Login/Register
Stats
Combats
The Web War
CyberSec Drills
Recent
Search
Radar
News
Cybersec
Purple
MorningStar
Books
Attack Maps
ThreatButt
Fortiguard
Kaspersky
Multi-Search
Cybersecurity News
Feed list:
TheHackerNews
The Register
CSO Online
CISO 2 CISO
Schneier
CyberNews.com
SecurityAffairs.co
BeepingComputer
The Hacker News
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025
North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials
Top 3 Ransomware Threats Active in 2025
Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc
Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks
New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
Navigating the Future: Key IT Vulnerability Management Trends
AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
Watch Out For These 8 Cloud Security Shifts in 2025
Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks
AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access
Securityaffairs.co
Bleepingcomputer
Microsoft says attackers use exposed ASP.NET keys to deploy malware
Kimsuky hackers use new custom RDP Wrapper for remote access
Critical RCE bug in Microsoft Outlook now exploited in attacks
Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware
Critical Cisco ISE bug can let attackers run commands as root
DDoS attacks reportedly behind DayZ and Arma network outages
British engineering firm IMI discloses breach, shares no details
New Microsoft script updates Windows media with bootkit malware fixes
Robocallers posing as FCC fraud prevention team call FCC staff
Ransomware payments fell by 35% in 2024, totalling $813,550,000
CISA orders agencies to patch Linux kernel bug exploited in attacks
Hackers spoof Microsoft ADFS login pages to steal credentials
The Register :: Security
Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker
Federal judge tightens DOGE leash over critical Treasury payment system access
Dems want answers on national security risks posed by hiring freeze, DOGE probes
Democrats demand to know WTF is up with that DOGE server on OPM's network
Robocallers who phoned the FCC pretending to be from the FCC land telco in trouble
Mixing Rust and C in Linux likened to cancer by kernel maintainer
DOGE latest: Citrix supremo has 'read-only' access to US Treasury payment system
Netgear fixes critical bugs as Five Eyes warn about break-ins at the edge
US cranks up espionage charges against ex-Googler accused of trade secrets heist
Google: How to make any AMD Zen CPU always generate 4 as a random number
Poisoned Go programming language package lay undetected for 3 years
Grubhub serves up security incident with a side of needing to change your password
US accuses Canadian math prodigy of $65M crypto scheme
Cyberattack on NHS causes hospitals to miss cancer care targets
Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
UK govt must learn fast and let failing projects die young
Google patches odd Android kernel security bug amid signs of targeted exploitation
Why digital resilience is critical to banks
TSA’s airport facial-recog tech faces audit probe
2 officers bailed as anti-corruption unit probes data payouts to N Irish cops
CSO Online
Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
Spy vs spy: Security agencies help secure the network edge
Malicious package found in the Go ecosystem
Ransomware-Angriff auf Escada
Lazarus Group tricks job seekers on LinkedIn with crypto-stealer
21% of CISOs pressured to not report compliance issues
The cloud is not your only option: on-prem security still alive and well in Windows Server 2025
Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung
Download our extended detection and response (XDR) buyer’s guide
MacOS Ferret operators add a deceptive bite to their malware family
Schneier on Security
AIs and Robots Should Sound Robotic
On Generative AI Security
Deepfakes and the 2024 US Election
Journalists and Civil Society Members Using WhatsApp Targeted by Paragon Spyware
Friday Squid Blogging: On Squid Brains
Fake Reddit and WeTransfer Sites are Pushing Malware
ExxonMobil Lobbyist Caught Hacking Climate Activists
CISA Under Trump
New VPN Backdoor
Friday Squid Blogging: Beaked Whales Feed on Squid
CISO 2 CISO
DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis – Source:hackread.com
Ukraine’s largest bank PrivatBank Targeted with SmokeLoader malware – Source:hackread.com
Cisco Secure Web Appliance Range Request Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities – Source:sec.cloudapps.cisco.com
LevelBlue Expands Its Partner Program Globally – Source:levelblue.com
How to Protect Yourself on Social Networks – Source:www.mcafee.com
Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time – Source:www.mcafee.com
The Top 10 Online Booking Scam Hotspots in the U.S. Revealed – Source:www.mcafee.com
Quality Over Quantity: the Counter-Intuitive GenAI Key – Source:www.mcafee.com
What Security Means to Families – Source:www.mcafee.com