Sources
SlashDot
- 'Qatar's $400 Million Jet For Trump Is a Gold-Plated Security Nightmare' 7 min 9 sec old
- Meta Threatens To Pull Facebook And Instagram Out Of Nigeria Over $290 Million Fine 1 hour 8 min old
- Audible Is Giving Publishers AI Tools To Quickly Make More Audiobooks 2 hours 8 min old
- Student's Robot Obliterates 4x4 Rubik's Cube World Record 2 hours 8 min old
- Google Wants To Make Stolen Android Phones Basically Unsellable 3 hours 10 min old
- Nextcloud Cries Foul Over Google Play Store App Rejection 3 hours 10 min old
- Republicans Try To Cram Decade-Long AI Regulation Ban Into Budget Reconciliation Bill 4 hours 10 min old
- USENIX Sunsets Annual Technical Conference After 30 Years 6 hours 14 min old
- Google Says Over 1 Billion RCS Messages Sent in the US Daily 6 hours 14 min old
- Office Apps on Windows 10 No Longer Tied To October 2025 End-of-Support Date 7 hours 15 min old
Hacker News
- NetworkOcean 11 min 4 sec old
- Computers That Can Run Backwards (2017) 11 min 47 sec old
- Apple's Widget Backdoor [video] 12 min 19 sec old
- Universal flu vaccine project puzzles scientists 15 min 3 sec old
- Wearipedia Find Wearable Performance 17 min 46 sec old
- Ask HN: Anyone else use a single gigantic .txt file as a notetaking solution? 20 min 28 sec old
- Horoscopes for children, but each one just tells you to get your kid vaccinated 22 min 55 sec old
- DeepSeek’s ‘tech madman’ founder is threatening US dominance in AI race 25 min 22 sec old
- Can a Photograph and AI Help Predict Who Will Survive Cancer Treatment? 37 min 39 sec old
- Sotheby's – Modern Evening Auction – Tue May 13 25 [video] 40 min 44 sec old
CNET Feed
- Today's NYT Connections: Sports Edition Hints and Answers for May 14, #233 1 hour 42 min old
- VPNSecure Customers Discover Their Lifetime Subscriptions Were Canceled 2 hours 26 min old
- Walmart Brings Back 'Basket Fee' for Some Orders: What To Know 2 hours 32 min old
- I Saw Ecovacs' New Self-Washing Robot Vacuums That Make Mopping Cleaner 3 hours 32 min old
- Krysten Ritter Returning to Jessica Jones Role in 'Daredevil: Born Again' Season 2 3 hours 54 min old
- McDonald's Snack Wrap: When Is the Viral Food Favorite Returning? 4 hours 4 min old
- Hey, Google: Prerecorded AI Presentations Are the Coward's Way Out 4 hours 29 min old
- Airbnb Services Emulates the Hotel Experience with Massages, Spas and Chefs 5 hours 19 min old
- NASA Astronaut Snaps Knockout Views of Flower Moon in Full Bloom 5 hours 31 min old
- Today's NYT Strands Hints, Answers and Help for May 14, #437 5 hours 32 min old
Computer Weekly Feed
- The UKR’s funding of research and innovation to support the government’s growth strategy has room for improvement. 2 hours 8 min old
- Microsoft fixes five exploited, and two publicly-disclosed, zero-days in the fifth Patch Tuesday update of 2025. 5 hours 14 min old
- M&S is instructing all its customers to change their account passwords after a significant amount of data was stolen in a DragonForce ransomware attack. 9 hours 17 min old
- The government’s flagship digital identity system has lost its certification against the government’s own digital identity system trust framework 13 hours 24 min old
- Post Office seeks off-the-shelf Horizon replacement as part of £492m tender that includes ongoing support for Horizon up to 2033 13 hours 24 min old
- Subpostmasters who appealed compensation payments have significantly increased ‘worryingly undervalued’ settlements 16 hours 33 min old
- Essex NHS wants to move some capacity to the Nutanix cloud, but can’t be certain prices will hold between product selection and when procurement plans gain approval 16 hours 33 min old
- UniCredit will transform operations through cloud, AI and data analytics technologies from Google Cloud 1 day 11 hours old
- University of Reading set to save circa £500,000 and deploy Nutanix NC2 hybrid cloud that will allow failover from main datacentre 1 day 15 hours old
- Technological opportunities typically come with a certain amount of risk – and generative AI adoption is no exception 4 days 8 hours old
ZDNet Security
- The best VPN services for iPhone in 2025: Expert tested and reviewed 5 hours 47 min old
- Your Android phone is getting a huge security upgrade for free - what's new 8 hours 32 min old
- No, Microsoft has not changed Windows 10 or Microsoft 365 support deadlines (again) 8 hours 54 min old
- I wanted a privacy screen protector - until I put one on my Galaxy S25 Ultra 16 hours 32 min old
- Your old router could be a security threat - here's why and what to do 1 day 6 hours old
- You could get $10K from 23andMe's data breach - how to file a claim today 1 day 9 hours old
- 100 leading AI scientists map route to more 'trustworthy, reliable, secure' AI 1 day 11 hours old
- Is your Microsoft account passwordless yet? Why it (probably) should be and how to do it right 1 day 11 hours old
- Your Android phone is getting a new security secret weapon - and it's a big deal 3 days 15 hours old
- Your password manager is under attack, and this new threat makes it worse: How to defend yourself 4 days 17 hours old
Security Week
- Adobe Patches Big Batch of Critical-Severity Software Flaws 5 hours 55 min old
- Microsoft to Lay Off About 3% of Its Workforce 6 hours 8 min old
- Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday 7 hours 19 min old
- Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments 12 hours 13 min old
