Sources
Computer Weekly Feed
- Mandiant's latest annual threat report reveals new data on how financially-motivated cyber criminals, such as ransomware gangs, dominate the cyber security landscape 41 min 18 sec old
- The rise of AI powered threats and non-human identities will push an already strained identity security model over the edge 41 min 18 sec old
- Amid an uncertain future for vulnerability research, exposure management company Armis has been given the authority to assign CVE IDs to newly discovered vulnerabilities 8 hours 57 min old
- Storage supplier profile: Block, file and object as part of full-stack IT offer for hybrid cloud and containerised applications comes via VSP One arrays and EverFlex as-a-service options 9 hours 59 min old
- Computer Weekly talks to Quantum CEO Jamie Lerner about the company’s expertise in massive volumes of data and a roadmap that includes Myriad, a new file system for forever flash in the AI era 11 hours 3 min old
- A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services 12 hours 10 min old
- Suppliers urge technology secretary to work more collaboratively with private sector over concerns government’s digital wallet will gain a monopoly in the market 12 hours 10 min old
- Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign 12 hours 10 min old
- The figures for funding of female-led startups are shocking - and the same applies to most underrepresented groups. Tech leaders need to take action or risk missing out on new innovations and opportunities 14 hours 14 min old
- A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services. 1 day 4 hours old
SlashDot
- Meta Rolls Out Live Translations To All Ray-Ban Smart Glasses Users 41 min 18 sec old
- AI Secretly Helped Write California Bar Exam, Sparking Uproar 41 min 18 sec old
- OpenAI Forecasts Revenue Topping $125 Billion in 2029 as Agents, New Products Gain 2 hours 43 min old
- Nintendo Seeks Discord User's Identity Following Major Pokemon Leak 2 hours 43 min old
- Apple, Meta Fined as EU Presses Ahead With Tech Probes 3 hours 49 min old
- More Than 80% of the World's Reefs Hit By Bleaching After Worst Global Event On Record 4 hours 52 min old
- Amazon's Starlink Rival Struggles To Ramp Up Satellite Production 4 hours 52 min old
- On YouTube's 20th Anniversary, the Platform Says Over 20 Trillion Videos Have Been Uploaded 5 hours 57 min old
- UBS and Gartner Trim Smartphone, PC Forecasts Amid Tariff Fears 5 hours 57 min old
- Deep-Sea Fishers Fight for Wi-Fi 6 hours 57 min old
Hacker News
- FontDiffuser: Text to Font 48 min 53 sec old
- Using a tool that finds fake online profiles to detect abnormal protein activity 49 min 50 sec old
- Ask HN: What Have You Replaced with AI? 49 min 58 sec old
- The Next Computer? Your Glasses [video] 50 min 58 sec old
- Google blocked Motorola use of Perplexity AI, witness says 52 min 52 sec old
- Choose Europe Macron invites scientists to work in France amid US funding cuts 53 min 16 sec old
- Draft executive order outlines plan to integrate AI into K-12 schools 54 min 48 sec old
- Official APIs for GPT-4o Image Just Added 54 min 53 sec old
- Wild chimps sharing 'boozy' fruit caught on camera 55 min 4 sec old
- How much math is knowable? [video] 56 min 14 sec old
KrebsOnSecurity
- DOGE Worker’s Code Supports NLRB Whistleblower 1 hour 7 sec old
- Whistleblower: DOGE Siphoned NLRB Case Data 1 day 19 hours old
- Funding Expires for Key Cyber Vulnerability Database 1 week 17 hours old
- Trump Revenge Tour Targets Cyber Leaders, Elections 1 week 1 day old
- China-based SMS Phishing Triad Pivots to Banks 1 week 6 days old
- Patch Tuesday, April 2025 Edition 2 weeks 18 hours old
- Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe 2 weeks 5 days old
- How Each Pillar of the 1st Amendment is Under Attack 3 weeks 2 days old
- When Getting Phished Puts You in Mortal Danger 3 weeks 6 days old
CNET Feed
- 'Hey Meta': New AI Features Come to Meta's Ray-Bans 1 hour 36 min old
- Today's Wordle Hints, Answer and Help for April 24, #1405 1 hour 45 min old
- Today's NYT Connections Hints, Answers and Help for April 24, #683 1 hour 45 min old
