Sources
Hacker News
- Hyprland 0.40.0 update moving off wlroots 21 min 12 sec old
- Funnel Calculator 30 min 28 sec old
- Ask HN: Have you coded any productivity software just for yourself? 31 min 30 sec old
- Show IN: Learn to Code 32 min 18 sec old
- Show HN: Having Fun with PostScript Files 33 min 6 sec old
- MIT abandons use of DEI statements 35 min 17 sec old
- OpenAdapt: AI-First Process Automation with Large Multimodal Models 35 min 47 sec old
- Why Choose ULIDs over Traditional UUIDs or IDs for Database Identification? 38 min 8 sec old
- Swift's native Clocks are inefficient 39 min 7 sec old
- Council Bans Apostrophes on Street Signs to Avoid Database Issues 41 min 47 sec old
SlashDot
- The US Just Mandated Automated Emergency Braking Systems By 2029 2 hours 18 min old
- AI-Powered 'HorseGPT' Fails to Predict This Year's Kentucky Derby Winner 5 hours 19 min old
- U.S. Seeks to Build World Pressure on Russia Over Space Nuclear Weapon 9 hours 19 min old
- Multinational ISP Offers $206M In Secured Notes Backed By IPv4 Addresses 10 hours 19 min old
- Ubuntu Criticized For Bug Blocking Installation of<nobr> <wbr></nobr>.Deb Packages 11 hours 19 min old
- NASA's Moon Capsule Suffered Extensive Damage During 2022's Test Flight 11 hours 19 min old
- Finding Land for US Wind Farms Might Be Easier Than We Thought 11 hours 19 min old
- Finding Land for US Wind Farms Might Be Easier Than We Thoughth 12 hours 20 min old
- Jack Dorsey's Block Is Investing 10% Of Its Bitcoin Profits Into Monthly Bitcoin Purchases 13 hours 21 min old
- When a Politician Sues a Blog to Unmask Its Anonymous Commenter 14 hours 23 min old
CNET Feed
- Today's NYT Connections Hints and Answers: Help for May 5, #329 - CNET 4 hours 49 min old
- Today's Wordle Hints and Answer: Help for May 5, #1051 - CNET 4 hours 49 min old
- BEFAST: The Life-Saving Acronym Everyone Should Know for Strokes - CNET 8 hours 49 min old
- What Is Hormone Therapy for Menopause? New Study Revisits Effectiveness - CNET 8 hours 57 min old
- Best Mac VPN for 2024 - CNET 9 hours 49 min old
- Most Efficient Solar Panels for 2024: New Record-Setting Panel Tops the List - CNET 10 hours 10 min old
- Best Reading Glasses for 2024 - CNET 10 hours 25 min old
- Best Card Games in 2024 - CNET 12 hours 53 min old
- Best Innerspring Mattresses in 2024 - CNET 13 hours 19 min old
- Best Immunity Supplements for 2024 - CNET 13 hours 49 min old
Security Week
- French Cyberwarriors Ready to Test Their Defense Against Hackers and Malware During the Olympics 20 hours 42 min old
- German Foreign Minister Says Russia will Face Consequences for Monthslong Cyber Espionage 20 hours 51 min old
- Microsoft Overhauls Cybersecurity Strategy After Scathing CSRB Report 1 day 14 hours old
- LayerX Raises $26 Million for Browser Security Platform 1 day 17 hours old
- US Says North Korean Hackers Exploiting Weak DMARC Settings 1 day 17 hours old
- In Other News: Locked Shields 2024, Data Exposure Bugs, NVIDIA Patches 1 day 18 hours old
- Botnet Disrupted by FBI Still Used by Russian Spies, Cybercriminals 1 day 19 hours old
- CISA, FBI Urge Organizations to Eliminate Path Traversal Vulnerabilities 1 day 20 hours old
- ArcaneDoor Espionage Campaign Targeting Cisco Firewalls Linked to China 1 day 20 hours old
- Horizon3.ai Introduces AI-Assisted Service to Prioritize and Patch Vulnerabilities Faster 1 day 21 hours old
Wired Security
- A New Surveillance Tool Invades Border Towns 21 hours 19 min old
- These Dangerous Scammers Don’t Even Bother to Hide Their Crimes 1 day 22 hours old
- The Breach of a Face Recognition Firm Reveals a Hidden Danger of Biometrics 2 days 16 hours old
- Inside Ukraine’s Killer-Drone Startup Industry 3 days 1 hour old
- The US Government Is Asking Big Tech to Promise Better Cybersecurity 3 days 15 hours old
