PornHub extorted after hackers steal Premium member activity data ~tech security.cyber internet Article 639 words 32 votes
Over 120,000 home cameras hacked for 'sexploitation' footage ~tech privacy security.cyber Article 392 words 54 votes
Poets are now cybersecurity threats: Researchers used 'adversarial poetry' to trick AI into ignoring its safety guard rails and it frequently worked ~tech security.cyber Article 28 votes
Disrupting the first reported AI-orchestrated cyber espionage campaign ~tech security.cyber Article 1336 words 16 votes
Mozilla Firefox gets new anti-fingerprinting defenses ~tech browsers security.cyber privacy Article 502 words 59 votes
The spy who came in from the WiFi: Beware of radio network surveillance! ~comp security.cyber privacy Article 740 words 27 votes
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking ~tech android security.cyber google Article 275 words 62 votes
The day my smart vacuum turned against me ~tech security.cyber privacy Article 1427 words, published Oct 7 2025 33 votes
Norwegian public transport operator Ruter has shared the results of a comprehensive cybersecurity test of electric buses, conducted in an isolated mountain environment ~transport Article 267 words, published Oct 30 2025 10 votes
Greg Kroah-Hartman explains the Cyber Resilience Act for open source developers ~comp security.cyber open source Article 1320 words 7 votes