- 'The Last of Us' Has a New Enemy in Season 2. Who Are Abby and the WLF? 1 hour 45 min old
- Microsoft 365 Copilot's Business Version Gets ChatGPT 4o Image Generation 2 hours 48 min old
- PlayStation Classic Themes Are Returning to PS5 in Next Update 3 hours 35 min old
- Best Rowing Machines of 2025 for a Full-Body Workout, According to Our Experts 3 hours 45 min old
- Hubble Space Telescope Is 35: Don't Miss These 4 Dazzling Anniversary Images 4 hours 4 min old
- ChatGPT's Image Generator Is Coming to More Gen AI Tools 4 hours 45 min old
- Best Sports Drinks of 2025: The Warmer Months Make Staying Hydrated Vital. Here’s How 4 hours 46 min old
Security Wire Daily News
- Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. 1 hour 42 min old
- Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online. 1 day 2 hours old
- Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to the... 1 day 2 hours old
- Docker said it plans new tools integrating the emerging agentic AI standard protocol into existing workflows, including security controls. 1 day 4 hours old
- Responsible AI is often misunderstood as a way to make sure that a model is safe. However, AI safety examines whether harmful content is being produced or not. 1 day 9 hours old
- Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach. 2 days 2 hours old
- Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used. 2 days 3 hours old
- A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. 2 days 5 hours old
- A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks. 2 days 8 hours old
- Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. 5 days 2 hours old
Security Week
- AuthMind Raises $19.3 Million in Seed Funding 4 hours 40 min old
- Ethical Zero Day Marketplace Desired Effect Emerges From Stealth 7 hours 7 min old
- Endor Labs Raises $93 Million for AppSec Platform 7 hours 45 min old
- Chainguard Raises Hefty $356M Series D at $3.5 Billion Valuation 7 hours 56 min old
- Files Deleted From GitHub Repos Leak Valuable Secrets 9 hours 18 min old
- Miggo Security Banks $17M Series A for ADR Technology 9 hours 45 min old
- Picnic Corporation Rebrands to VanishID, Raises $10 Million 10 hours 35 min old
- Kelly Benefits Data Breach Impacts 260,000 People 11 hours 15 min old
- Cyberattack Hits British Retailer Marks & Spencer 11 hours 25 min old
- Data Breach at Onsite Mammography Impacts 350,000 11 hours 45 min old
ZDNet Security
- The 4 VPNs I swear by for Linux - and why I trust them 4 hours 52 min old
- Best antivirus for Mac in 2025: I tested your top software options 12 hours 44 min old
- Tired of unsolicited nude pics? Google's new safety feature can help - how it works 1 day 6 hours old
- NymVPN: Introducing a security-first decentralized VPN with a Mixnet flair 1 day 7 hours old
- The best Bluetooth trackers of 2025: Expert tested 2 days 2 hours old
- I replaced my Ring with this outdoor security camera - and it has no subscription 2 days 7 hours old
- Motorola to outfit first responders with new AI-enabled body cameras 2 days 9 hours old
- That Google email look real? Don't click - it might be scam. Here's how to tell 5 days 4 hours old
- Think GeoGuessr is fun? Try using ChatGPT to guess locations in your photos 5 days 7 hours old
- Data-stealing cyberattacks are surging - 7 ways to protect yourself and your business 6 days 11 hours old
The Security Ledger
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 8 hours 44 min old
- Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 1 day 7 hours old
- Industry First: StrikeReady AI Platform Moves Security Teams Beyond Basic, One-Dimensional AI-Driven Triage Solutions 2 days 9 hours old
- SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises Data Security of Millions 1 week 8 hours old
- Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed 2 weeks 10 hours old
- SpyCloud Research Shows that Endpoint Detection and Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections 2 weeks 2 days old
- Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance 2 weeks 6 days old
- Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” 3 weeks 8 hours old
- SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk 3 weeks 5 days old