- A Vast New Data Set Could Supercharge the AI Hunt for Crypto Money Laundering 3 days 18 hours old
- China Has a Controversial Plan for Brain-Computer Interfaces 4 days 12 hours old
- The Dangerous Rise of GPS Attacks 4 days 14 hours old
- The White House Has a New Master Plan to Stop Worst-Case Scenarios 4 days 17 hours old
- 9 Best Password Managers (2024): Features, Pricing, and Tips 6 days 18 hours old
Malware Bytes Security
- You get a passkey, you get a passkey, everyone should get a passkey 1 day 11 hours old
- Dropbox Sign customer data accessed in breach 2 days 11 hours old
- Watch out for tech support scams lurking in sponsored search results 2 days 16 hours old
- Psychotherapy practice hacker gets jail time after extorting patients, publishing personal therapy notes online 2 days 18 hours old
- Wireless carriers fined $200 million after illegally sharing customer location data 3 days 22 hours old
- Malwarebytes Premium Security earns “Product of the Year” from AVLab 4 days 18 hours old
- FBI warns online daters to avoid “free” online verification schemes that prove costly 4 days 20 hours old
- Kaiser health insurance leaked patient data to advertisers 5 days 21 hours old
- A week in security (April 22 – April 28) 6 days 42 min old
- Ring agrees to pay $5.6 million after cameras were used to spy on customers 1 week 2 days old
EFF
- CCTV Cambridge, Addressing Digital Equity in Massachusetts 1 day 11 hours old
- The U.S. House Version of KOSA: Still a Censorship Bill 1 day 15 hours old
- On World Press Freedom Day (and Every Day), We Fight for an Open Internet 1 day 16 hours old
- Biden Signed the TikTok Ban. What's Next for TikTok Users? 2 days 7 hours old
- Speaking Freely: Rebecca MacKinnon 3 days 15 hours old
- Congress Should Just Say No to NO FAKES 5 days 11 hours old
- Speaking Freely: Obioma Okonkwo 1 week 4 days old
- Screen Printing 101: EFF's Spring Speakeasy at Babylon Burning 1 week 4 days old
- Podcast Episode: Right to Repair Catches the Car 1 week 5 days old
- U.S. Senate and Biden Administration Shamefully Renew and Expand FISA Section 702, Ushering in a Two Year Expansion of Unconstitutional Mass Surveillance 1 week 5 days old
ZDNet Security
- Code faster with generative AI, but beware the risks when you do 1 day 13 hours old
- What are passkeys? Experience the life-changing magic of going passwordless 2 days 13 hours old
- Two years in, Google says passkeys now protect more than 400 million accounts 2 days 15 hours old
- Red Hat's latest enterprise Linux delivers new features to tackle hybrid-cloud complexity 3 days 11 hours old
- The best travel VPNs of 2024: Expert tested and reviewed 4 days 12 hours old
- Ford's hands-free driver system is under investigation after fatal crashes - what to know 5 days 14 hours old
- 91% of ransomware victims paid at least one ransom in the past year, survey finds 5 days 18 hours old
- The best security keys of 2024: Expert tested 1 week 1 day old
- How to change your IP address, why you'd want to - and when you shouldn't 1 week 2 days old
- These SMBs are hot threat targets but they're shrugging off security help 1 week 2 days old
Microsoft Malware Protection Center
- Security above all else—expanding Microsoft’s Secure Future Initiative 1 day 16 hours old
- Microsoft introduces passkeys for consumer accounts 2 days 18 hours old
- Microsoft named overall leader in KuppingerCole Leadership Compass for ITDR 3 days 9 hours old
- “Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps 3 days 13 hours old
- Investigating industrial control systems using Microsoft’s ICSpector open-source framework 1 week 2 days old
- 5 ways a CNAPP can strengthen your multicloud security environment 1 week 3 days old
