Sweden's public sector has ditched Big Tech in the name of privacy as a major telecom provider unveiled a new secure collaboration hub privacy security.cyber Link 13 votes
White House urges use of type safe and memory safe programming languages and hardware security.cyber PDF 38 votes
Leak of documents on spyware developed by vendor for Chinese government security.cyber Tweet 33 votes
ChatGPT is leaking passwords from private conversations of its users, Ars reader says privacy security.cyber Article 586 words 17 votes
In major gaffe, hacked Microsoft test account was assigned admin privileges security.cyber microsoft Article 432 words 28 votes
Twenty-six billion records exposed in massive leak, including data from Linkedin, X, Dropbox security.cyber privacy Article 369 words 44 votes
Hackers can infect network-connected wrenches to install ransomware, researchers say security.cyber Article 493 words 28 votes
History of country code top-level domains, with a map of the most popular ones in use | Map Men internet Video 11:14 14 votes
Self-proclaimed 'gay furry hackers' breach nuclear lab; demands research into IRL catgirls security.cyber Article 226 words 71 votes
Nothing’s iMessage app was a security catastrophe, taken down in 24 hours security.cyber Article 542 words 65 votes
Microsoft’s Windows Hello fingerprint authentication has been bypassed security.cyber microsoft Article 516 words 41 votes
Cybersecurity firm CEO pleads guilty to hacking hospitals to boost his company's business security.cyber Article 427 words 36 votes
Ransomware gang files SEC complaint over victim’s undisclosed breach security.cyber Article 531 words 26 votes
A Meta engineer known as an expert at curbing online harassment saw his own child face harassment on Instagram. Now, he’s testifying before the US Congress social media Article 817 words 19 votes
After hack, personally identifiable information records of a large percentage of citizens of India for sale on the dark web. The hack includes biometric data security.cyber Article 2264 words, published Oct 15 2023 22 votes
US sues SolarWinds for fraud over alleged cyber security neglect ahead of 2020 Russian hack of Justice and Homeland Security departments security.cyber Article 669 words 25 votes
Finland faces growing Russian online threat, Finnish security services say – espionage attempts have increased since Ukraine invasion security.cyber Article 584 words 22 votes
The dangers of LLM self-exfiltration: AI alignment and cybersecurity challenges security.cyber Article 1393 words 5 votes
Building automation giant Johnson Controls hit by ransomware attack security.cyber Article 804 words 8 votes
At MGM's hacked casinos in Las Vegas, evidence of the massive ransomware hack is everywhere, if you're looking for it security.cyber Article 2733 words 45 votes
New SprySOCKS Linux malware used in cyber espionage attacks linux security.cyber Article 468 words 12 votes
WinRAR zero-day exploited since April to hack trading accounts security.cyber Article 622 words 31 votes
The King of Jordan approved a cybercrime bill that will crack down on online speech deemed harmful to national unity internet Article 304 words 18 votes
FedFingerprinting: A federated learning approach to website fingerprinting attacks in Tor networks security.cyber Link 6 votes
Hackers exploited a zero-day flaw in Ivanti's software undetected for at least three months, US and Norwegian cybersecurity agencies warn security.cyber Article 456 words 14 votes
Microsoft lost its keys, and the US government got hacked microsoft security.cyber Article 762 words 25 votes
Apple fixes zero-days used to deploy Triangulation spyware via iMessage apple ios security.cyber Article 681 words 8 votes
Security expert defeats Lenovo laptop BIOS password with a screwdriver security.cyber Article 609 words 13 votes
SolarWinds: The untold story of the boldest supply-chain hack ever security.cyber Article 8232 words, published May 2 2023 7 votes
A flock of chickens, held for ransom — Growing cyberattacks on Canada's food system threaten disaster security.cyber Article 2072 words 9 votes
Belgium launches nationwide safe harbor for ethical hackers security.cyber Article 658 words, published Feb 15 2023 10 votes
Danish parliament urges lawmakers and employees to remove TikTok on work phones as a cybersecurity measure, saying “there is a risk of espionage” social media security.cyber privacy Article 263 words 4 votes
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices. CryWiper masquerades as ransomware, but its real purpose is to permanently destroy data. security.cyber Article 696 words 12 votes
Firefox for families: The TechTalk - Making awkward tech conversations with kids slightly less awkward privacy Article 692 words 5 votes
Erik Prince wants to sell you a “secure” smartphone that’s too good to be true security.cyber Article 1768 words 12 votes
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies social media security.cyber Article 13 votes
Finland's parliament hit with cyberattack following US move to admit the country to NATO security.cyber Article 391 words 7 votes
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware privacy security.cyber Article 7442 words 4 votes
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough? security.cyber Article 1378 words 4 votes
Fraudsters cloned company director’s voice in $35 million bank heist, police find security Article 821 words 8 votes
Sinclair Broadcast Group was hit by ransomware over the weekend security.cyber Article 229 words 13 votes