- G2 Names INE 2025 Cybersecurity Training Leader 3 weeks 6 days old
EFF
- Digital Identities and the Future of Age Verification in Europe 12 hours 56 min old
- Florida’s Anti-Encryption Bill Is a Wrecking Ball to Privacy. There's Still Time to Stop It. 23 hours 10 min old
- Why the FTC v. Meta Trial Matters: Competition Gaps and Civil Liberties Opportunities 2 days 1 hour old
- EFF to Congress: Here’s What A Strong Privacy Law Looks Like 2 days 4 hours old
- Six Years of Dangerous Misconceptions Targeting Ola Bini and Digital Rights in Ecuador 5 days 3 hours old
- Congress Moves Closer to Risky Internet Takedown Law | EFFector 37.4 1 week 4 hours old
- EFF Urges Court to Avoid Fair Use Shortcuts in Kadrey v. Meta Platforms 1 week 1 day old
- Privacy on the Map: How States Are Fighting Location Surveillance 1 week 1 day old
- Florida’s New Social Media Bill Says the Quiet Part Out Loud and Demands an Encryption Backdoor 1 week 5 days old
- Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director 1 week 5 days old
Wired Security
- The Tech That Safeguards the Conclave’s Secrecy 15 hours 45 min old
- How to Protect Yourself From Phone Searches at the US Border 2 days 11 hours old
- Florida Man Enters the Encryption Wars 4 days 12 hours old
- ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform 5 days 6 hours old
- New Jersey Sues Discord for Allegedly Failing to Protect Children 6 days 6 hours old
- This ‘College Protester’ Isn’t Real. It’s an AI-Powered Undercover Bot for Cops 6 days 11 hours old
- 'Stupid and Dangerous': CISA Funding Chaos Threatens Essential Cybersecurity Program 1 week 1 hour old
- Here’s What Happened to Those SignalGate Messages 1 week 1 day old
- Suspected 4chan Hack Could Expose Longtime, Anonymous Admins 1 week 1 day old
- Microsoft’s Recall AI Tool Is Making an Unwelcome Return 1 week 2 days old
Cisco Security Advisories
- Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server 17 hours 11 sec old
- Cisco Secure Network Analytics Privilege Escalation Vulnerability 6 days 22 hours old
- Cisco Webex App Client-Side Remote Code Execution Vulnerability 6 days 22 hours old
- Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability 6 days 22 hours old
- Cisco NX-OS Software Image Verification Bypass Vulnerability 2 weeks 1 day old
- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities 2 weeks 6 days old
- Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability 2 weeks 6 days old
- Cisco Enterprise Chat and Email Denial of Service Vulnerability 2 weeks 6 days old
- Cisco Webex for BroadWorks Credential Exposure Vulnerability 3 weeks 18 hours old
- Cisco Smart Licensing Utility Vulnerabilities 3 weeks 19 hours old
Graham Cluely Security Blog
- The AI Fix #47: An AI is the best computer programmer in the world 1 day 7 hours old
- Crosswalks hacked to play fake audio of Musk, Zuck, and Jeff Bezos 1 day 13 hours old
- Smashing Security podcast #413: Hacking the hackers… with a credit card? 6 days 22 hours old
- Insurance firm Lemonade warns of breach of thousands of driving license numbers 1 week 12 hours old
- RansomHouse ransomware: what you need to know 1 week 1 day old
- The AI Fix #46: AI can read minds now, and is your co-host a clone? 1 week 1 day old
- Medusa ransomware gang claims to have hacked NASCAR 1 week 2 days old
- Ransomware reaches a record high, but payouts are dwindling 1 week 5 days old
- Smashing Security podcast #412: Signalgate sucks, and the quandary of quishing 1 week 6 days old
- The AI Fix #45: The Turing test falls to GPT-4.5 2 weeks 22 hours old
Guardian Security
Malware Bytes Security
- All Gmail users at risk from clever replay attack 1 day 8 hours old
- A week in security (April 12 – April 18) 2 days 14 hours old
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 2 days 21 hours old
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 2 days 21 hours old
- Text scams grow to steal hundreds of millions of dollars 5 days 5 hours old
- Apple patches security vulnerabilities in iOS and iPadOS. Update now! 6 days 5 hours old
- Hi, robot: Half of all internet traffic now automated 1 week 19 min old
- “I sent you an email from your email account,” sextortion scam claims 1 week 6 hours old
