GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
1.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
2025-11-06 |
related products
| tags:
attackers
,
code
,
compromised
2.
How a ransomware gang encrypted Nevada government's systems
(bleepingcomputer.com)
2025-11-06 |
related products
| tags:
access
,
attacker
,
incident
3.
Multiple ChatGPT Security Bugs Allow Rampant Data Theft
(darkreading.com)
2025-11-06 |
related products
| tags:
actions
,
arbitrary
,
arbitrary prompts
4.
Critical Cisco UCCX flaw lets attackers run commands as root
(bleepingcomputer.com)
2025-11-06 |
related products
| tags:
arbitrary
,
attackers
,
cisco
5.
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs
(darkreading.com)
2025-11-06 |
related products
| tags:
allowed
,
allowed chinese
,
attackers
6.
Critical Site Takeover Flaw Affects 400K WordPress Sites
(darkreading.com)
2025-11-05 |
related products
| tags:
account
,
account website
,
allows
7.
Europe Sees Increase in Ransomware, Extortion Attacks
(darkreading.com)
2025-11-04 |
related products
| tags:
ai enhanced
,
attackers
,
attackers leverage
8.
Critical vulnerability in AMD Zen 5 CPUs could make encryption keys predictable
(techspot.com)
2025-11-04 |
related products
| tags:
allow
,
allow local
,
amd sb
9.
Critical security vulnerability in AMD Zen 5 CPUs could make encryption keys predictable
(techspot.com)
2025-11-04 |
related products
| tags:
allow
,
allow local
,
amd sb
10.
On the Road Again: Hackers Hijack Physical Cargo Freight
(darkreading.com)
2025-11-03 |
related products
| tags:
actually
,
actually steal
,
attackers
11.
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
attackers
,
bronze butler
,
endpoint
12.
'TruffleNet' Attack Wields Stolen Credentials Against AWS
(darkreading.com)
2025-11-03 |
related products
| tags:
accounts
,
accounts using
,
activities
13.
Why UUIDs won't protect your secrets
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attacker
,
random
14.
Microsoft warns of new “Payroll Pirate” scam stealing employees’ direct deposits
(arstechnica.com)
2025-10-31 |
related products
| tags:
account
,
accounts
,
attackers
15.
Why attackers are moving beyond email-based phishing attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
apps
,
attacker
,
email
16.
How weak passwords and other failings led to catastrophic breach of Ascension
(arstechnica.com)
2025-10-31 |
related products
| tags:
ascension
,
attackers
,
contractor
17.
An attacker’s blunder gave us a look into their operations
(news.ycombinator.com)
2025-10-31 | by Jamie Levy |
related products
| tags:
actor
,
attacker
,
figure
18.
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
(news.ycombinator.com)
2025-10-31 | by Jamie Levy |
related products
| tags:
actor
,
attacker
,
figure
19.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
browser
,
malicious
20.
MATLAB dev says ransomware gang stole data of 10,000 people
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
breach
,
gang
21.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
file
,
phishing
22.
Google discovered a new scam—and also fell victim to it
(arstechnica.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
campaign
23.
How attackers are still phishing "phishing-resistant" authentication
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
access
,
attacker
,
attacks
24.
Google spoofed via DKIM replay attack: A technical breakdown
(news.ycombinator.com)
2025-10-31 | by Gerasim Hovhannisyan |
related products
| tags:
attacker
,
com
,
dkim
25.
Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
aws
26.
Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
aws
27.
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
(news.ycombinator.com)
2025-10-31 | by Maryam Motallebighomi |
related products
| tags:
attacker
,
attacks
,
bike
28.
Employee gets $920 for credentials used in $140 million bank heist
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
brazilian
,
company
29.
PSA: If you have a Brother printer, change the password now
(9to5mac.com)
2025-10-31 | by Ben Lovejoy |
related products
| tags:
access
,
attacker
,
brother
30.
Alleged Verizon data breach sees 61M customer records offered for sale
(9to5mac.com)
2025-10-31 | by Ben Lovejoy |
related products
| tags:
address
,
attackers
,
data
1
2
next ›
Today's top topics:
apple
musk
game
deals
black
google
free
black friday
hardware
iphone
View all today's topics →