- New Microsoft Incident Response guide helps simplify cyberthreat investigations 1 week 4 days old
- Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials 1 week 5 days old
- Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters 2 weeks 3 days old
- New Microsoft guidance for the DoD Zero Trust Strategy 2 weeks 4 days old
Computer Weekly Feed
- Adobe expands bug bounty programme to account for GenAI 1 day 19 hours old
- Patch GitLab vuln without delay, users warned 1 day 20 hours old
- EU calls out Fancy Bear over attacks on Czech, German governments 1 day 20 hours old
- Lords say government must ‘go beyond’ current approach to LLMs 2 days 32 min old
- IT Sustainability Think Tank: How CIOs can measure their carbon emissions and energy use 2 days 49 min old
- Post Office legal boss withheld details from statutory body reviewing miscarriages of justice 2 days 2 hours old
- NCSC updates warning over hacktivist threat to CNI 2 days 20 hours old
- Dropbox Sign user information accessed in data breach 2 days 22 hours old
- Ukrainian national sentenced over REvil ransomware spree 2 days 22 hours old
- Post Office investigators saw subpostmasters as ‘enemies’ – and that’s what they became 2 days 23 hours old
Security Wire Daily News
- Compare Azure Government vs. commercial cloud offering 1 day 20 hours old
- How remote work is changing patch management 1 day 21 hours old
- document sanitization 2 days 9 hours old
- Dropbox discloses data breach involving Dropbox Sign 2 days 22 hours old
- What is role-based access control (RBAC)? 2 days 22 hours old
- What is security information and event management (SIEM)? 2 days 22 hours old
- U.S. warns of pro-Russian hacktivist attacks against OT systems 3 days 14 hours old
- remote access 3 days 22 hours old
- Verizon DBIR: Vulnerability exploitation in breaches up 180% 4 days 7 hours old
- Federal Information Security Modernization Act (FISMA) 4 days 7 hours old
US-Cert Current Activity
- CISA Releases Three Industrial Control Systems Advisories 2 days 19 hours old
- CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities 2 days 19 hours old
- CISA and Partners Release Fact Sheet on Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity 3 days 19 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 3 days 19 hours old
- CERT/CC Reports R Programming Language Vulnerability 3 days 19 hours old
- CISA Releases Three Industrial Control Systems Advisories 4 days 19 hours old
- CISA Adds One Known Exploited Vulnerability to Catalog 4 days 19 hours old
- CISA Releases Eight Industrial Control Systems Advisories 1 week 2 days old
- Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms 1 week 3 days old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 1 week 3 days old
Google Security Blog
- Your Google Account allows you to create passkeys on your phone, computer and security keys 2 days 19 hours old
- Detecting browser data theft using Windows Event Logs 4 days 15 hours old
- How we fought bad apps and bad actors in 2023 5 days 15 hours old
- Accelerating incident response using generative AI 1 week 1 day old
- Uncovering potential threats to your web application by leveraging security reports 1 week 4 days old
- Prevent Generative AI Data Leaks with Chrome Enterprise DLP 2 weeks 2 days old
- How we built the new Find My Device network with user security and privacy in mind 3 weeks 5 days old
The Security Ledger
- Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape 2 days 20 hours old
InfoWorld
- Understanding Microsoft’s Trusted Signing service 2 days 22 hours old
- Java services hit hardest by third-party vulnerabilities, report says 2 weeks 2 days old
- Most developers have adopted devops, survey says 2 weeks 4 days old
- Better application networking and security with CAKES 2 weeks 4 days old
