Categories
CNET
- Today's NYT Mini Crossword Answers for Saturday, Feb. 22 4 hours 41 min old , CNET Feed
- Best Tested Portable Air Conditioners for 2025 7 hours 40 min old , CNET Feed
- Best Soda Makers to Buy in 2025: Get the Best Bubbly With These Top-Rated Machines 8 hours 20 min old , CNET Feed
- James Bond's Move to Amazon Could Be a Good Thing 10 hours 38 min old , CNET Feed
- Today's NYT Strands Hints, Answers and Help for Feb. 22, #356 11 hours 41 min old , CNET Feed
- Today's NYT Connections Hints, Answers and Help for Feb. 22, #622 11 hours 41 min old , CNET Feed
- Today's NYT Connections: Sports Edition Hints and Answers for Feb. 22, #152 11 hours 41 min old , CNET Feed
- Today's Wordle Hints, Answer and Help for Feb. 22, #1344 11 hours 41 min old , CNET Feed
- What's Behind OpenAI's Recent Growth Spurt to 400 Million Weekly Users? 11 hours 41 min old , CNET Feed
- The 'E' in iPhone 16E Might As Well Stand for Expensive 12 hours 41 min old , CNET Feed
Computer Weekly
- Apple withdraws encrypted iCloud storage from UK after government demands ‘back door’ access 19 hours 49 min old , Computer Weekly Feed
- Auditor: 2026 till Birmingham recovers from botched Oracle project 20 hours 56 min old , Computer Weekly Feed
- Understanding intersectionality: Inclusion and employees’ whole life experience 22 hours 11 min old , Computer Weekly Feed
- UK police forces ‘supercharging racism’ with predictive policing 1 day 21 min old , Computer Weekly Feed
- A landscape forever altered? The LockBit takedown one year on 1 day 1 hour old , Computer Weekly Feed
- Volvo to roll out second software-defined electric car 1 day 21 hours old , Computer Weekly Feed
- Watchdog approves Sellafield physical security, but warns about cyber 1 day 21 hours old , Computer Weekly Feed
- Microsoft overcomes quantum barrier with new particle 1 day 22 hours old , Computer Weekly Feed
- Privacy at a crossroads in the age of AI and quantum 1 day 23 hours old , Computer Weekly Feed
- ARM and Meta: Plotting a path to dilute GPU capacity 3 days 16 min old , Computer Weekly Feed
US-CERT Feed
- CISA Adds One Known Exploited Vulnerability to Catalog 20 hours 41 min old , US-Cert Current Activity
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 day 20 hours old , US-Cert Current Activity
- CISA Releases Eight Industrial Control Systems Advisories 1 day 20 hours old , US-Cert Current Activity
- #StopRansomware: Ghost (Cring) Ransomware 2 days 16 hours old , US-Cert Alerts
- CISA and Partners Release Advisory on Ghost (Cring) Ransomware 2 days 20 hours old , US-Cert Current Activity
- CISA Releases Two Industrial Control Systems Advisories 3 days 20 hours old , US-Cert Current Activity
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 3 days 20 hours old , US-Cert Current Activity
- CISA Releases Twenty Industrial Control Systems Advisories 1 week 1 day old , US-Cert Current Activity
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 1 day old , US-Cert Current Activity
- CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software 1 week 2 days old , US-Cert Current Activity
Krebs
- How Phished Data Turns into Apple & Google Wallets 3 days 14 hours old , KrebsOnSecurity
- Nearly a Year Later, Mozilla is Still Promoting OneRep 1 week 1 day old , KrebsOnSecurity
- Microsoft Patch Tuesday, February 2025 Edition 1 week 3 days old , KrebsOnSecurity
- Teen on Musk’s DOGE Team Graduated from ‘The Com’ 2 weeks 8 hours old , KrebsOnSecurity
- Experts Flag Security, Privacy Risks in DeepSeek AI App 2 weeks 1 day old , KrebsOnSecurity
- Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’? 2 weeks 3 days old , KrebsOnSecurity
- FBI, Dutch Police Disrupt ‘Manipulaters’ Phishing Gang 3 weeks 14 hours old , KrebsOnSecurity
- Infrastructure Laundering: Blending in with the Cloud 3 weeks 1 day old , KrebsOnSecurity
- A Tumultuous Week for Federal Cybersecurity Efforts 3 weeks 4 days old , KrebsOnSecurity
SecurityWeek
- Freelance Software Developers in North Korean Malware Crosshairs 16 hours 43 min old , Security Week
- Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand 16 hours 45 min old , Security Week
- Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics 17 hours 47 min old , Security Week
- In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked 19 hours 5 min old , Security Week
- Vulnerabilities in MongoDB Library Allow RCE on Node.js Servers 19 hours 33 min old , Security Week
- How China Pinned University Cyberattacks on NSA Hackers 20 hours 15 min old , Security Week