- SAP Patches Another Critical NetWeaver Vulnerability 12 hours 42 min old
- Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 13 hours 3 min old
- Marks & Spencer Says Data Stolen in Ransomware Attack 14 hours 12 min old
- Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying 14 hours 33 min old
- Suspected DoppelPaymer Ransomware Group Member Arrested 15 hours 29 min old
- Orca Snaps Up Opus in Cloud Security Automation Push 15 hours 32 min old
Security Wire Daily News
- To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more. 6 hours 14 min old
- Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN. 8 hours 17 min old
- Check out the latest security news from the Informa TechTarget team. 4 days 4 hours old
- The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies. 4 days 6 hours old
- A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks. 4 days 10 hours old
- RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security. 4 days 11 hours old
- Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs for the long term. 5 days 4 hours old
- North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators. 5 days 7 hours old
- Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while adapting to emerging technologies and threats. 5 days 9 hours old
- The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. 5 days 10 hours old
Wired Security
- Google’s Advanced Protection for Vulnerable Users Comes to Android 6 hours 59 min old
- Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud 8 hours 32 min old
- An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado 11 hours 32 min old
- Deepfakes, Scams, and the Age of Paranoia 1 day 15 hours old
- ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador 3 days 15 hours old
- US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car 4 days 8 hours old
- US Customs and Border Protection Quietly Revokes Protections for Pregnant Women and Infants 5 days 3 hours old
- Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage 6 days 4 hours old
- The Trump Administration Sure Is Having Trouble Keeping Its Comms Private 6 days 7 hours old
- The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats 1 week 5 hours old
Graham Cluely Security Blog
- The AI Fix #50: AI brings dead man back for killer’s trial, and the judge loves it 9 hours 52 min old
- Two years’ jail for down-on-his-luck man who sold ransomware online 12 hours 54 min old
- LockBit ransomware gang breached, secrets exposed 4 days 14 hours old
- Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for “Donnie” Trump 4 days 16 hours old
- Smashing Security podcast #416: High street hacks, and Disney’s Wingdings woe 6 days 1 hour old
- NCSC warns of IT helpdesk impersonation trick being used by ransomware gangs after UK retailers attacked 6 days 15 hours old
- TeleMessage, the Signal clone used by US government officials, suffers hack 6 days 16 hours old
- The AI Fix #49: The typo from hell 1 week 10 hours old
- Smashing Security podcast #415: Hacking hijinks at the hospital, and WASPI scams 1 week 6 days old
- The AI Fix #48: AI Jesus, and is the AI Singularity almost upon us? 2 weeks 11 hours old
US-Cert Current Activity
- CISA Adds Five Known Exploited Vulnerabilities to Catalog 13 hours 32 min old
- Update to How CISA Shares Cyber-Related Alerts and Notifications 1 day 13 hours old
- CISA Releases Five Industrial Control Systems Advisories 5 days 13 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 6 days 13 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 13 hours old
- CISA Releases Three Industrial Control Systems Advisories 1 week 13 hours old
- Unsophisticated Cyber Actor(s) Targeting Operational Technology 1 week 13 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 1 day old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 4 days old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 1 week 5 days old
The Security Ledger
- INE Security Alert: Top 5 Takeaways from RSAC 2025 15 hours 20 min old
- SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks 6 days 12 hours old
- Link11 brings three brands together on one platform with new branding 1 week 6 days old
- SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI 2 weeks 9 hours old
- Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy 2 weeks 1 day old
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 2 weeks 6 days old
- Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 3 weeks 11 hours old
- Industry First: StrikeReady AI Platform Moves Security Teams Beyond Basic, One-Dimensional AI-Driven Triage Solutions 3 weeks 1 day old
- SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises Data Security of Millions 3 weeks 6 days old
Security Wire Weekly
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 1 day 9 hours old
- The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. 5 days 10 hours old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 1 week 5 days old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 1 week 6 days old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 1 week 6 days old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 1 week 6 days old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 1 week 6 days old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 1 week 6 days old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 1 week 6 days old
- Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users. 1 week 6 days old
