Sources
Hacker News
- Ray Dalio: It's Too Late, the Changes Are Coming 35 min 51 sec old
- NetMD and MiniDisc USB Connectivity 39 min 25 sec old
- Ask HN: How would you write a best-selling novel, in the age of LLMs? 42 min 29 sec old
- SQIP – a pluggable image converter with vector support 48 min 11 sec old
- Calm Down Your phone Isn't Listening to Your Conversations (2024) 48 min 36 sec old
- Atropos: A rollout framework for reinforcement learning with foundation models 50 min 32 sec old
- Dark Matter 51 min 55 sec old
- Speak is personalizing language learning with AI 1 hour 57 sec old
- Pinpointing the Learning Obstacles of an Interactive Theorem Prover [pdf] 1 hour 3 min old
- Common household plastics linked to heart disease 1 hour 3 min old
CNET Feed
- Today's NYT Mini Crossword Answers for Wednesday, April 30 2 hours 4 min old
- Virtual Game Cards Are Nintendo's New Way to Share Switch Games Digitally 3 hours 29 min old
- Champions League Soccer Semifinal: Livestream Barcelona vs. Inter Milan From Anywhere 6 hours 20 min old
- Best Internet Providers in York, Pennsylvania 7 hours 53 min old
- Meta's First LlamaCon Shows the Tech Giant's Still Playing Catch-Up 9 hours 42 min old
- Today's NYT Connections: Sports Edition Hints and Answers for April 30, #219 10 hours 20 min old
- Today's NYT Strands Hints, Answers and Help for April 30, #423 10 hours 20 min old
- Today's NYT Connections Hints, Answers and Help for April 30, #689 10 hours 20 min old
- Today's Wordle Hints, Answer and Help for April 30, #1411 10 hours 20 min old
- Google Takes Aim at Duolingo With AI Tools To Help You Learn New Languages 10 hours 40 min old
SlashDot
- Chemical In Plastics Linked To 350,000 Heart Disease Deaths 2 hours 24 min old
- Google Play Sees 47% Decline In Apps Since Start of Last Year 4 hours 27 min old
- Intel Says It's Rolling Out Laptop GPU Drivers With 10% To 25% Better Performance 5 hours 29 min old
- New York Lawmakers Reach Deal On 'Bell-To-Bell' School Cellphone Ban 6 hours 36 min old
- LG Will Shut Down Update Servers For Its Android Smartphones In June 6 hours 36 min old
- OpenAI's o3 Model Beats Master-Level Geoguessr Player 7 hours 36 min old
- OIN Marks 20 Years of Defending Linux and Open Source From Patent Trolls 7 hours 36 min old
- Mastercard Gives AI Agents Ability To Shop Online for You 8 hours 46 min old
- EA Lays Off Hundreds, Cancels 'Titanfall' Game 9 hours 46 min old
- Firefox Finally Delivers Tab Groups Feature 9 hours 46 min old
Computer Weekly Feed
- The infamous Scattered Spider hacking collective may have been behind the ongoing cyber attack on Marks and Spencer that has crippled systems at the retailer and left its ecommerce operation in disarray. 9 hours 46 min old
- The government’s flagship digital identity system still does not fully conform to key national security standards three years after launch, while questions remain over whether historic security problems have been resolved 11 hours 50 min old
- A report into the NHS AI Lab from the University of Edinburgh identifies early signs of return on investment amid barriers to scaling and implementation 16 hours 58 min old
- Though the competitive nature of the tech sector lends itself to job hopping, research by LiveCareer finds roles requiring technical skills are more stable than others 17 hours 59 min old
- Veeam showed a new Linux appliance, features in Veeam Backup & Replication that will see it run corporate backups as RAG data, and new cloud features that include Entra ID backup 20 hours 6 min old
- Making divorce digital 1 day 2 hours old
- Employees will receive bonuses as Fujitsu UK reaches sales target - suggesting that its pause on bidding for public sector business has had limited impact 1 day 10 hours old
- Some tasks cannot be solved easily on classical computers. Quantum mechanics offers one approach, but an Ising machine tackles the problem differently 1 day 13 hours old
- Saudi Arabia is positioning itself to take on huge volumes of the grunt work required by the artificial intelligence sector 1 day 14 hours old
- Alex Adamopoulos, CEO of consultancy Emergn argues transformation fatigue is a mounting concern for technology leaders, and suggests how to tackle it 1 day 14 hours old
Wired Security
- WhatsApp Is Walking a Tightrope Between AI Features and Privacy 13 hours 5 min old
- Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi 17 hours 50 min old
- Car Subscription Features Raise Your Risk of Government Surveillance, Police Records Show 1 day 19 hours old
- Pete Hegseth’s Signal Scandal Spirals Out of Control 3 days 19 hours old
- Protecting Your Phone—and Your Privacy—at the US Border 5 days 8 hours old
- Gmail’s New Encrypted Messages Feature Opens a Door for Scams 5 days 14 hours old
- The Tech That Safeguards the Conclave’s Secrecy 1 week 20 min old
- How to Protect Yourself From Phone Searches at the US Border 1 week 1 day old