- CISA Warns of Attacks Exploiting Craft CMS Vulnerability 20 hours 56 min old , Security Week
- Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls 21 hours 40 min old , Security Week
- Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines 1 day 15 hours old , Security Week
- Mining Company NioCorp Loses $500,000 in BEC Hack 1 day 16 hours old , Security Week
Security Wire Daily News
- Palo Alto Networks vulnerabilities exploited in chained attack 17 hours 39 min old , Security Wire Daily News
- What is application allowlisting? 23 hours 41 min old , Security Wire Daily News
- What is a network packet? 23 hours 41 min old , Security Wire Daily News
- 3 ways to retool UC platform security architecture models 23 hours 41 min old , Security Wire Daily News
- How to build an effective IAM architecture 1 day 8 hours old , Security Wire Daily News
- Risk & Repeat: Salt Typhoon hasn't stopped hacking 1 day 18 hours old , Security Wire Daily News
- What is a checksum? 1 day 23 hours old , Security Wire Daily News
- Penetration testing vs. vulnerability scanning: What's the difference? 1 day 23 hours old , Security Wire Daily News
- What is Transport Layer Security (TLS)? 1 day 23 hours old , Security Wire Daily News
- 9 tips for migrating between managed SOC providers 2 days 20 hours old , Security Wire Daily News
Security Wire Weekly
- What is Internet Key Exchange (IKE)? 2 weeks 3 days old , Security Wire Weekly
Security News White Papers
Cloud Security Briefing New and Advice
- How to build an effective IAM architecture 1 day 8 hours old , Cloud Security Briefing: News and Advice
Threat Post
Naked Security
CSO Online
InfoSec Island
Schneier on Security
Tripwire
Wired Security
- DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online 12 hours 43 min old , Wired Security
- The US Is Considering a TP-Link Router Ban—Should You Worry? 19 hours 11 min old , Wired Security
- The National Institute of Standards and Technology Braces for Mass Firings 1 day 12 hours old , Wired Security
- Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases 1 day 20 hours old , Wired Security
- How One AI Startup Founder Cornered Microsoft Into Finally Taking Down Explicit Videos of Her 1 day 22 hours old , Wired Security
- DOGE Now Has Access to the Top US Cybersecurity Agency 2 days 6 hours old , Wired Security
- A Signal Update Fends Off a Phishing Technique Used in Russian Espionage 2 days 21 hours old , Wired Security
- Elon Musk's DOGE Is Being Sued Under the Privacy Act: What to Know 3 days 10 hours old , Wired Security
- The Official DOGE Website Launch Was a Security Mess 6 days 21 hours old , Wired Security
- Top US Election Security Watchdog Forced to Stop Election Security Work 1 week 5 hours old , Wired Security
Dark Reading
NoticeBored
The Security Ledger
- INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech 2 days 17 hours old , The Security Ledger
- Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions 3 days 18 hours old , The Security Ledger
- Episode 260: The Art of Teaching Secure Coding with Tanya Janca 3 days 21 hours old , The Security Ledger
- Gcore Radar report reveals 56% year-on-year increase in DDoS attacks 1 week 4 days old , The Security Ledger
- Michael Trites Joins Aembit as Senior Vice President of Global Sales 2 weeks 2 days old , The Security Ledger
- SpyCloud Pioneers the Shift to Holistic Identity Threat Protection 2 weeks 3 days old , The Security Ledger
- Doppler announces integration with Datadog to streamline security and monitoring 3 weeks 1 day old , The Security Ledger
- SquareX Discloses “Browser Syncjacking” , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk 3 weeks 1 day old , The Security Ledger
- More Of The Shame: Software Flaw Exposes Millions of Subarus, Rivers of Driver Data 3 weeks 5 days old , The Security Ledger
- INE Security Alert: Expediting CMMC 2.0 Compliance 3 weeks 5 days old , The Security Ledger
Electronic Freedom Foundation
- The Judicial Conference Should Continue to Liberally Allow Amicus Briefs, a Critical Advocacy Tool 7 hours 44 min old , EFF
- Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting 11 hours 23 min old , EFF
- EFF at RightsCon 2025 15 hours 9 min old , EFF
- Utah Bill Aims to Make Officers Disclose AI-Written Police Reports 16 hours 34 min old , EFF
- AI and Copyright: Expanding Copyright Hurts Everyone—Here’s What to Do Instead 2 days 11 hours old , EFF
