Sources
Hacker News
- Show HN: Council AI – Make better decisions with the wisdom of AI crowd 27 min 26 sec old
- Share your machines with other users 28 min 53 sec old
- Why I Maintain a 17 Year Old ThinkPad 31 min 45 sec old
- How to simplify MongoDB queries with esProc 34 min 21 sec old
- Airbnb Superhost: To Be or Not to Be? 51 min 10 sec old
- Show HN: I built a 1B+ contact database as a solo founder in 60 days 51 min 28 sec old
- DST for Async Rust 53 min 34 sec old
- Generative AI for Social Science 59 min 20 sec old
- Shingles Vaccine Guards Against Dementia, Study Reveals 1 hour 36 sec old
- Unmarked Vans. Secret Lists. Public Denunciations. Our Police State Has Arrived 1 hour 4 min old
SlashDot
- Open-Source Tool Designed To Throttle PC and Server Performance Based On Electricity Pricing 1 hour 16 min old
- NaNoWriMo To Close After 20 Years 1 hour 16 min old
- Five VPN Apps In the App Store Had Links To Chinese Military 2 hours 18 min old
- Anthropic Launches an AI Chatbot Plan For Colleges and Universities 3 hours 19 min old
- India Set For $100 Billion Startup IPO Surge By 2027 3 hours 19 min old
- Bill Gates Celebrates Microsoft's 50th By Releasing Altair BASIC Source Code 4 hours 21 min old
- Vast Pedophile Network Shut Down In Europol's Largest CSAM Operation 5 hours 22 min old
- Global Scam Industry Evolving at 'Unprecedented Scale' Despite Recent Crackdown 5 hours 22 min old
- European Commission Takes Aim At End-to-End Encryption and Proposes Europol Become an EU FBI 6 hours 22 min old
- Microsoft Urges Businesses To Abandon Office Perpetual Licenses 7 hours 22 min old
CNET Feed
- Best Smart Home Gyms for 2025, as Tested by Our Resident Fitness Expert 2 hours 59 min old
- Which Nintendo Switch Accessories Will Work With the Nintendo Switch 2? 4 hours 9 min old
- Using Affirm's BNPL Plan Could Now Affect Your Credit Score 5 hours 11 min old
- Starseeker, Silksong and Other New Switch 2 Games Revealed During Stream Freeze 5 hours 19 min old
- Visa Allegedly Makes a Bid to Unseat Mastercard as Apple Card's Partner 5 hours 40 min old
- Here Are the Switch 2 Games I'm Excited to Play 6 hours 2 min old
- What Is 5G Home Internet and Could It Be Your Home Broadband Solution? 6 hours 11 min old
- Today's NYT Connections: Sports Edition Hints and Answers for April 3, #192 6 hours 38 min old
- Today's NYT Connections Hints, Answers and Help for April 3, #662 6 hours 44 min old
- Today's NYT Strands Hints, Answers and Help for April 3, #396 6 hours 49 min old
Graham Cluely Security Blog
- Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers 4 hours 11 min old
- The AI Fix #44: AI-generated malware, and a stunning AI breakthrough 1 day 12 hours old
- Hackers exploit little-known WordPress MU-plugins feature to hide malware 1 day 17 hours old
- £3 million fine for healthcare MSP with sloppy security after it was hit by ransomware attack 4 days 15 hours old
- VanHelsing ransomware: what you need to know 5 days 12 hours old
- Malaysian PM says “no way” to $10 million ransom after alleged cyber attack against Kuala Lumpur airport 6 days 17 hours old
- Smashing Security podcast #410: Unleash the AI bot army against the scammers – now! 1 week 3 hours old
- The AI Fix #43: I, for one, welcome our new robot overlords! 1 week 1 day old
- BlackLock ransomware: What you need to know 1 week 6 days old
- Smashing Security podcast #409: Peeping perverts and FBI phone calls 1 week 6 days old
Cisco Security Advisories
- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities 4 hours 11 min old
- Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability 4 hours 11 min old
- Cisco Enterprise Chat and Email Denial of Service Vulnerability 4 hours 11 min old
- Cisco Webex for BroadWorks Credential Exposure Vulnerability 23 hours 31 min old
- Cisco Smart Licensing Utility Vulnerabilities 1 day 47 min old
- Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability 5 days 1 hour old
- Cisco IOS XR Software Access Control List Bypass Vulnerability 2 weeks 6 days old
- Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability 3 weeks 4 hours old
- Cisco IOS XR Software CLI Privilege Escalation Vulnerability 3 weeks 4 hours old
- Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability 3 weeks 4 hours old
Cloud Security Briefing: News and Advice