- Florida Man Enters the Encryption Wars 1 week 3 days old
- ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform 1 week 4 days old
Security Week
- How do You Know if You’re Ready for a Red Team Partnership? 14 hours 6 min old
- SentinelOne’s Purple AI Athena Brings Autonomous Decision-Making to the SOC 14 hours 20 min old
- China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America 15 hours 19 min old
- Pistachio Raises $7 Million for Cybersecurity Training Platform 17 hours 44 min old
- LayerX Raises $11 Million for Browser Security Solution 18 hours 17 min old
- Cybersecurity Firms Raise Over $1.7 Billion Ahead of RSA Conference 2025 18 hours 20 min old
- Google Tracked 75 Zero-Days in 2024 19 hours 9 sec old
- RSA Conference 2025 Announcements Summary (Day 1) 19 hours 20 min old
- Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks 19 hours 55 min old
- CISA Warns of Exploited Broadcom, Commvault Vulnerabilities 21 hours 30 min old
The Security Ledger
- SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI 14 hours 19 min old
- Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy 1 day 17 hours old
- Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE 6 days 17 hours old
- Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 1 week 16 hours old
- Industry First: StrikeReady AI Platform Moves Security Teams Beyond Basic, One-Dimensional AI-Driven Triage Solutions 1 week 1 day old
- SquareX to Uncover Data Splicing Attacks at BSides San Francisco, A Major DLP Flaw that Compromises Data Security of Millions 1 week 6 days old
- Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed 2 weeks 6 days old
- SpyCloud Research Shows that Endpoint Detection and Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections 3 weeks 1 day old
- Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance 3 weeks 5 days old
- Brinker Named Among “10 Most Promising Defense Tech Startups of 2025” 3 weeks 6 days old
ZDNet Security
- Google Wallet brings digital IDs to more states - how to add yours 14 hours 19 min old
- Malwarebytes' new security tools help shield you from online scams - here's how 1 day 17 hours old
- 8 ways to protect your privacy on Linux and keep your data safe 1 day 17 hours old
- If we want a passwordless future, let's get our passkey story straight 3 days 21 hours old
- How to prevent your streaming device from tracking your viewing habits (and why it makes a difference) 4 days 18 hours old
- Why the road from passwords to passkeys is long, bumpy, and worth it - probably 4 days 22 hours old
- The best VPNs for streaming in 2025: Expert tested and reviewed 5 days 5 hours old
- 8 simple ways Mac users can better protect their privacy 5 days 9 hours old
- The 4 VPNs I swear by for Linux - and why I trust them 6 days 13 hours old
- Best antivirus for Mac in 2025: I tested your top software options 6 days 21 hours old
Microsoft Malware Protection Center
- Microsoft announces the 2025 Security Excellence Awards winners 15 hours 20 min old
- Faster, more personalized service begins at the frontline with Microsoft Intune 1 day 14 hours old
- Explore practical best practices to secure your data with Microsoft Purview 4 days 14 hours old
- New whitepaper outlines the taxonomy of failure modes in AI agents 5 days 14 hours old
- Understanding the threat landscape for Kubernetes and containerized assets 6 days 14 hours old
- Securing our future: April 2025 progress report on Microsoft’s Secure Future Initiative 1 week 1 day old
- Microsoft’s Secure by Design journey: One year of success 1 week 5 days old
- Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures 1 week 6 days old
- Threat actors misuse Node.js to deliver malware and other malicious payloads 2 weeks 13 hours old
- Transforming security with Microsoft Security Exposure Management initiatives 2 weeks 14 hours old
Graham Cluely Security Blog
- The AI Fix #48: AI Jesus, and is the AI Singularity almost upon us? 16 hours 10 min old
- Ransomware attacks on critical infrastructure surge, reports FBI 19 hours 49 min old
- 21 million employee screenshots leaked in bossware breach blunder 19 hours 51 min old
- Hackers access sensitive SIM card data at South Korea’s largest telecoms company 4 days 21 hours old
- Smashing Security podcast #414: Zoom.. just one click and your data goes boom! 6 days 7 hours old
- The AI Fix #47: An AI is the best computer programmer in the world 1 week 16 hours old
- Crosswalks hacked to play fake audio of Musk, Zuck, and Jeff Bezos 1 week 22 hours old
- Smashing Security podcast #413: Hacking the hackers… with a credit card? 1 week 6 days old
- Insurance firm Lemonade warns of breach of thousands of driving license numbers 1 week 6 days old
- RansomHouse ransomware: what you need to know 2 weeks 14 hours old
Security Wire Daily News