Malware Bytes Security
- A week in security (May 4 – May 10) 1 day 14 hours old
- Google Chrome will use AI to block tech support scam websites 4 days 7 hours old
- Cyber criminals impersonate payroll, HR and benefits platforms to steal information and funds 5 days 8 hours old
- Tired of Google sponsored ads? So are we! That’s why we’re introducing the option to block them on iOS 5 days 9 hours old
- Passwords in the age of AI: We need to find alternatives 5 days 12 hours old
- WhatsApp hack: Meta wins payout over NSO Group spyware 5 days 14 hours old
- FBI issues warning as scammers target victims of crime 6 days 11 hours old
- “Your privacy is a promise we don’t break”: Dating app Raw exposes sensitive user data 1 week 11 hours old
- Android fixes 47 vulnerabilities, including one zero-day. Update as soon as you can! 1 week 12 hours old
- The AI chatbot cop squad is here (Lock and Code S06E09) 1 week 1 day old
EFF
- How Signal, WhatsApp, Apple, and Google Handle Encrypted Chat Backups 4 days 3 hours old
- The FCC Must Reject Efforts to Lock Up Public Airwaves 6 days 2 hours old
- Appeals Court Sidesteps The Big Questions on Geofence Warrants 6 days 7 hours old
- Podcast Episode: Digital Autonomy for Bodily Autonomy 6 days 18 hours old
- No Postal Service Data Sharing to Deport Immigrants 1 week 6 hours old
- Nominations Open for 2025 EFF Awards! 1 week 9 hours old
- Beware the Bundle: Companies Are Banking on Becoming Your Police Department’s Favorite "Public Safety Technology” Vendor 1 week 10 hours old
- Washington’s Right to Repair Bill Heads to the Governor 1 week 5 days old
- Ninth Circuit Hands Users A Big Win: Californians Can Sue Out-of-State Corporations That Violate State Privacy Laws 1 week 5 days old
- Age Verification in the European Union: The Commission's Age Verification App 2 weeks 9 hours old
Google Security Blog
- Using AI to stop tech support scams in Chrome 5 days 8 hours old
Cisco Security Advisories
- Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability 6 days 2 hours old
- Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability 6 days 2 hours old
- Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability 6 days 2 hours old
- Cisco Catalyst Center Insufficient Access Control Vulnerability 6 days 2 hours old
- Cisco Catalyst Center Unauthenticated API Access Vulnerability 6 days 2 hours old
- Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability 6 days 2 hours old
- Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability 6 days 2 hours old
- Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability 6 days 2 hours old
- Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability 6 days 2 hours old
- Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability 6 days 2 hours old
KrebsOnSecurity
- Pakistani Firm Shipped Fentanyl Analogs, Scams to US 6 days 3 hours old
- xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs 1 week 5 days old
- Alleged ‘Scattered Spider’ Member Extradited to U.S. 1 week 6 days old
- DOGE Worker’s Code Supports NLRB Whistleblower 2 weeks 6 days old
- Whistleblower: DOGE Siphoned NLRB Case Data 3 weeks 23 hours old
- Funding Expires for Key Cyber Vulnerability Database 3 weeks 6 days old
Security Now
- SN 1024: Don't Blame Signal - The Real Story Behind the TM SGNL Breach 6 days 21 hours old
- SN 1023: Preventing Windows Sandbox Abuse - Microsoft Says "Don't Delete This Folder" 1 week 6 days old
- SN 1022: The Windows Sandbox - Short-life Certs, Ransomware Payout Stats 2 weeks 6 days old
- SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK 3 weeks 6 days old
Cloud Security Briefing: News and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 1 week 5 days old
- RSAC Conference 2025 1 week 5 days old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 1 week 6 days old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 1 week 6 days old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 1 week 6 days old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 1 week 6 days old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 1 week 6 days old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 1 week 6 days old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 1 week 6 days old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 1 week 6 days old
Microsoft Malware Protection Center
- Microsoft announces the 2025 Security Excellence Awards winners 2 weeks 10 hours old
- Faster, more personalized service begins at the frontline with Microsoft Intune 2 weeks 1 day old
- Explore practical best practices to secure your data with Microsoft Purview 2 weeks 4 days old
- New whitepaper outlines the taxonomy of failure modes in AI agents 2 weeks 5 days old
- Understanding the threat landscape for Kubernetes and containerized assets 2 weeks 6 days old
- Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative 3 weeks 1 day old
- Microsoft’s Secure by Design journey: One year of success 3 weeks 5 days old
- Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures 3 weeks 6 days old
Guardian Security
- ‘Source of data’: are electric cars vulnerable to cyber spies and hackers? 2 weeks 20 hours old
- Ofcom closes technical loophole used by criminals to intercept mobile calls and texts 3 weeks 11 hours old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tao Security
Tech Crunch Security
Techworld Security
Threat Post
US-Cert Alerts