- If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. 6 hours 22 min old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 6 hours 22 min old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 6 hours 22 min old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 6 hours 22 min old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 6 hours 22 min old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 6 hours 22 min old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 6 hours 22 min old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 6 hours 22 min old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 6 hours 22 min old
- SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. 6 hours 22 min old
Computer Weekly Feed
- Home Office refuses to answer questions from Lords over technical capability notice issued against Apple’s iCloud Advanced Data Protection encryption services 6 hours 22 min old
- Support group calls on former subpostmasters in Scotland who have been affected by Horizon errors to come forward 6 hours 22 min old
- Former HMRC assistant director Ray McCann is leading the latest independent review into the UK government’s controversial Loan Charge policy, which has left thousands of IT contractors saddled with life-changing tax bills 6 hours 22 min old
- Scottish statutory body attempting to contact people that might have been wrongly convicted of crimes based on the Post Office’s flawed systems 6 hours 22 min old
- Marking the 21st anniversary of Gmail, Google is preparing to roll out an end-to-end encryption standard for its email service in hopes of democratising encryption and leaving old standards in the dust 6 hours 22 min old
- People may try to lock up GPU resources even if they don’t need them all day – but not anymore, thanks to Nvidia KAI Scheduler 6 hours 22 min old
- The IT sectors of the UK and Ukraine have built strong relationships since Russia’s invasion of the latter, and there is more to come, writes the IT Ukraine Association’s ambassador in the UK 6 hours 22 min old
- The professional social network’s product chief is leading the introduction of artificial intelligence for the firm’s in-house development processes and to enhance services for users 6 hours 22 min old
- KnowTheChain’s latest benchmark analysis of the IT sector’s efforts to address forced labour in supply chains shows there has been very little improvement in their due diligence practices over the last half decade 6 hours 22 min old
- Apple has appealed to the Investigatory Powers Tribunal over an order by home secretary Yvette Cooper to give the UK access to customers' data protected by Advanced Data Protection encryption. What happens next? 6 hours 22 min old
Security Wire Daily News
- Risk assessments are a critical part of a disaster recovery plan. Find out how to prepare a risk assessment, then download our included free template to create one. 6 hours 22 min old
- Think you're talking to your boss on Zoom? You might want to think again. Deepfake technology has already cost enterprises millions of dollars. Here's how to fight fire with fire. 6 hours 22 min old
- Continuous monitoring constantly observes the performance and operation of IT assets to help reduce risk and improve uptime instead of taking a point-in-time snapshot of a device, network or application. 6 hours 22 min old
- APIs are the backbone of most modern applications, and companies must build in API security from the start. Follow these guidelines to design, deploy and protect your APIs. 6 hours 22 min old
- Wi-Fi standards continue to evolve. The three most recent standards -- Wi-Fi 6, Wi-Fi 6E and Wi-Fi 7 -- build on each other's capabilities, but all have their own unique features. 6 hours 22 min old
- A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats. 6 hours 22 min old
- When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture. 6 hours 22 min old
- Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces. 6 hours 22 min old
- Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization. 6 hours 22 min old
- Do you know the difference between a business impact analysis and risk assessment? Find out how they differ and why you need to perform both here. 6 hours 22 min old
Security Wire Weekly
- You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. 6 hours 22 min old
- Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ. 6 hours 22 min old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 6 hours 22 min old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 6 hours 22 min old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 6 hours 22 min old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 6 hours 22 min old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 6 hours 22 min old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 6 hours 22 min old
- Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users. 6 hours 22 min old
- A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web. 6 hours 22 min old
ZDNet Security
- T-Mobile settlement payouts begin this month - how much you could get 9 hours 36 min old
- iOS 18.4 update draining your iPhone's battery? Try these 6 fixes 14 hours 18 min old
- 5 tools I trust to keep my online conversations private and anonymous 1 day 10 hours old
- Windows 11 PC won't boot? Microsoft's new tool tries to fix it before you even panic - here's how 1 day 12 hours old
- Google says easy email encryption is on the way - for some users 1 day 14 hours old
- How to talk to your family and friends about online security - before it's too late 1 day 15 hours old
- Why multi-factor authentication is absolutely essential in 2025 1 day 16 hours old
- Why delaying software updates is a terrible idea 1 day 17 hours old
- Help! I clicked on a phishing link - now what? 1 day 18 hours old
- Why no small business is too small for hackers - and 8 security best practices for SMBs 1 day 18 hours old
Wired Security
- Cybersecurity Professor Faced China Funding Inquiry Before Disappearing, Sources Say 9 hours 40 min old
- Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes 2 days 7 hours old
- An AI Image Generator’s Exposed Database Reveals What People Really Used It For 2 days 17 hours old
- Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online 4 days 16 hours old
- Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public 6 days 5 hours old
- SignalGate Is Driving the Most US Downloads of Signal Ever 6 days 8 hours old
- Mike Waltz Left His Venmo Friends List Public 1 week 6 hours old
- SignalGate Isn't About Signal 1 week 8 hours old
- 6 Best Password Managers (2025), Tested and Reviewed 1 week 13 hours old
- How to Delete Your Data From 23andMe 1 week 2 days old
Security Week
- Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering 10 hours 23 min old
- Vulnerabilities Expose Jan AI Systems to Remote Manipulation 11 hours 1 min old
- Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion 11 hours 43 min old
- AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor 13 hours 4 min old
- Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses 13 hours 28 min old
- North Korea’s IT Operatives Are Exploiting Remote Work Globally 13 hours 48 min old
- ImageRunner Flaw Exposed Sensitive Information in Google Cloud 15 hours 1 min old
- Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks 16 hours 25 min old
- Questions Remain Over Attacks Causing DrayTek Router Reboots 16 hours 41 min old
- Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users 17 hours 6 min old
EFF
- Site-Blocking Legislation Is Back. It’s Still a Terrible Idea. 11 hours 18 min old
- Vote for “How to Fix the Internet” in the Webby Awards People's Voice Competition! 1 day 8 hours old
- EFF Urges Third Circuit to Join the Legal Chorus: No One Owns the Law 2 days 6 hours old
- Announcing EFF’s New Exhibit on Border Surveillance and Accompanying Events 2 days 10 hours old
- A Congressional Bill to Limit Court Power Through Injunctions Is a Bad, Transparent Effort to Limit Court Power 5 days 6 hours old
- Online Tracking is Out of Control—Privacy Badger Can Help You Fight Back 6 days 6 hours old
- A New Tool to Detect Cellular Spying | EFFector 37.3 1 week 7 hours old
- How to Delete Your 23andMe Data 1 week 8 hours old
- Saving the Internet in Europe: Fostering Choice, Competition and the Right to Innovate 1 week 1 day old
- 230 Protects Users, Not Big Tech 1 week 2 days old
Malware Bytes Security
- “Nudify” deepfakes stored unprotected online 13 hours 34 min old
- Intimate images from kink and LGBTQ+ dating apps left exposed online 1 day 15 hours old
- “Urgent reminder” tax scam wants to phish your Microsoft credentials 1 day 17 hours old
- A week in security (March 24 – March 30) 2 days 19 hours old
- Why we’re no longer doing April Fools’ Day 2 days 19 hours old
- Vulnerability in most browsers abused in targeted attacks 5 days 10 hours old
- “This fraud destroyed my life.” Man ends up with criminal record after ID was stolen 6 days 12 hours old
