Sources
Hacker News
- Clothes Swap and Virtual Try-On 46 min 13 sec old
- Caltrain official lived in secret apartment built illegally inside train station 47 min 39 sec old
- LibreOffice drops support for Windows 7, 8 and 8.1 in 25.8 Beta 1 49 min 12 sec old
- APL Style: Patterns/Anti-Patterns (2017) 1 hour 1 min old
- SQLite Date and Time Functions 1 hour 6 min old
- In San Francisco, Waymo Has Now Bested Lyft. Uber Is Next 1 hour 12 min old
- Why I Joined Doge 1 hour 12 min old
- CRMArena-Pro: LLM Agents Assessed Across Diverse Business Scenarios 1 hour 16 min old
- LLM Chat via SSH 1 hour 18 min old
- A glimpse inside the world of drug repurposing (2024) 1 hour 21 min old
SlashDot
- Smart Tires Will Report On the Health of Roads In New Pilot Program 1 hour 36 min old
- IBM Says It's Cracked Quantum Error Correction 3 hours 54 min old
- Enterprise AI Adoption Stalls As Inferencing Costs Confound Cloud Customers 4 hours 57 min old
- There Aren't Enough Cables To Meet Growing Electricity Demand 4 hours 57 min old
- UK Universities Sign $13.3 Million Deal To Avoid Oracle Java Back Fees 6 hours 3 sec old
- Anker Recalls More Than 1.1 Million Power Banks 6 hours 3 sec old
- macOS Tahoe Brings a New Disk Image Format 7 hours 18 min old
- AI Therapy Bots Are Conducting 'Illegal Behavior', Digital Rights Organizations Say 8 hours 21 min old
- 23andMe's Founder Anne Wojcicki Wins Bid For DNA Testing Firm 8 hours 21 min old
- GameStop CEO Says The Company's Future Isn't In Games 9 hours 22 min old
CNET Feed
- MacBook Air vs. MacBook Pro: Which MacBook Should I Buy? 8 hours 16 min old
- Today's NYT Connections: Sports Edition Hints and Answers for June 14, #264 8 hours 37 min old
- Today's NYT Strands Hints, Answers and Help for June 14, #468 8 hours 57 min old
- Alaska, Where Only 2% of Homes Have AC, Just Issued Its First Heat Advisory Ever 9 hours 24 min old
- Today's NYT Connections Hints, Answers and Help for June 14, #734 9 hours 55 min old
- Today's Wordle Hints, Answer and Help for June 14, #1456 9 hours 55 min old
- How a Cyberattack at a Company You've Never Heard of Nearly Derailed My Anniversary Carrot Cake 10 hours 1 min old
- NBA Finals 2025: How to Watch Pacers vs. Thunder Game 4 Tonight 11 hours 1 min old
- What to Stream on TV This Weekend: 'Deep Cover,' 'Echo Valley' and 'Call Her Alex' 11 hours 1 min old
- Play FBC: Firebreak, Deus Ex and More on PlayStation Plus Soon 11 hours 25 min old
Wired Security
- 'No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings 9 hours 16 min old
- CBP's Predator Drone Flights Over LA Are a Dangerous Escalation 14 hours 13 min old
- Here’s What Marines and the National Guard Can (and Can’t) Do at LA Protests 16 hours 13 min old
- How to Protest Safely in the Age of Surveillance 1 day 10 hours old
- Social Media Is Now a DIY Alert System for ICE Raids 1 day 12 hours old
- How Waymo Handles Footage From Events Like the LA Immigration Protests 2 days 11 hours old
- Apple Intelligence Is Gambling on Privacy as a Killer Feature 3 days 6 hours old
- The ‘Long-Term Danger’ of Trump Sending Troops to the LA Protests 3 days 13 hours old
- Airlines Don’t Want You to Know They Sold Your Flight Data to DHS 3 days 17 hours old
- The Dangerous Truth About the ‘Nonlethal’ Weapons Used Against LA Protesters 4 days 7 hours old
Security Wire Daily News
- Microsoft improved the feature that automates local administrator password management in Windows Server and the client OS. This tutorial explains the updates and how to set it up. 9 hours 22 min old
- A risk appetite statement defines acceptable risk levels for an organization. Here's what it includes and how to create one, with examples and a downloadable template. 9 hours 22 min old
- Cyber-resilience strategies that integrate BCDR, incident response and cybersecurity enable CISOs to build frameworks that help their organizations effectively handle cyberattacks. 10 hours 25 min old
- As AI agents mature, new tools aim to bolster their reliability and security with fresh visibility into automation workflows and more detailed troubleshooting. 1 day 8 hours old
- Enterprises unable to manage AI risks face data breaches, algorithmic bias and adversarial attacks, among other risks. Learn how to implement a comprehensive AI security policy. 1 day 12 hours old
- The new product promises to simplify disparate network traffic across cloud, hybrid and on-premises workloads. 2 days 8 hours old
