Sources
Hacker News
- Paris Votes for 500 More Car Free Streets 11 min 11 sec old
- Awesome-fdroid: A table to sort, filter and discover popular F-Droid apps 12 min 16 sec old
- Show HN: OCR pipeline for ML training (tables, diagrams, math, multilingual) 16 min 10 sec old
- Lorentz Invariance Violation? 17 min 27 sec old
- BBC boss warns of Russian and Chinese propaganda 19 min 40 sec old
- Zuckerberg Lobbies Trump to Avoid Meta Antitrust Trial 21 min 17 sec old
- The Case Against Character Count Line Limits 23 min 14 sec old
- Chawan: Web Browser in TUI 23 min 53 sec old
- Show HN: Compare success rates, and services across fertility clinics in the US 28 min 31 sec old
- I reimplemented Mastra workflows with my own durable functions and I regret it 29 min 36 sec old
SlashDot
- Vibe Coded AI App Generates Recipes With Very Few Guardrails 2 hours 8 min old
- Open-Source Tool Designed To Throttle PC and Server Performance Based On Electricity Pricing 4 hours 9 min old
- NaNoWriMo To Close After 20 Years 4 hours 9 min old
- Five VPN Apps In the App Store Had Links To Chinese Military 5 hours 10 min old
- Anthropic Launches an AI Chatbot Plan For Colleges and Universities 6 hours 11 min old
- India Set For $100 Billion Startup IPO Surge By 2027 6 hours 11 min old
- Bill Gates Celebrates Microsoft's 50th By Releasing Altair BASIC Source Code 7 hours 13 min old
- Vast Pedophile Network Shut Down In Europol's Largest CSAM Operation 8 hours 14 min old
- Global Scam Industry Evolving at 'Unprecedented Scale' Despite Recent Crackdown 8 hours 14 min old
- European Commission Takes Aim At End-to-End Encryption and Proposes Europol Become an EU FBI 9 hours 15 min old
CNET Feed
- Today's NYT Mini Crossword Answers for Thursday, April 3 3 hours 38 min old
- Best Smart Home Gyms for 2025, as Tested by Our Resident Fitness Expert 5 hours 52 min old
- Which Nintendo Switch Accessories Will Work With the Nintendo Switch 2? 7 hours 2 min old
- Using Affirm's BNPL Plan Could Now Affect Your Credit Score 8 hours 4 min old
- Starseeker, Silksong and Other New Switch 2 Games Revealed During Stream Freeze 8 hours 12 min old
- Visa Allegedly Makes a Bid to Unseat Mastercard as Apple Card's Partner 8 hours 33 min old
- Here Are the Switch 2 Games I'm Excited to Play 8 hours 55 min old
- What Is 5G Home Internet and Could It Be Your Home Broadband Solution? 9 hours 4 min old
- Today's NYT Connections: Sports Edition Hints and Answers for April 3, #192 9 hours 30 min old
- Today's NYT Connections Hints, Answers and Help for April 3, #662 9 hours 37 min old
Graham Cluely Security Blog
- Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers 7 hours 4 min old
- The AI Fix #44: AI-generated malware, and a stunning AI breakthrough 1 day 14 hours old
- Hackers exploit little-known WordPress MU-plugins feature to hide malware 1 day 20 hours old
- £3 million fine for healthcare MSP with sloppy security after it was hit by ransomware attack 4 days 18 hours old
- VanHelsing ransomware: what you need to know 5 days 15 hours old
- Malaysian PM says “no way” to $10 million ransom after alleged cyber attack against Kuala Lumpur airport 6 days 20 hours old
- Smashing Security podcast #410: Unleash the AI bot army against the scammers – now! 1 week 6 hours old
- The AI Fix #43: I, for one, welcome our new robot overlords! 1 week 1 day old
- BlackLock ransomware: What you need to know 1 week 6 days old
- Smashing Security podcast #409: Peeping perverts and FBI phone calls 1 week 6 days old
Cisco Security Advisories
- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities 7 hours 4 min old
- Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability 7 hours 4 min old
- Cisco Enterprise Chat and Email Denial of Service Vulnerability 7 hours 4 min old
- Cisco Webex for BroadWorks Credential Exposure Vulnerability 1 day 2 hours old
- Cisco Smart Licensing Utility Vulnerabilities 1 day 3 hours old
- Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability 5 days 4 hours old
- Cisco IOS XR Software Access Control List Bypass Vulnerability 3 weeks 4 min old
- Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability 3 weeks 7 hours old
- Cisco IOS XR Software CLI Privilege Escalation Vulnerability 3 weeks 7 hours old
- Cisco IOS XR Software for ASR 9000 Series Routers IPv4 Unicast Packets Denial of Service Vulnerability 3 weeks 7 hours old
Cloud Security Briefing: News and Advice
