
- Your old router could be a security threat - here's why and what to do 2 days 13 hours old
- You could get $10K from 23andMe's data breach - how to file a claim today 2 days 15 hours old
- 100 leading AI scientists map route to more 'trustworthy, reliable, secure' AI 2 days 18 hours old
- Is your Microsoft account passwordless yet? Why it (probably) should be and how to do it right 2 days 18 hours old
US-Cert Current Activity
- CISA Adds One Known Exploited Vulnerability to Catalog 20 hours 11 min old
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 1 day 20 hours old
- Update to How CISA Shares Cyber-Related Alerts and Notifications 2 days 20 hours old
- CISA Releases Five Industrial Control Systems Advisories 6 days 20 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 20 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 1 day old
- CISA Releases Three Industrial Control Systems Advisories 1 week 1 day old
- Unsophisticated Cyber Actor(s) Targeting Operational Technology 1 week 1 day old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 2 days old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 5 days old
KrebsOnSecurity
- Patch Tuesday, May 2025 Edition 20 hours 13 min old
- Pakistani Firm Shipped Fentanyl Analogs, Scams to US 1 week 9 hours old
- xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs 1 week 6 days old
- Alleged ‘Scattered Spider’ Member Extradited to U.S. 2 weeks 10 hours old
- DOGE Worker’s Code Supports NLRB Whistleblower 3 weeks 11 hours old
- Whistleblower: DOGE Siphoned NLRB Case Data 3 weeks 2 days old
Security Now
- SN 1025: Secure Conversation Records Retention - FBI Says to Toss Your Old Router 1 day 5 hours old
- SN 1024: Don't Blame Signal - The Real Story Behind the TM SGNL Breach 1 week 1 day old
- SN 1023: Preventing Windows Sandbox Abuse - Microsoft Says "Don't Delete This Folder" 2 weeks 1 day old
- SN 1022: The Windows Sandbox - Short-life Certs, Ransomware Payout Stats 3 weeks 1 day old
Google Security Blog
- Using AI to stop tech support scams in Chrome 6 days 15 hours old
Cisco Security Advisories
- Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability 1 week 9 hours old
- Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability 1 week 9 hours old
- Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability 1 week 9 hours old
- Cisco Catalyst Center Insufficient Access Control Vulnerability 1 week 9 hours old
- Cisco Catalyst Center Unauthenticated API Access Vulnerability 1 week 9 hours old
- Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability 1 week 9 hours old
- Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability 1 week 9 hours old
- Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability 1 week 9 hours old
- Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability 1 week 9 hours old
- Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability 1 week 9 hours old
Cloud Security Briefing: News and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 1 week 6 days old
- RSAC Conference 2025 1 week 6 days old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 2 weeks 9 hours old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 2 weeks 9 hours old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 2 weeks 9 hours old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 2 weeks 9 hours old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 2 weeks 9 hours old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 2 weeks 9 hours old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 2 weeks 9 hours old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 2 weeks 9 hours old
Microsoft Malware Protection Center
- Microsoft announces the 2025 Security Excellence Awards winners 2 weeks 1 day old
- Microsoft announces the 2025 Security Excellence Awards winners 2 weeks 1 day old
- Faster, more personalized service begins at the frontline with Microsoft Intune 2 weeks 2 days old
- Faster, more personalized service begins at the frontline with Microsoft Intune 2 weeks 2 days old
- Explore practical best practices to secure your data with Microsoft Purview 2 weeks 5 days old
- Explore practical best practices to secure your data with Microsoft Purview 2 weeks 5 days old
- New whitepaper outlines the taxonomy of failure modes in AI agents 2 weeks 6 days old
- New whitepaper outlines the taxonomy of failure modes in AI agents 2 weeks 6 days old
- Understanding the threat landscape for Kubernetes and containerized assets 3 weeks 16 hours old
- Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative 3 weeks 2 days old
Guardian Security
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tao Security
Tech Crunch Security
Techworld Security
Threat Post
US-Cert Alerts