- An asymmetric cyberattack refers to cyberwarfare that inflicts a proportionally large amount of damage compared to the resources used by targeting the victim's most vulnerable security measure. 2 days 13 hours old
- Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to end users and devices. 3 days 8 hours old
- Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. 3 days 11 hours old
- Just how much does Windows Hello for Business cost? It's not exactly a simple answer, but the good news is that there are lots of ways to attain a license. 3 days 11 hours old
Computer Weekly Feed
- The recent spate of cyber attacks on UK retailers has to be a wake-up call to build more cyber resilience into digital supply chains and fortify against social engineering attacks 12 hours 27 min old
- Alan Trefler, CEO of Pegasystems, is scathing about big tech companies that are pushing the use of AI agents and large language models for business-critical applications 14 hours 30 min old
- When commercial AI meets the world’s most ambitious science experiment, nuclear fusion, surprising things start to happen 19 hours 53 min old
- While there appears to be no stopping the progress of AI, businesses need to get a handle on technical debt and decide when to build or buy AI 21 hours 2 min old
- History shows that law enforcement can bring successful prosecutions without the need for the Home Office to introduce ‘backdoors’ into end-to-end encryption 1 day 16 hours old
- Urgent government calls for more high-powered sovereign computers to fulfil Swedish goal of building a more powerful AI industry answered by foreign financiers, US tech and Europe’s AI emergency fund 1 day 17 hours old
- Amid growing calls for a national digital ID scheme, Home Affairs Committee launches inquiry into likely benefits and risks 1 day 18 hours old
- The UK government is cosying up to Big Tech when instead it should be vociferously protecting the creative industries from the avarice of AI giants 1 day 19 hours old
- The chancellor of the exchequer has significantly upped spending on digital and technology initiatives in the current Spending Review period, with the NHS receiving a 50% tech funding increase 1 day 20 hours old
- Salesforce released Digital Labour Trends survey data to coincide with its Agentforce London 2025 event that found 78% of UK organisations are using agentic AI 1 day 20 hours old
ZDNet Security
- The cloud broke Thursday and it'll happen again - how to protect your business before then 13 hours 7 min old
- How to delete your 23andMe data ASAP - and why you should 1 day 12 hours old
- Is your Roku TV spying on you? Probably, but here's how to put an end to it 1 day 18 hours old
- Install this Windows patch ASAP before bootkit malware takes over your PC - here's how 2 days 15 hours old
- How to remove your personal info from Google Search - it's quick and easy 3 days 10 hours old
- The best VPN routers of 2025 3 days 11 hours old
- How to turn on Android's Private DNS Mode - and why your security depends on it 3 days 11 hours old
- Your Android phone is getting new security protections - and it's a big deal for enterprises 3 days 12 hours old
- How Cisco plans to stop rogue AI agent attacks inside your network 3 days 17 hours old
- The best free VPNs of 2025: Secure, safe, and tested solutions 4 days 9 hours old
Graham Cluely Security Blog
- Dutch police identify users as young as 11-year-old on Cracked.io hacking forum 13 hours 37 min old
- Bert ransomware: what you need to know 17 hours 25 min old
- Why Denmark is breaking up with Microsoft 18 hours 12 min old
- South African man imprisoned after ransom demand against his former employer 22 hours 37 min old
- Sweden says it is under cyber attack 1 day 14 hours old
- Malware attack disguises itself as DeepSeek installer 1 day 20 hours old
- Empty shelves after US’s largest natural and organic food distributor suffers cyber attack 1 day 20 hours old
- Smashing Security podcast #421: Toothpick flirts, Google leaks, and ICE ICE scammers 2 days 7 hours old
- The AI Fix #54: Will AI collapse under its own garbage, and AI charity “Hunger Games” 3 days 15 hours old
- Ofcom investigates 4chan for not protecting users from illegal content 3 days 18 hours old
Google Security Blog
- Mitigating prompt injection attacks with a layered defense strategy 13 hours 58 min old
- Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store 2 weeks 15 hours old
