Login/Register
Stats
Combats
The Web War
CyberSec Drills
Recent
Search
Radar
News
Cybersec
Purple
MorningStar
Books
Attack Maps
ThreatButt
Fortiguard
Kaspersky
Multi-Search
Katana
Feed list:
TheHackerNews
The Register
CSO Online
CISO 2 CISO
Schneier
CyberNews.com
SecurityAffairs.co
BeepingComputer
The Hacker News
North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users
CISO Perspectives on Complying with Cybersecurity Regulations
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Securityaffairs.co
Bleepingcomputer
FBI warns against using unlicensed crypto transfer services
LA County Health Services: Patients' data exposed in phishing attack
Researchers sinkhole PlugX malware server with 2.5 million unique IPs
Reddit down in major outage blocking access to web, mobile apps
Over 1,400 CrushFTP servers vulnerable to actively exploited bug
WP Automatic WordPress plugin hit by millions of SQL injection attacks
New Brokewell malware takes over Android devices, steals data
US charges Samourai cryptomixer founders for laundering $100 million
Maximum severity Flowmon bug has a public exploit, patch now
ArcaneDoor hackers exploit Cisco zero-days to breach govt networks
Google Meet opens client-side encrypted calls to non Google users
Windows 11 KB5036980 update goes live with Start Menu ads
The Register :: Security
Cops cuff man for allegedly framing colleague with AI-generated hate speech clip
Ring dinged for $5.6M after, among other claims, rogue insider spied on 'pretty girls'
Two cuffed in Samourai Wallet crypto dirty money sting
Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers
What to do in the age of the critical breach
Indian bank’s IT is so shabby it’s been banned from opening new accounts
Australia’s spies and cops want ‘accountable encryption’ - aka access to backdoors
Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes
Shouldn't Teams, Zoom, Slack all interoperate securely for the Feds? Wyden is asking
Microsoft cannot keep its own security in order, so what hope for its add-ons customers?
Management company settles for $18.4M after nuclear weapons plant staff fudged their timesheets
Google cools on cookie phase-out while regulators chew on plans
US charges Iranians with cyber snooping on government, companies
If Britain is so bothered by China, why do these .gov.uk sites use Chinese ad brokers?
Mandiant: Orgs are detecting cybercriminals faster than ever
UnitedHealth admits IT security breach could 'cover substantial proportion of people in America'
Leicester streetlights take ransomware attack personally, shine on 24/7
Over a million Neighbourhood Watch members exposed through web app bug
Misconfigured cloud server leaked clues of North Korean animation scam
Old Windows print spooler bug is latest target of Russia's Fancy Bear gang
CSO Online
Looking outside: How to protect against non-Windows network vulnerabilities
Cloud security teams: What to know as M&A activity rebounds in 2024
Salt Security adds defense against OAuth attacks
Cisco urges immediate software upgrade after state-sponsored attack
What will cyber threats look like in 2024?
How the ToddyCat threat group sets up backup traffic tunnels into victim networks
New OT security service can help secure against critical systems attacks
What is biometrics? 10 physical and behavioral identifiers that can be used for authentication
The rise in CISO job dissatisfaction – what’s wrong and how can it be fixed?
The Assumed Breach conundrum
Schneier on Security
The Rise of Large-Language-Model Optimization
Dan Solove on Privacy Regulation
Microsoft and Security Incentives
Using Legitimate GitHub URLs for Malware
Friday Squid Blogging: Squid Trackers
Other Attempts to Take Over Open Source Projects
Using AI-Generated Legislative Amendments as a Delaying Technique
X.com Automatically Changing Link Text but Not URLs
New Lattice Cryptanalytic Technique
Upcoming Speaking Engagements
CISO 2 CISO
Baby ASO: A Minimal Viable Transformation for Your SOC – Source: securityboulevard.com
LabHost Phishing Platform is Latest Target of International Law Agencies – Source: securityboulevard.com
Choosing SOC Tools? Read This First [2024 Guide] – Source: securityboulevard.com
USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation – Source: securityboulevard.com
SafeBreach Coverage for AA24-109A (Akira Ransomware) – Source: securityboulevard.com
Taking Time to Understand NIS2 Reporting Requirements – Source: securityboulevard.com
Daniel Stori’s ‘WC’ – Source: securityboulevard.com
USENIX Security ’23 – Inductive Graph Unlearning – Source: securityboulevard.com
From DAST to dawn: why fuzzing is better solution | Code Intelligence – Source: securityboulevard.com
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24 – Source: securityboulevard.com