- Moving from WhatsApp to Signal: A good idea? 6 days 13 hours old
- Security expert Troy Hunt hit by phishing attack 1 week 6 hours old
- Fake Booking.com phish uses fake CAPTCHAs to trick hotel staff into downloading malware 1 week 16 hours old
The Security Ledger
- Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” 13 hours 35 min old
- SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk 5 days 15 hours old
- G2 Names INE 2025 Cybersecurity Training Leader 6 days 13 hours old
- IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security 1 week 1 day old
- Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection 1 week 1 day old
- CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups 1 week 1 day old
- ARMO Launches First Cloud App Detection and Response to Unify Code to Cloud Runtime Security 1 week 1 day old
- Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience 1 week 2 days old
- SecPod launches Saner Cloud: A Revolutionary CNAPP For Preventive Cybersecurity 2 weeks 8 hours old
- SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats 2 weeks 15 hours old
Microsoft Malware Protection Center
- Transforming public sector security operations in the AI era 1 day 11 hours old
- Analyzing open-source bootloaders: Finding vulnerabilities faster with AI 2 days 11 hours old
- New innovations in Microsoft Purview for protected, AI-ready data 2 days 12 hours old
- US Department of Labor’s journey to Zero Trust security with Microsoft Entra ID 6 days 11 hours old
- Microsoft unveils Microsoft Security Copilot agents and new protections for AI 1 week 2 days old
- AI innovation requires AI security: Hear what’s new at Microsoft Secure 2 weeks 1 day old
- StilachiRAT analysis: From system reconnaissance to cryptocurrency theft 2 weeks 2 days old
- How MSRC coordinates vulnerability research and disclosure while building community 2 weeks 6 days old
- Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware 2 weeks 6 days old
- New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects 3 weeks 1 day old
US-Cert Current Activity
- CISA Releases Two Industrial Control Systems Advisories 1 day 15 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 day 15 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 2 days 15 hours old
- CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure 5 days 15 hours old
- CISA Releases One Industrial Control Systems Advisory 6 days 15 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 6 days 15 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 15 hours old
- CISA Releases Four Industrial Control Systems Advisories 1 week 1 day old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 2 days old
- CISA Releases Five Industrial Control Systems Advisories 1 week 6 days old
KrebsOnSecurity
- How Each Pillar of the 1st Amendment is Under Attack 3 days 1 hour old
- When Getting Phished Puts You in Mortal Danger 6 days 10 hours old
- Arrests in Tap-to-Pay Scheme Powered by Phishing 1 week 5 days old
- DOGE to Fired CISA Staff: Email Us Your Personal Data 2 weeks 1 hour old
- ClickFix: How to Infect Your PC in Three Easy Steps 2 weeks 5 days old
- Microsoft: 6 Zero-Days in March 2025 Patch Tuesday 3 weeks 1 day old
- Alleged Co-Founder of Garantex Arrested in India 3 weeks 1 day old
- Feds Link $150M Cyberheist to 2022 LastPass Hacks 3 weeks 5 days old
- Who is the DOGE and X Technician Branden Spikes? 3 weeks 6 days old
Guardian Security
- Birthday freebies: how to cash in on UK retailers’ gifts and discounts 4 days 20 hours old
Google Security Blog
- New security requirements adopted by HTTPS certificate industry 6 days 6 hours old
- Titan Security Keys now available in more countries 1 week 10 hours old
- Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source 2 weeks 2 days old
- Vulnerability Reward Program: 2024 in Review 3 weeks 5 days old
Security Now
- SN 1018: The Quantum Threat - ESP32 Backdoor Update, RCS E2EE 1 week 1 day old
- SN 1017: Is YOUR System Vulnerable to RowHammer? - Telegram's Crypto, Twitter Outage, FBI Warning 2 weeks 1 day old
- SN 1016: The Bluetooth Backdoor - North Korean Texans, Apple Pushes Back 3 weeks 1 day old
- SN 1015: Spatial-Domain Wireless Jamming - Firefox Privacy Policy, Signal Leaving Sweden? 4 weeks 23 hours old
Tao Security
US-Cert Alerts
- #StopRansomware: Medusa Ransomware 3 weeks 1 day old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tech Crunch Security
Techworld Security
Threat Post