- An automation architect is a senior IT professional responsible for the strategic design, development and governance of automation initiatives across an organization. 16 hours 58 min old
- It can be nearly impossible to predict if or how a ransomware group will target an organization, but there are knowable stages of a ransomware attack. 1 day 8 hours old
- A risk map, or risk heat map, is a data visualization tool for communicating specific risks an organization faces. 1 day 10 hours old
- Cisco's new Foundation AI group, which includes engineers from multiple companies, has released a compact AI reasoning model based on Llama 3 for cybersecurity to open source. 1 day 10 hours old
- Payment tokenization benefits merchants and customers alike. It not only helps protect financial transaction data, but also improves UX. 1 day 10 hours old
- If AI continues to become more accurate and secure, automation and self-healing systems that strengthen security programs could be the future. 1 day 14 hours old
- Cisco AI Defense will feed in data and automate AI governance in ServiceNow SecOps products as enterprises seek a platform approach to cybersecurity. 1 day 16 hours old
- Three software supply chain security vendors join the AI agent trend that is sweeping tech, as AI-generated code threatens to overwhelm human security pros. 4 days 13 hours old
- In any given year, certain industries seem to make more attractive targets for ransomware groups. But no single sector shoulders all -- or even most -- of the risk. 5 days 8 hours old
- Risk exposure is the quantified potential loss from currently underway or planned business activities. 5 days 12 hours old
US-Cert Current Activity
- CISA Adds One Known Exploited Vulnerability to Catalog 18 hours 20 min old
- CISA Releases Three Industrial Control Systems Advisories 18 hours 20 min old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 1 day 18 hours old
- CISA Releases Seven Industrial Control Systems Advisories 5 days 18 hours old
- CISA Releases Five Industrial Control Systems Advisories 1 week 18 hours old
- CISA Adds Three Known Exploited Vulnerabilities to Catalog 1 week 5 days old
- CISA Releases Six Industrial Control Systems Advisories 1 week 5 days old
- CISA Adds One Known Exploited Vulnerability to Catalog 1 week 6 days old
- CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise 1 week 6 days old
- CISA Releases Nine Industrial Control Systems Advisories 2 weeks 18 hours old
Guardian Security
EFF
- Congress Passes TAKE IT DOWN Act Despite Major Flaws 1 day 6 hours old
- EFF Leads Prominent Security Experts in Urging Trump Administration to Leave Chris Krebs Alone 1 day 12 hours old
- Texas’s War on Abortion Is Now a War on Free Speech 1 day 13 hours old
- Trump Administration’s Targeting of International Students Jeopardizes Free Speech and Privacy Online 4 days 2 hours old
- IRS-ICE Immigrant Data Sharing Agreement Betrays Data Privacy and Taxpayers’ Trust 4 days 12 hours old
- Leaders Must Do All They Can to Bring Alaa Home 4 days 21 hours old
- Digital Identities and the Future of Age Verification in Europe 6 days 21 hours old
- Florida’s Anti-Encryption Bill Is a Wrecking Ball to Privacy. There's Still Time to Stop It. 1 week 7 hours old
- Why the FTC v. Meta Trial Matters: Competition Gaps and Civil Liberties Opportunities 1 week 1 day old
- EFF to Congress: Here’s What A Strong Privacy Law Looks Like 1 week 1 day old
Malware Bytes Security
- Zoom attack tricks victims into allowing remote access to install malware and steal money 5 days 15 hours old
- Android malware turns phones into malicious tap-to-pay machines 5 days 16 hours old
- 4.7 million customers’ data accidentally leaked to Google by Blue Shield of California 5 days 17 hours old
- Shopify faces privacy lawsuit for collecting customer data 6 days 8 hours old
- All Gmail users at risk from clever replay attack 1 week 16 hours old
- A week in security (April 12 – April 18) 1 week 1 day old
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 1 week 2 days old
- Did DOGE “breach” Americans’ data? (Lock and Code S06E08) 1 week 2 days old
- Text scams grow to steal hundreds of millions of dollars 1 week 4 days old
- Apple patches security vulnerabilities in iOS and iPadOS. Update now! 1 week 5 days old
KrebsOnSecurity
- DOGE Worker’s Code Supports NLRB Whistleblower 6 days 9 hours old
- Whistleblower: DOGE Siphoned NLRB Case Data 1 week 1 day old
- Funding Expires for Key Cyber Vulnerability Database 2 weeks 2 hours old
- Trump Revenge Tour Targets Cyber Leaders, Elections 2 weeks 1 day old
- China-based SMS Phishing Triad Pivots to Banks 2 weeks 5 days old
- Patch Tuesday, April 2025 Edition 3 weeks 3 hours old
- Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe 3 weeks 4 days old
Cisco Security Advisories
- Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server 1 week 1 hour old
