Login/Register
Stats
Combats
The Web War
CyberSec Drills
Recent
Search
Radar
News
Cybersec
Purple
MorningStar
Books
Attack Maps
ThreatButt
Fortiguard
Kaspersky
Multi-Search
Cybersecurity News
Feed list:
TheHackerNews
The Register
CSO Online
CISO 2 CISO
Schneier
CyberNews.com
SecurityAffairs.co
BeepingComputer
The Hacker News
New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads
How to Improve Okta Security in Four Steps
China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation
BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions
⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More
SANS Institute Warns of Novel Cloud-Native Ransomware Attacks
GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories
Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal
Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges
GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging
Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps
Securityaffairs.co
Bleepingcomputer
Blockchain gaming platform WEMIX hacked to steal $6.1 million
Telegram CEO leaves France temporarily as criminal probe continues
Microsoft: New RAT malware used for crypto theft, reconnaissance
OKX suspends DEX aggregator after Lazarus hackers try to launder funds
Supply chain attack on popular GitHub Action exposes CI/CD secrets
Microsoft: March Windows updates mistakenly uninstall Copilot
Critical RCE flaw in Apache Tomcat actively exploited in attacks
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts
Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts
New Akira ransomware decryptor cracks encryptions keys using GPUs
The Register :: Security
Google acquisition target Wiz links fresh supply chain attack to 23K pwned GitHub repos
UK wants dirt on data brokers before criminals get there first
Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up
'Dead simple' hijacking hole in Apache Tomcat 'now actively exploited in the wild'
Court filing: DOGE aide broke Treasury policy by emailing unencrypted database
Amazon to kill off local Alexa processing, all voice requests shipped to the cloud
GitHub supply chain attack spills secrets from 23,000 projects
UK government to open £16B IT services competition after 6-month delay
Microsoft wouldn't look at a bug report without a video. Researcher maliciously complied
FCC stands up Council on National Security to fight China in ways that CISA used to
Apple's alleged UK encryption battle sparks political and privacy backlash
New kids on the ransomware block channel Lockbit to raid Fortinet firewalls
Dems ask federal agencies for reassurance DOGE isn't feeding data into AI willy-nilly
Google says it's rolling out fix for stricken Chromecasts
That 'angry guest' email from Booking.com? It's a scam, not a 1-star review
CISA: We didn't fire red teams, we just unhired a bunch of them
DeepSeek can be gently persuaded to spit out malware code
Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Get off that old Firefox by Friday or you'll be sorry, says Moz
Expired Juniper routers find new life – as Chinese spy hubs
CSO Online
Cloudflare expands security portfolio with network-powered posture management
Hacker legen Verwaltung in Kirkel lahm
GitHub wird immer mehr zu einem digitalen Minenfeld
Alphabet agrees to buy Israel’s Wiz, expanding its cloud security reach
Tomcat PUT to active abuse as Apache deals with critical RCE flaw
Alphabet in advanced talks to buy Israel’s Wiz, expanding cloud security reach
Attack time frames are shrinking rapidly. Here’s how cyber teams can cope.
Not all cuts are equal: Security budget choices disproportionately impact risk
5 Top Cybersecurity-Zertifizierungen: So pushen Sie Ihre CISO-Karriere
White House exempts cyber pros from mass layoffs; Judge reinstates CISA firings
Schneier on Security
Is Security Human Factors Research Skewed Towards Western Ideas and Habits?
Improvements in Brute Force Attacks
Friday Squid Blogging: SQUID Band
Upcoming Speaking Engagements
TP-Link Router Botnet
RIP Mark Klein
China, Russia, Iran, and North Korea Intelligence Sharing
Silk Typhoon Hackers Indicted
Thousands of WordPress Websites Infected with Malware
Friday Squid Blogging: Squid Loyalty Cards
CISO 2 CISO
Compliance without Complexity – Source:levelblue.com
News alert: Link11’s research shows DDoS attacks are more targeted — and doubled — year-over-year – Source: www.lastwatchdog.com
Dominican College SWENext Club Holds Successful STEM Event
HeForSWE: Perspectives on Allyship Part 2
WE23 Invent It. Build It. Recap
2023 Year in Review: SWE’s Most Popular Content
SWE Diverse Podcast Ep 239: Achieving STEM Equity With Dr. Ashley Huderson
HeForSWE: Perspectives on Allyship Part 1
A Pathway to Holistic Development and Professional Growth for Women of Color in STEM
Sage Creek SWENext Club: Designing the Future, Winning Today!