Login/Register
Stats
Combats
The Web War
CyberSec Drills
Recent
Search
Radar
News
Cybersec
Purple
MorningStar
Books
Attack Maps
ThreatButt
Fortiguard
Kaspersky
Multi-Search
Cybersecurity News
Feed list:
TheHackerNews
The Register
CSO Online
CISO 2 CISO
Schneier
CyberNews.com
SecurityAffairs.co
BeepingComputer
The Hacker News
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
NHIs Are the Future of Cybersecurity: Meet NHIDR
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
Warning: VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17)
Gmail's New Shielded Email Feature Lets Users Create Aliases for Email Privacy
Beyond Compliance: The Advantage of Year-Round Network Pen Testing
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
Securityaffairs.co
Bleepingcomputer
Cyberattack at French hospital exposes health data of 750,000 patients
Fintech giant Finastra investigates data breach after SFTP hack
MITRE shares 2024's top 25 most dangerous software weaknesses
US charges five linked to Scattered Spider cybercrime gang
Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root
Microsoft confirms game audio issues on Windows 11 24H2 PCs
New Ghost Tap attack abuses NFC mobile payments to steal money
Amazon and Audible flooded with 'forex trading' and warez listings
Apple fixes two zero-days used in attacks on Intel-based Macs
CISA tags Progress Kemp LoadMaster flaw as exploited in attacks
Ford investigates alleged breach following customer data leak
Oracle warns of Agile PLM file disclosure flaw exploited in attacks
The Register :: Security
Put your usernames and passwords in your will, advises Japan's government
Five Scattered Spider suspects indicted for phishing spree and crypto heists
Chinese cyberspies, Musk’s Beijing ties, labelled ‘real risk’ to US security by senator
Mega US healthcare payments network restores system 9 months after ransomware attack
Google's AI bug hunters sniff out two dozen-plus code gremlins that humans missed
D-Link tells users to trash old VPN routers over bug too dangerous to identify
Data is the new uranium – incredibly powerful and amazingly dangerous
Healthcare org Equinox notifies 21K patients and staff of data theft
China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer
Russian suspected Phobos ransomware admin extradited to US over $16M extortion
America's drinking water systems have a hard-to-swallow cybersecurity problem
Palo Alto Networks tackles firewall-busting zero-days with critical patches
Navigating third-party risks
Crook breaks into AI biz, points $250K wire payment at their own account
Join in the festive cybersecurity fun
iOS 18 added secret and smart security feature that reboots iThings after three days
Ford 'actively investigating' after employee data allegedly parked on leak site
Critical 9.8-rated VMware vCenter RCE bug exploited after patch fumble
T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears
Sweden's 'Doomsday Prep for Dummies' guide hits mailboxes today
CSO Online
What CISOs need to know about the SEC’s breach disclosure rules
Act fast to snuff out employee curiosity over ‘free’ AI apps
CSO30 ASEAN 2024: The top 30 cybersecurity leaders in Southeast Asia and Hong Kong
Erneute Phishing-Attacke auf IHK-Unternehmen
Chinas Cyber-Pandas greifen Telekom-Unternehmen an
Weaponized pen testers are becoming a new hacker staple
11 biggest financial sector cybersecurity threats
SBOM erklärt: Was ist eine Software Bill of Materials?
Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes
At Ignite, Microsoft looks to genAI, exposure managment, and new bug bounties to secure enterprise IT
Schneier on Security
Steve Bellovin’s Retirement Talk
Why Italy Sells So Much Spyware
Most of 2023’s Top Exploited Vulnerabilities Were Zero-Days
Friday Squid Blogging: Female Gonatus Onyx Squid Carrying Her Eggs
Good Essay on the History of Bad Password Policies
New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
Mapping License Plate Scanners in the US
Criminals Exploiting FBI Emergency Data Requests
Friday Squid Blogging: Squid-A-Rama in Des Moines
AI Industry is Trying to Subvert the Definition of “Open Source AI”
CISO 2 CISO