- If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. 9 hours 15 min old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 9 hours 15 min old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 9 hours 15 min old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 9 hours 15 min old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 9 hours 15 min old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 9 hours 15 min old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 9 hours 15 min old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 9 hours 15 min old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 9 hours 15 min old
- SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. 9 hours 15 min old
Computer Weekly Feed
- Home Office refuses to answer questions from Lords over technical capability notice issued against Apple’s iCloud Advanced Data Protection encryption services 9 hours 15 min old
- Support group calls on former subpostmasters in Scotland who have been affected by Horizon errors to come forward 9 hours 15 min old
- Former HMRC assistant director Ray McCann is leading the latest independent review into the UK government’s controversial Loan Charge policy, which has left thousands of IT contractors saddled with life-changing tax bills 9 hours 15 min old
- Scottish statutory body attempting to contact people that might have been wrongly convicted of crimes based on the Post Office’s flawed systems 9 hours 15 min old
- Marking the 21st anniversary of Gmail, Google is preparing to roll out an end-to-end encryption standard for its email service in hopes of democratising encryption and leaving old standards in the dust 9 hours 15 min old
- People may try to lock up GPU resources even if they don’t need them all day – but not anymore, thanks to Nvidia KAI Scheduler 9 hours 15 min old
- The IT sectors of the UK and Ukraine have built strong relationships since Russia’s invasion of the latter, and there is more to come, writes the IT Ukraine Association’s ambassador in the UK 9 hours 15 min old
- The professional social network’s product chief is leading the introduction of artificial intelligence for the firm’s in-house development processes and to enhance services for users 9 hours 15 min old
- KnowTheChain’s latest benchmark analysis of the IT sector’s efforts to address forced labour in supply chains shows there has been very little improvement in their due diligence practices over the last half decade 9 hours 15 min old
- Apple has appealed to the Investigatory Powers Tribunal over an order by home secretary Yvette Cooper to give the UK access to customers' data protected by Advanced Data Protection encryption. What happens next? 9 hours 15 min old
Security Wire Daily News
- Risk assessments are a critical part of a disaster recovery plan. Find out how to prepare a risk assessment, then download our included free template to create one. 9 hours 15 min old
- Think you're talking to your boss on Zoom? You might want to think again. Deepfake technology has already cost enterprises millions of dollars. Here's how to fight fire with fire. 9 hours 15 min old
- Continuous monitoring constantly observes the performance and operation of IT assets to help reduce risk and improve uptime instead of taking a point-in-time snapshot of a device, network or application. 9 hours 15 min old
- APIs are the backbone of most modern applications, and companies must build in API security from the start. Follow these guidelines to design, deploy and protect your APIs. 9 hours 15 min old
- Wi-Fi standards continue to evolve. The three most recent standards -- Wi-Fi 6, Wi-Fi 6E and Wi-Fi 7 -- build on each other's capabilities, but all have their own unique features. 9 hours 15 min old
- A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats. 9 hours 15 min old
- When it comes to data, context is everything. Learn how a cybersecurity data fabric can supercharge a security team's ability to see the big picture. 9 hours 15 min old
- Zero standing privileges combines the zero-trust model with the principle of least privilege to strengthen privileged access management and reduce enterprise attack surfaces. 9 hours 15 min old
- Google's acquisition of Wiz for $32 billion highlights the importance of cloud-native security as organizations transition to microservices and containerization. 9 hours 15 min old
- Do you know the difference between a business impact analysis and risk assessment? Find out how they differ and why you need to perform both here. 9 hours 15 min old
Security Wire Weekly
- You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. 9 hours 15 min old
- Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ. 9 hours 15 min old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 9 hours 15 min old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 9 hours 15 min old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 9 hours 15 min old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 9 hours 15 min old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 9 hours 15 min old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 9 hours 15 min old
- Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users. 9 hours 15 min old
- A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web. 9 hours 15 min old
ZDNet Security
- T-Mobile settlement payouts begin this month - how much you could get 12 hours 29 min old
- iOS 18.4 update draining your iPhone's battery? Try these 6 fixes 17 hours 11 min old
- 5 tools I trust to keep my online conversations private and anonymous 1 day 13 hours old
- Windows 11 PC won't boot? Microsoft's new tool tries to fix it before you even panic - here's how 1 day 15 hours old
- Google says easy email encryption is on the way - for some users 1 day 17 hours old
- How to talk to your family and friends about online security - before it's too late 1 day 18 hours old
- Why multi-factor authentication is absolutely essential in 2025 1 day 19 hours old
- Why delaying software updates is a terrible idea 1 day 20 hours old
- Help! I clicked on a phishing link - now what? 1 day 20 hours old
- Why no small business is too small for hackers - and 8 security best practices for SMBs 1 day 20 hours old
Wired Security
- Cybersecurity Professor Faced China Funding Inquiry Before Disappearing, Sources Say 12 hours 33 min old
- Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes 2 days 10 hours old
- An AI Image Generator’s Exposed Database Reveals What People Really Used It For 2 days 20 hours old
- Top Trump Officials’ Passwords and Personal Phone Numbers Discovered Online 4 days 19 hours old
- Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public 6 days 8 hours old
- SignalGate Is Driving the Most US Downloads of Signal Ever 6 days 11 hours old
- Mike Waltz Left His Venmo Friends List Public 1 week 9 hours old
- SignalGate Isn't About Signal 1 week 11 hours old
- 6 Best Password Managers (2025), Tested and Reviewed 1 week 16 hours old
- How to Delete Your Data From 23andMe 1 week 2 days old
Security Week
- Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering 13 hours 16 min old
- Vulnerabilities Expose Jan AI Systems to Remote Manipulation 13 hours 54 min old
- Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion 14 hours 35 min old
- AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor 15 hours 57 min old
- Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses 16 hours 21 min old
- North Korea’s IT Operatives Are Exploiting Remote Work Globally 16 hours 41 min old
- ImageRunner Flaw Exposed Sensitive Information in Google Cloud 17 hours 54 min old
- Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks 19 hours 18 min old
- Questions Remain Over Attacks Causing DrayTek Router Reboots 19 hours 34 min old
- Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users 19 hours 59 min old
EFF
- Site-Blocking Legislation Is Back. It’s Still a Terrible Idea. 14 hours 10 min old
- Vote for “How to Fix the Internet” in the Webby Awards People's Voice Competition! 1 day 11 hours old
- EFF Urges Third Circuit to Join the Legal Chorus: No One Owns the Law 2 days 9 hours old
- Announcing EFF’s New Exhibit on Border Surveillance and Accompanying Events 2 days 13 hours old
- A Congressional Bill to Limit Court Power Through Injunctions Is a Bad, Transparent Effort to Limit Court Power 5 days 9 hours old
- Online Tracking is Out of Control—Privacy Badger Can Help You Fight Back 6 days 8 hours old
- A New Tool to Detect Cellular Spying | EFFector 37.3 1 week 10 hours old
- How to Delete Your 23andMe Data 1 week 11 hours old
- Saving the Internet in Europe: Fostering Choice, Competition and the Right to Innovate 1 week 1 day old
- 230 Protects Users, Not Big Tech 1 week 2 days old
Malware Bytes Security
- “Nudify” deepfakes stored unprotected online 16 hours 27 min old
- Intimate images from kink and LGBTQ+ dating apps left exposed online 1 day 18 hours old
- “Urgent reminder” tax scam wants to phish your Microsoft credentials 1 day 20 hours old
- A week in security (March 24 – March 30) 2 days 21 hours old
- Why we’re no longer doing April Fools’ Day 2 days 22 hours old
- Vulnerability in most browsers abused in targeted attacks 5 days 13 hours old