- Tracking the Cost of Quantum Factoring 3 weeks 18 hours old
Malware Bytes Security
- Your Meta AI chats might be public, and it’s not a bug 14 hours 31 min old
- US airline industry quietly selling flight data to DHS 2 days 8 hours old
- 23andMe raked by Congress on privacy, sale of genetic data 2 days 11 hours old
- GirlsDoPorn owner faces life in jail after pleading guilty to sex trafficking 3 days 8 hours old
- 44% of people encounter a mobile scam every single day, Malwarebytes finds 3 days 17 hours old
- Google bug allowed phone number of almost any user to be discovered 3 days 17 hours old
- How and where to report an online scam 4 days 9 hours old
- Been scammed online? Here’s what to do 4 days 9 hours old
- A week in security (June 1 – June 7) 4 days 22 hours old
- How to update Chrome on every operating system 1 week 13 hours old
Security Week
- In Other News: Cloudflare Outage, Cracked.io Users Identified, Victoria’s Secret Cyberattack Cost 16 hours 30 min old
- TeamFiltration Abused in Entra ID Account Takeover Campaign 17 hours 51 min old
- Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday 18 hours 24 min old
- SimpleHelp Vulnerability Exploited Against Utility Billing Software Users 19 hours 24 min old
- Fog Ransomware Attack Employs Unusual Tools 19 hours 56 min old
- Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking 21 hours 32 min old
- Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption 21 hours 58 min old
- ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions 22 hours 39 min old
- Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones 1 day 14 hours old
- The AI Arms Race: Deepfake Generation vs. Detection 1 day 15 hours old
The Security Ledger
- Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale 16 hours 31 min old
- Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups 1 week 2 days old
- INE Security Alert: $16.6 Billion in Cyber Losses Underscore Critical Need for Advanced Security Training 1 week 4 days old
- Criminal IP to Debut at Infosecurity Europe 2025 2 weeks 1 day old
- Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform 3 weeks 1 day old
- INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia 3 weeks 1 day old
- Attaxion Becomes the First EASM Platform to Integrate ENISA’s EU Vulnerability Database (EUVD) 3 weeks 2 days old
KrebsOnSecurity
- Inside a Dark Adtech Empire Fed by Fake CAPTCHAs 1 day 7 hours old
- Patch Tuesday, June 2025 Edition 3 days 5 hours old
- Proxy Services Feast on Ukraine’s IP Address Exodus 1 week 1 day old
- U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams 2 weeks 1 day old
- Pakistan Arrests 21 in ‘Heartsender’ Malware Service 2 weeks 2 days old
- Oops: DanaBot Malware Devs Infected Their Own PCs 3 weeks 1 day old
- KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS 3 weeks 3 days old
Microsoft Malware Protection Center
- Cyber resilience begins before the crisis 1 day 14 hours old
- Connect with us at the Gartner Security & Risk Management Summit 1 week 1 day old
- Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3 1 week 1 day old
- How Microsoft Defender for Endpoint is redefining endpoint security 1 week 3 days old
- Discover how automatic attack disruption protects critical assets while ensuring business continuity 1 week 4 days old
- Announcing a new strategic collaboration to bring clarity to threat actor naming 1 week 4 days old
- Defending against evolving identity attack techniques 2 weeks 1 day old
- How to deploy AI safely 2 weeks 1 day old
- The future of AI agents—and why OAuth must evolve 2 weeks 3 days old
- New Russia-affiliated actor Void Blizzard targets critical sectors for espionage 2 weeks 3 days old
EFF
- A New Digital Dawn for Syrian Tech Users 1 day 14 hours old
- EFFecting Change: Pride in Digital Freedom 2 days 5 hours old
- Congress Can Act Now to Protect Reproductive Health Data 2 days 7 hours old
- Oppose STOP CSAM: Protecting Kids Shouldn’t Mean Breaking the Tools That Keep Us Safe 3 days 6 hours old
- Despite Changes, A.B. 412 Still Harms Small Developers 3 days 7 hours old
- 35 Years for Your Freedom Online 3 days 22 hours old
- NYC lets AI gamble with Child Welfare 4 days 8 hours old
- Criminalizing Masks at Protests is Wrong 4 days 9 hours old
- Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit 4 days 10 hours old
- Victory! Austin Organizers Cancel City's Flock ALPR Contract 1 week 7 hours old
US-Cert Alerts
- Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider 1 day 15 hours old
- Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 3 weeks 3 days old
- AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems 3 weeks 4 days old
Guardian Security
- European journalists targeted with Paragon Solutions spyware, say researchers 1 day 17 hours old
- ANU investigates possible hack after vice-chancellor’s account liked ‘highly offensive’ LinkedIn posts 1 week 2 days old
- Russian-led cybercrime network dismantled in global operation 3 weeks 13 hours old
- What to do if you can’t get into your Facebook or Instagram account 3 weeks 3 days old
US-Cert Current Activity
- CISA Releases Cybersecurity Advisory on SimpleHelp RMM Vulnerability 1 day 18 hours old
- CISA Releases Ten Industrial Control Systems Advisories 1 day 18 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 3 days 18 hours old
- CISA Releases Four Industrial Control Systems Advisories 3 days 18 hours old
- CISA Adds Two Known Exploited Vulnerabilities to Catalog 4 days 18 hours old
- CISA Releases Seven Industrial Control Systems Advisories 1 week 1 day old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 1 day old
- Updated Guidance on Play Ransomware 1 week 2 days old
- CISA Releases Three Industrial Control Systems Advisories 1 week 3 days old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 1 week 3 days old
Security Wire Weekly
- A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. 2 days 9 hours old
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 4 days 12 hours old
- The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. 1 week 1 day old
- A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors. 1 week 4 days old
- Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. 2 weeks 16 hours old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 2 weeks 1 day old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 2 weeks 2 days old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 2 weeks 2 days old
- Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users. 2 weeks 2 days old
- A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web. 2 weeks 2 days old
Security Now
- SN 1029: The Illusion of Thinking - Meta Apps and JavaScript Collusion 3 days 2 hours old
- SN 1028: AI Vulnerability Hunting - Jailbreaking is Over 1 week 3 days old
- SN 1027: Artificial Intelligence - The Status of Encrypted Client Hello 2 weeks 3 days old
- SN 1026: Rogue Comms Tech Found in US Power Grid - Is AI Replicating Itself? 3 weeks 3 days old
Cisco Security Advisories
- Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability 1 week 5 hours old
- Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability 1 week 2 days old
- Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability 1 week 2 days old
- Cisco Identity Services Engine Arbitrary File Upload Vulnerability 1 week 2 days old
- Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability 1 week 2 days old
- Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities 1 week 2 days old
- Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability 1 week 2 days old
- Cisco Unified Contact Center Express Vulnerabilities 1 week 2 days old
- Cisco Integrated Management Controller Privilege Escalation Vulnerability 1 week 2 days old
- Cisco Unified Communications Products Command Injection Vulnerability 1 week 2 days old
Cloud Security Briefing: News and Advice
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 2 weeks 1 day old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 2 weeks 2 days old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 2 weeks 2 days old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 2 weeks 2 days old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 2 weeks 2 days old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 2 weeks 2 days old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 2 weeks 2 days old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 2 weeks 2 days old
- With so many apps and data residing in cloud, employing a security framework to help protect cloud infrastructure is an essential move for an organization. 2 weeks 2 days old
- SaaS has become ubiquitous. To secure it, take steps to inventory SaaS usage, securely authenticate usage, encrypt data, adopt single sign-on and more. 2 weeks 2 days old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tao Security
Tech Crunch Security
Techworld Security
Threat Post
