How CrowdStrike stopped everything. “The failures cascaded as dependent systems crashed, halting operations across multiple sectors." ~tech security privacy Article 1446 words 17 votes
Chinese government hackers penetrate US internet providers to spy ~tech internet security.cyber Article 794 words 17 votes
Israeli cabinet trades insults over ‘Jewish terrorism’ warning. Far-right security minister accused by defence minister and intelligence chief of endangering nation. ~news israel politics Link 9 votes
Microsoft to host security summit after CrowdStrike disaster ~tech microsoft security Article 783 words 16 votes
Top companies ground Microsoft Copilot over data governance concerns ~tech microsoft security Article 238 words 23 votes
“Something has gone seriously wrong,” dual-boot systems warn after Microsoft update ~tech linux security.cyber Article 918 words 43 votes
The gigantic and unregulated power plants in the cloud ~tech security.cyber Article 2240 words 12 votes
EFF’s concerns about the UN draft Cybercrime Convention ~tech security.cyber Article 1282 words, published Jul 29 2024 9 votes
Signal developer explains why early encrypted messaging tools flopped ~tech security.cyber Article 632 words 35 votes
USENIX Security '18: Why do keynote speakers keep suggesting that improving security is possible? (AI, IoT) ~tech security Video 51:22, published Aug 16 2018 7 votes
Mayor of Oslo warns that drug smugglers are increasingly targeting the Norwegian capital as a gateway to Europe as authorities tighten controls on major ports such as Antwerp ~news norway.oslo crime.organized politics belgium.antwerp Article 475 words 7 votes
Los Angeles police department warns residents after spike in burglaries using Wi-Fi jammers that disable security cameras, smart doorbells ~tech security.home Article 441 words, published Jul 20 2024 42 votes
A network of community activists in small towns and huge cities are helping get food to the people who most need it ~food Article 1065 words, published Jul 22 2024 17 votes
FrostyGoop malware attack cut off heat in Ukraine during winter ~tech security.cyber Article 496 words 17 votes
CrowdStrike global outage to cost US Fortune 500 companies $5.4bn ~tech security.cyber Article 504 words 35 votes
Anyone can access deleted and private repository data on GitHub ~comp security.cyber Article 1452 words 46 votes
Finland's deportation law puts EU's migration norms to the test – human rights organizations sound the alarm over the controversial measure ~misc politics Article 20 votes
A hacker ‘ghost’ network is quietly spreading malware on GitHub ~tech security.cyber Article 533 words 21 votes
CrowdStrike code update bricking Windows machines around the world ~tech microsoft security.cyber Link 143 votes
Preventing the worst supply chain attack you can imagine in the Python ecosystem ~comp security Article 1327 words, published Jul 9 2024 28 votes
National security or legal niceties? Norway picks a path – closing down opportunities for members of the authoritarian axis is not always as easy as it looks. ~misc politics Article 899 words 7 votes
Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts ~tech security.cyber google.domains Article 729 words 19 votes
Finnish lawmakers narrowly approved controversial bill that will allow border guards to turn away third-country migrants attempting to enter from neighboring Russia ~misc politics Article 536 words 11 votes
AT&T says criminals stole phone records of ‘nearly all’ customers in new data breach ~tech security.cyber privacy Article 709 words 26 votes
Patelco makes minor restorations but no end near for crippling credit union cyber attack ~finance Link 21 votes
Norwegian government has called off a plan to sell the last privately owned piece of land on the Arctic archipelago of Svalbard in order to prevent its acquisition by China ~misc politics Article 381 words 30 votes
Finland's PM Petteri Orpo urged parliament not to weaken a deportation bill that would allow Finnish border authorities to refuse to accept asylum applications in certain circumstances ~misc politics Article 327 words 5 votes
Mitigating Skeleton Key, a new type of generative AI jailbreak technique ~tech security Link 15 votes
Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims ~tech security.cyber Article 940 words 45 votes
Denver gave people experiencing homelessness $1,000 a month. A year later, nearly half of participants had housing. ~life housing Article 1293 words 37 votes
Single point of software failure could hamstring 15K US car dealerships for days ~transport Article 581 words 22 votes
Four in five CISOs have been told to downplay a potential risk’s severity ~comp security.cyber Article 661 words 9 votes
Pentagon contracts reveal US prep for multinational force in Haiti, down to toothbrushes and WiFi ~news haiti usa kenya politics crime.organized Article 22 votes
The leak of an internal Google database reveals thousands of potential privacy and security issues reported by employees ~tech google privacy security.cyber Article 287 words 21 votes
Significant cyber incidents | Strategic technologies program ~comp security.cyber Article 8881 words 1 vote
Hundreds of thousands of US internet routers destroyed in newly discovered 2023 hack ~tech internet security.cyber Article 517 words 23 votes
All Santander staff and 'thirty million' customers in Spain, Chile and Uruguay hacked ~tech security.cyber Article 447 words 22 votes
Cybercriminals pose as "helpful" Stack Overflow users to push malware ~comp security.cyber Article 488 words 19 votes
British Library on why it kept it real in communication about ransomware attack ~tech security.cyber Article 953 words 9 votes
Cyber security: A pre-war reality check ~tech security.cyber microsoft amazon google Article 6976 words, published May 14 2024 34 votes
Cyberattack forces major US health care network to divert ambulances from hospitals ~health healthcare Article published May 10 2024 17 votes
‘TunnelVision’ attack leaves nearly all VPNs vulnerable to spying ~tech security.cyber privacy Article 918 words, published May 6 2024 40 votes
As China and Iran hunt for dissidents in the US, the FBI is racing to counter the threat ~news china iran usa politics Article 1795 words 20 votes