- “Follow me” to this fake crypto exchange to claim $500 1 week 23 hours old
- Hertz data breach caused by CL0P ransomware attack on vendor 1 week 1 day old
US-Cert Current Activity
- CISA Releases Five Industrial Control Systems Advisories 1 day 9 hours old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 6 days 9 hours old
- CISA Releases Six Industrial Control Systems Advisories 6 days 9 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 9 hours old
- CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise 1 week 9 hours old
- CISA Releases Nine Industrial Control Systems Advisories 1 week 1 day old
- Fortinet Releases Advisory on New Post-Exploitation Technique for Known Vulnerabilities 1 week 5 days old
- CISA Releases Ten Industrial Control Systems Advisories 1 week 6 days old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 9 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 2 weeks 1 day old
Security Now
- SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK 1 week 18 hours old
- SN 1020: Multi-Perspective Issuance Corroboration - IoT Done Right, France Phishes, Gmails E2EE 2 weeks 18 hours old
- SN 1019: EU OS - Troy Hunt Phished, Ransomware List, InControl 3 weeks 18 hours old
- SN 1018: The Quantum Threat - ESP32 Backdoor Update, RCS E2EE 4 weeks 19 hours old
Security Wire Weekly
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 1 week 2 days old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 2 weeks 6 days old
- You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. 3 weeks 55 min old
- Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ. 3 weeks 55 min old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 3 weeks 55 min old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 3 weeks 55 min old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 3 weeks 55 min old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 3 weeks 55 min old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 3 weeks 55 min old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 3 weeks 55 min old
Microsoft Malware Protection Center
- Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI 2 weeks 4 hours old
- How cyberattackers exploit domain controllers using ransomware 2 weeks 5 hours old
- Exploitation of CLFS zero-day leads to ransomware activity 2 weeks 1 day old
- Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity 2 weeks 1 day old
- Tech Accelerator: Azure security and AI adoption 2 weeks 2 days old
- Threat actors leverage tax season to deploy tax-themed phishing campaigns 2 weeks 6 days old
- Transforming public sector security operations in the AI era 3 weeks 1 day old
- Analyzing open-source bootloaders: Finding vulnerabilities faster with AI 3 weeks 2 days old
- New innovations in Microsoft Purview for protected, AI-ready data 3 weeks 2 days old
- US Department of Labor’s journey to Zero Trust security with Microsoft Entra ID 3 weeks 6 days old
Tao Security
Google Security Blog
- Google announces Sec-Gemini v1, a new experimental cybersecurity model 2 weeks 5 days old
- Taming the Wild West of ML: Practical Model Signing with Sigstore 2 weeks 5 days old
- New security requirements adopted by HTTPS certificate industry 3 weeks 6 days old
Cloud Security Briefing: News and Advice
- RSA Conference 2025 2 weeks 5 days old
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 2 weeks 6 days old
- If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. 3 weeks 55 min old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 3 weeks 55 min old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 3 weeks 55 min old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 3 weeks 55 min old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 3 weeks 55 min old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 3 weeks 55 min old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 3 weeks 55 min old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 3 weeks 55 min old
US-Cert Alerts
- Fast Flux: A National Security Threat 3 weeks 1 day old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tech Crunch Security
Techworld Security
Threat Post