- Copyright and AI: the Cases and the Consequences 2 days 11 hours old , EFF
- EFF and Repro Uncensored Launch #StopCensoringAbortion Campaign 2 days 15 hours old , EFF
- Saving the Internet in Europe: Defending Privacy and Fighting Surveillance 2 days 20 hours old , EFF
- Crimson Memo: Analyzing the Privacy Impact of Xianghongshu AKA Red Note 3 days 8 hours old , EFF
- Alaa Abd El Fattah's Mother, Laila Soueif, Calls on UK Government to Help as She Continues Hunger Strike 1 week 21 hours old , EFF
Network World
InfoWorld
Cisco
- Cisco Secure Email Gateway Email Filter Bypass Vulnerability 2 days 8 hours old , Cisco Security Advisories
- Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability 2 days 8 hours old , Cisco Security Advisories
- Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability 2 days 8 hours old , Cisco Security Advisories
- Cisco NX-OS Software Image Verification Bypass Vulnerability 2 weeks 2 days old , Cisco Security Advisories
- Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability 2 weeks 2 days old , Cisco Security Advisories
- Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability 2 weeks 2 days old , Cisco Security Advisories
- Cisco Expressway Series Cross-Site Scripting Vulnerability 2 weeks 2 days old , Cisco Security Advisories
- Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities 2 weeks 2 days old , Cisco Security Advisories
- Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities 2 weeks 2 days old , Cisco Security Advisories
- Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities 2 weeks 2 days old , Cisco Security Advisories
Corero Security
SlashDot
- First Look At Secretive X-37B Space Plane In Orbit 57 min 40 sec old , SlashDot
- Mark Zuckerberg's Makeover Didn't Make People Like Him, Study Shows 4 hours 7 min old , SlashDot
- Scientists Question Microsoft's Quantum Computing Claims 5 hours 13 min old , SlashDot
- Data Is Very Valuable, Just Don't Ask Us To Measure It, Leaders Say 6 hours 14 min old , SlashDot
- Asus Continues Fragrant Device Trend With an Aromatic Mouse 7 hours 15 min old , SlashDot
- The Protesters Who Want To Ban AGI Before It Even Exists 8 hours 18 min old , SlashDot
- OpenAI Bans Chinese Accounts Using ChatGPT To Edit Code For Social Media Surveillance 8 hours 18 min old , SlashDot
- The GSA Is Shutting Down Its EV Chargers 9 hours 19 min old , SlashDot
- India's 'Human Calculator Kid' Shatters 6 World Records In a Single Day 10 hours 23 min old , SlashDot
- OpenAI Plans To Shift Compute Needs From Microsoft To SoftBank 10 hours 23 min old , SlashDot
Hacker News
- Ask HN: What could Trump / Musk gain from inspecting Fort Knox? 1 hour 2 min old , Hacker News
- The Linux Command Line 1 hour 5 min old , Hacker News
- SETI's Hard Steps (and How to Resolve Them) 1 hour 7 min old , Hacker News
- Preprinted Forms Don't Go to Trial 1 hour 9 min old , Hacker News
- Debris from Blue Origin and SpaceX Rockets Found in Bahamas and Europe 1 hour 10 min old , Hacker News
- AzSky: Dive Deep into Meaningful Discussions 1 hour 20 min old , Hacker News
- Pournelle's Iron Law of Bureaucracy 1 hour 31 min old , Hacker News
- Show HN: LLM 100k portfolio management benchmark 1 hour 34 min old , Hacker News
- Meme Coins Cracked Review and Download – Makemoneyonlinewith.com 1 hour 38 min old , Hacker News
- The Wild Economics Behind Ferrari's Domination of the Luxury Car Market 1 hour 38 min old , Hacker News
Security Now
- SN 1013: Chrome Web Store is a mess - Apple Encryption in the UK, Texas Vs. DeepSeek 3 days 4 hours old , Security Now
- SN 1012: Hiding School Cyberattacks - SparkCat, Decrypting ADP, AI Fuzzing 1 week 3 days old , Security Now
- SN 1011: Jailbreaking AI - Deepseek, "ROUTERS" Act, Zyxel Vulnerability 2 weeks 3 days old , Security Now
- SN 1010: DNS Over TLS - Record DDoS, Hackers Get Hacked 3 weeks 3 days old , Security Now
Tao Security
Graham Cluely
- Smashing Security podcast #403: Coinbase crypto heists, QR codes, and ransomware in the classroom 2 weeks 2 days old , Graham Cluely Security Blog
- Man sentenced to 7 years in prison for role in $50m internet scam 2 weeks 2 days old , Graham Cluely Security Blog
- The AI Fix #36: A DeepSeek special 2 weeks 3 days old , Graham Cluely Security Blog
- Smashing Security podcast #402: Hackers get hacked, the British Museum IT shutdown, and social media kidnaps 3 weeks 2 days old , Graham Cluely Security Blog
- Ex-worker arrested after ‘shutdown’ of British Museum computer systems 3 weeks 2 days old , Graham Cluely Security Blog