- Rust gets security fix for Windows vulnerability 3 weeks 1 day old
- Synopsys takes aim at software supply chain risks 3 weeks 4 days old
- Synopsys aims to mitigate software supply chain risks 3 weeks 4 days old
- Synopsys takes aim at software supply chain risks 3 weeks 4 days old
- Parasoft unveils safety testing tool for C and C++ apps 3 weeks 4 days old
Security Wire Weekly
- What is PCI DSS (Payment Card Industry Data Security Standard)? 2 days 22 hours old
- Cloud Security Alliance (CSA) 4 days 18 hours old
- Key software patch testing best practices 2 weeks 6 days old
- Cloud database security: Best practices, challenges and threats 3 weeks 3 days old
Graham Cluely Security Blog
- Smashing Security podcast #370: The closed loop conundrum, default passwords, and Baby Reindeer 3 days 8 hours old
- “Junk gun” ransomware: the cheap new threat to small businesses 1 week 2 days old
- Hacker posts fake news story about Ukrainians trying to kill Slovak President 1 week 2 days old
- Smashing Security podcast #369: Keeping the lights on after a ransomware attack 1 week 3 days old
- City street lights “misbehave” after ransomware attack 1 week 3 days old
- Change Healthcare data for sale on dark web as fallout from ransomware attack spirals out of control 2 weeks 2 days old
- 3.5 million Omni Hotel guest details held to ransom by Daixin Team 2 weeks 2 days old
- Police smash LabHost international fraud network, 37 arrested 2 weeks 2 days old
- Smashing Security podcast #368: Gary Barlow, and a scam turns deadly 2 weeks 3 days old
- Zambia arrests 77 people in swoop on “scam” call centre 2 weeks 5 days old
Security Now
- SN 972: Passkeys: A Shattered Dream? - IoT Default Passwords, Passkeys 4 days 7 hours old
- SN 971: Chat (out of) Control - Fuxnet, Android Quarantine, Gentoo 1 week 4 days old
- SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons 2 weeks 4 days old
- SN 969: Minimum Viable Secure Product - Dlink NAS Backdoor, Privnote, Crowdefense 3 weeks 4 days old
KrebsOnSecurity
- Man Who Mass-Extorted Psychotherapy Patients Gets Six Years 4 days 18 hours old
- FCC Fines Major U.S. Wireless Carriers for Selling Customer Location Data 5 days 10 hours old
- Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme 1 week 5 days old
- Who Stole 3.6M Tax Records from South Carolina? 2 weeks 4 days old
- Crickets from Chirp Systems in Smart Lock Key Leak 2 weeks 5 days old
- Why CISA is Warning CISOs About a Breach at Sisense 3 weeks 2 days old
- Twitter’s Clumsy Pivot to X.com Is a Gift to Phishers 3 weeks 3 days old
- April’s Patch Tuesday Brings Record Number of Fixes 3 weeks 4 days old
Cloud Security Briefing: News and Advice
- Cloud Security Alliance (CSA) 4 days 18 hours old
- How SASE convergence affects organizational silos 4 days 22 hours old
- Top 11 cloud security challenges and how to combat them 5 days 22 hours old
- Explore CASB use cases before you decide to buy 1 week 5 days old
- RSA Conference 2024 focuses on collaboration, resilience 3 weeks 3 days old
- Cloud database security: Best practices, challenges and threats 3 weeks 3 days old
US-Cert Alerts
- Delta Electronics CNCSoft-G2 DOPSoft DPAX 4 days 20 hours old
- #StopRansomware: Akira Ransomware 2 weeks 3 days old
Guardian Security
- No more 12345: devices with weak passwords to be banned in UK 6 days 8 hours old
- Change the law on computer evidence with an amendment to data protection bill | Letter 1 week 5 days old
- Met police failed to act on Commons ‘honeytrap’ sexting reports last year 3 weeks 2 days old
- William Wragg resigns from two Commons roles after divulging MPs’ phone numbers 3 weeks 5 days old
- No 10 tells MPs to be cautious about unsolicited messages after attempted ‘honeytrap’ 3 weeks 5 days old