- Cisco Secure Network Analytics Privilege Escalation Vulnerability 1 week 6 days old
- Cisco Webex App Client-Side Remote Code Execution Vulnerability 1 week 6 days old
- Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability 1 week 6 days old
- Cisco NX-OS Software Image Verification Bypass Vulnerability 3 weeks 1 day old
- Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities 3 weeks 6 days old
- Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability 3 weeks 6 days old
- Cisco Enterprise Chat and Email Denial of Service Vulnerability 3 weeks 6 days old
Security Now
- SN 1022: The Windows Sandbox - Short-life Certs, Ransomware Payout Stats 1 week 3 hours old
- SN 1021: Device Bound Session Credentials - Hotpatching in Win 11, Apple vs. UK 2 weeks 3 hours old
- SN 1020: Multi-Perspective Issuance Corroboration - IoT Done Right, France Phishes, Gmails E2EE 3 weeks 3 hours old
- SN 1019: EU OS - Troy Hunt Phished, Ransomware List, InControl 4 weeks 3 hours old
Security Wire Weekly
- As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. 2 weeks 1 day old
- The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. 3 weeks 5 days old
- You don't have to build your blockchain project from the ground up. These cloud-based service providers can provide the necessary infrastructure, networking and development tools. 3 weeks 6 days old
- Tabletop games and live-fire exercises are two ways to test the effectiveness of enterprise security controls and defenses. Discover how each works and how they differ. 3 weeks 6 days old
- Ensuring the security of your company's online payment systems is key to preventing costly attacks, meeting compliance requirements and maintaining customer trust. 3 weeks 6 days old
- Tailgating, sometimes referred to as piggybacking, is a type of physical security breach in which an unauthorized person follows an authorized individual to enter secured premises while avoiding detection by an electronic or human access control (or... 3 weeks 6 days old
- Organizational security is undermined by a number of identity and access management problems. Learn what those risks are and get ideas on how to solve them. 3 weeks 6 days old
- One of the most important goals of cybersecurity professionals is to quickly identify potential or in-progress cyberattacks. These three approaches can help. 3 weeks 6 days old
- Endpoint detection and response (EDR) is a system that gathers and analyzes security threat-related information from computer workstations and other endpoints. 3 weeks 6 days old
- IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any public network. 3 weeks 6 days old
Tao Security
Google Security Blog
- Google announces Sec-Gemini v1, a new experimental cybersecurity model 3 weeks 4 days old
- Taming the Wild West of ML: Practical Model Signing with Sigstore 3 weeks 4 days old
Cloud Security Briefing: News and Advice
- RSA Conference 2025 3 weeks 4 days old
- While prevention is key, it's not enough to protect a company's systems from ransomware. Learn how early detection with these four methods helps reduce damage from attacks. 3 weeks 5 days old
- If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices. 3 weeks 6 days old
- CASB tools help secure cloud applications so only authorized users have access. Discover more about this rapidly evolving technology and its use cases. 3 weeks 6 days old
- Before jumping feet first into the cloud, understand the new and continuing top cloud security challenges your organization is likely to face -- and how to mitigate them. 3 weeks 6 days old
- Most enterprises have siloed departments, but SASE's convergence of network and security functions is disrupting those constructs and driving the need for more team communication. 3 weeks 6 days old
- The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. 3 weeks 6 days old
- What are the necessary components of a cloud security policy, and why should an organization go to the trouble to create one? Download a template to get the process started. 3 weeks 6 days old
- This cloud security guide explains challenges enterprises face today; best practices for securing and managing SaaS, IaaS and PaaS; and comparisons of cloud-native security tools. 3 weeks 6 days old
- Automating security in the cloud can be invaluable for threat detection and mitigation. Explore key areas where security professionals should implement automation. 3 weeks 6 days old
Cisco Threat Outbreak
Corero Security
CSOOnline - Salted Hash - Top Security News
Dark Reading Attacks and Breaches
Dark Reading Cloud
Dark Reading Security Monitoring
Dark Reading Threat Intelligence
Dark Readuing Vulnerability and Threats
InfoSec Island
InfoWorld
Naked Security
Network World
NoticeBored
Paul's Security Weekly
PC Magazine Security
Schneier on Security
Security News White Papers
Tech Crunch Security
Techworld Security
Threat Post
US-Cert Alerts