- The AI Fix #35: Project Stargate, the AI emergency, and batsh*t AI cryonics 3 weeks 3 days old , Graham Cluely Security Blog
- Hacked buses blare out patriotic pro-European anthems in Tbilisi, attack government 3 weeks 4 days old , Graham Cluely Security Blog
Google Security Blog
- How we kept the Google Play & Android app ecosystems safe in 2024 3 weeks 2 days old , Google Security Blog
- How we estimate the risk from prompt injection attacks on AI systems 3 weeks 2 days old , Google Security Blog
Microsoft
- Microsoft at Legalweek: Help safeguard your AI future with Microsoft Purview 1 day 15 hours old , Microsoft Malware Protection Center
- Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms 2 days 15 hours old , Microsoft Malware Protection Center
- Join us for the end-to-end Microsoft RSAC 2025 Conference experience 3 days 15 hours old , Microsoft Malware Protection Center
- Storm-2372 conducts device code phishing campaign 1 week 1 day old , Microsoft Malware Protection Center
- Securing DeepSeek and other AI systems with Microsoft Security 1 week 1 day old , Microsoft Malware Protection Center
- The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation 1 week 2 days old , Microsoft Malware Protection Center
- Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series 1 week 4 days old , Microsoft Malware Protection Center
- Code injection attacks using publicly disclosed ASP.NET machine keys 2 weeks 1 day old , Microsoft Malware Protection Center
- Hear from Microsoft Security experts at these top cybersecurity events in 2025 2 weeks 4 days old , Microsoft Malware Protection Center
- 3 priorities for adopting proactive identity and access security in 2025 3 weeks 3 days old , Microsoft Malware Protection Center
Tech Crunch
PC Magazine Security
Paul's Security Weekly
ZDNet Security
- American Airlines now lets you track your luggage with AirTags - here's how 16 hours 30 min old , ZDNet Security
- Is your phone truly waterproof? Here's what the IP rating tells you 18 hours 2 min old , ZDNet Security
- 9 ways to delete yourself from the internet (and hide your identity online) 1 day 14 hours old , ZDNet Security
- Can't quit Windows 10? You can pay Microsoft for updates after October, or try these alternatives 1 day 17 hours old , ZDNet Security
- Aqara's first outdoor camera is this smart home enthusiast's dream device - here's why 2 days 41 min old , ZDNet Security
- The best password managers for businesses in 2025: Expert tested 2 days 7 hours old , ZDNet Security
- The head of US AI safety has stepped down. What now? 2 days 12 hours old , ZDNet Security
- US AI Safety Institute will be 'gutted,' Axios reports 2 days 13 hours old , ZDNet Security
- Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything 2 days 15 hours old , ZDNet Security
- I tried Norton Private Browser to see how it compares to Tor - here's what I found 2 days 15 hours old , ZDNet Security
The Gaurdian
- Apple removes advanced data protection tool after UK government request 15 hours 53 min old , Guardian Security
- Global ransomware payments plunge by a third amid crackdown 2 weeks 2 days old , Guardian Security
- DeepSeek blocked from some app stores in Italy amid questions on data use 3 weeks 2 days old , Guardian Security
- Threat of cyber-attacks on Whitehall ‘is severe and advancing quickly’, NAO says 3 weeks 3 days old , Guardian Security
TechWorld Security
Malware Bytes
- Healthcare security lapses keep piling up 16 hours 23 min old , Malware Bytes Security
- SecTopRAT bundled in Chrome installer distributed via Google Ads 1 day 12 hours old , Malware Bytes Security
- Google Docs used by infostealer ACRStealer as part of attack 1 day 16 hours old , Malware Bytes Security
- DeepSeek found to be sharing user data with TikTok parent company ByteDance 1 day 18 hours old , Malware Bytes Security
- Protected: zQA Content Editing Styles 2 days 13 hours old , Malware Bytes Security
- Malwarebytes introduces native ARM support for Windows devices 2 days 18 hours old , Malware Bytes Security
- Google now allows digital fingerprinting of its users 2 days 19 hours old , Malware Bytes Security
- Macs targeted by info stealers in new era of cyberthreats 2 days 19 hours old , Malware Bytes Security
- Hard drives containing sensitive medical data found in flea market 3 days 11 hours old , Malware Bytes Security
- A week in security (February 10 – February 16) 5 days 29 min old , Malware Bytes Security