Tech News
clear
Topic Analysis: Today This Week This Month This Year
61.
Hack the Hackers: 6 Laws for Staying Ahead of the Attackers (darkreading.com)
62.
Critics scoff after Microsoft warns AI feature can infect machines and pilfer data (arstechnica.com)
63.
Critical Fortinet FortiWeb WAF Bug Exploited in the Wild (darkreading.com)
64.
Researchers question Anthropic claim that AI-assisted attack was 90% autonomous (arstechnica.com)
65.
ClickFix Campaign Targets Hotels, Spurs Secondary Customer Attacks (darkreading.com)
66.
5 reasons why attackers are phishing over LinkedIn (bleepingcomputer.com)
67.
Dangerous runC flaws could allow hackers to escape Docker containers (bleepingcomputer.com)
68.
Supply chain attacks are exploiting our assumptions (news.ycombinator.com)
69.
How a ransomware gang encrypted Nevada government's systems (bleepingcomputer.com)
70.
Multiple ChatGPT Security Bugs Allow Rampant Data Theft (darkreading.com)
71.
Critical Cisco UCCX flaw lets attackers run commands as root (bleepingcomputer.com)
72.
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs (darkreading.com)
73.
Critical Site Takeover Flaw Affects 400K WordPress Sites (darkreading.com)
74.
Europe Sees Increase in Ransomware, Extortion Attacks (darkreading.com)
75.
Critical vulnerability in AMD Zen 5 CPUs could make encryption keys predictable (techspot.com)
76.
Critical security vulnerability in AMD Zen 5 CPUs could make encryption keys predictable (techspot.com)
77.
On the Road Again: Hackers Hijack Physical Cargo Freight (darkreading.com)
78.
China-linked hackers exploited Lanscope flaw as a zero-day in attacks (bleepingcomputer.com)
79.
'TruffleNet' Attack Wields Stolen Credentials Against AWS (darkreading.com)
80.
Why UUIDs won't protect your secrets (news.ycombinator.com)
81.
Microsoft warns of new “Payroll Pirate” scam stealing employees’ direct deposits (arstechnica.com)
82.
Why attackers are moving beyond email-based phishing attacks (bleepingcomputer.com)
83.
How weak passwords and other failings led to catastrophic breach of Ascension (arstechnica.com)
84.
An attacker’s blunder gave us a look into their operations (news.ycombinator.com)
85.
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations (news.ycombinator.com)
86.
6 browser-based attacks all security teams should be ready for in 2025 (bleepingcomputer.com)
87.
MATLAB dev says ransomware gang stole data of 10,000 people (bleepingcomputer.com)
88.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks (bleepingcomputer.com)
89.
Google discovered a new scam—and also fell victim to it (arstechnica.com)
90.
How attackers are still phishing "phishing-resistant" authentication (bleepingcomputer.com)
Today's top topics: phone chatgpt free audio android founders techcrunch billion author bars
View all today's topics →