- “This fraud destroyed my life.” Man ends up with criminal record after ID was stolen 6 days 15 hours old
- Moving from WhatsApp to Signal: A good idea? 6 days 15 hours old
- Security expert Troy Hunt hit by phishing attack 1 week 9 hours old
- Fake Booking.com phish uses fake CAPTCHAs to trick hotel staff into downloading malware 1 week 19 hours old
The Security Ledger
- Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” 16 hours 27 min old
- SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk 5 days 18 hours old
- G2 Names INE 2025 Cybersecurity Training Leader 6 days 16 hours old
- IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security 1 week 1 day old
- Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection 1 week 1 day old
- CYREBRO Recognized in Gartner Emerging Tech Report for Detection and Response Startups 1 week 1 day old
- ARMO Launches First Cloud App Detection and Response to Unify Code to Cloud Runtime Security 1 week 1 day old
- Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience 1 week 2 days old
- SecPod launches Saner Cloud: A Revolutionary CNAPP For Preventive Cybersecurity 2 weeks 11 hours old
- SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats 2 weeks 18 hours old
Microsoft Malware Protection Center
- Transforming public sector security operations in the AI era 1 day 14 hours old
- Analyzing open-source bootloaders: Finding vulnerabilities faster with AI 2 days 14 hours old
- New innovations in Microsoft Purview for protected, AI-ready data 2 days 15 hours old
- US Department of Labor’s journey to Zero Trust security with Microsoft Entra ID 6 days 14 hours old
- Microsoft unveils Microsoft Security Copilot agents and new protections for AI 1 week 2 days old
- AI innovation requires AI security: Hear what’s new at Microsoft Secure 2 weeks 1 day old
- StilachiRAT analysis: From system reconnaissance to cryptocurrency theft 2 weeks 2 days old
- How MSRC coordinates vulnerability research and disclosure while building community 2 weeks 6 days old
- Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware 2 weeks 6 days old
- New XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projects 3 weeks 1 day old
US-Cert Current Activity
- CISA Releases Two Industrial Control Systems Advisories 1 day 18 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 day 18 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 2 days 18 hours old
- CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure 5 days 18 hours old
- CISA Releases One Industrial Control Systems Advisory 6 days 18 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 6 days 18 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 18 hours old
- CISA Releases Four Industrial Control Systems Advisories 1 week 1 day old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 2 days old
- CISA Releases Five Industrial Control Systems Advisories 1 week 6 days old
KrebsOnSecurity
- How Each Pillar of the 1st Amendment is Under Attack 3 days 4 hours old
- When Getting Phished Puts You in Mortal Danger 6 days 13 hours old
- Arrests in Tap-to-Pay Scheme Powered by Phishing 1 week 5 days old
- DOGE to Fired CISA Staff: Email Us Your Personal Data 2 weeks 4 hours old
- ClickFix: How to Infect Your PC in Three Easy Steps 2 weeks 5 days old
- Microsoft: 6 Zero-Days in March 2025 Patch Tuesday 3 weeks 1 day old
- Alleged Co-Founder of Garantex Arrested in India 3 weeks 1 day old
- Feds Link $150M Cyberheist to 2022 LastPass Hacks 3 weeks 5 days old
- Who is the DOGE and X Technician Branden Spikes? 3 weeks 6 days old
Guardian Security
- Birthday freebies: how to cash in on UK retailers’ gifts and discounts 4 days 23 hours old
Google Security Blog
- New security requirements adopted by HTTPS certificate industry 6 days 9 hours old
- Titan Security Keys now available in more countries 1 week 13 hours old
- Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source 2 weeks 2 days old
- Vulnerability Reward Program: 2024 in Review 3 weeks 5 days old
Security Now
- SN 1018: The Quantum Threat - ESP32 Backdoor Update, RCS E2EE 1 week 1 day old
- SN 1017: Is YOUR System Vulnerable to RowHammer? - Telegram's Crypto, Twitter Outage, FBI Warning 2 weeks 1 day old
- SN 1016: The Bluetooth Backdoor - North Korean Texans, Apple Pushes Back 3 weeks 1 day old
- SN 1015: Spatial-Domain Wireless Jamming - Firefox Privacy Policy, Signal Leaving Sweden? 4 weeks 1 day old
Tao Security
US-Cert Alerts
- #StopRansomware: Medusa Ransomware 3 weeks 1 day old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tech Crunch Security
Techworld Security
Threat Post
