GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
61.
Elon Musk is on a racist posting spree again
(theverge.com)
2025-12-03 | by Adi Robertson |
related products
| tags:
immigrant
,
immigrants
,
musk
62.
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
(darkreading.com)
2025-12-02 |
related products
| tags:
actors
,
actors internet
,
helping
63.
SmartTube YouTube App For Android TV Breached To Push Malicious Update
(slashdot.org)
2025-12-02 |
related products
| tags:
android
,
compromised
,
developer
64.
Why The Best Business Ideas Come From the Voices You're Ignoring
(feeds.feedburner.com)
2025-12-02 |
related products
| tags:
anomalies
,
expertise
,
innovation
65.
ShadyPanda browser extensions amass 4.3M installs in malicious campaign
(bleepingcomputer.com)
2025-12-01 |
related products
| tags:
edge
,
extension
,
extensions
66.
GreyNoise launches free scanner to check if you're part of a botnet
(bleepingcomputer.com)
2025-11-27 |
related products
| tags:
activity
,
devices
,
greynoise
67.
How AI Is Transforming Fraud Detection in Financial Transactions
(computer.org)
2025-11-24 |
related products
| tags:
ai models
,
anomalies preventing
,
detection
68.
Google exposes BadAudio malware used in APT24 espionage campaigns
(bleepingcomputer.com)
2025-11-20 |
related products
| tags:
badaudio
,
google
,
gtig
69.
GlobalProtect VPN portals probed with 2.3 million scan sessions
(bleepingcomputer.com)
2025-11-20 |
related products
| tags:
activity
,
alto
,
alto networks
70.
W3 Total Cache WordPress plugin vulnerable to PHP command injection
(bleepingcomputer.com)
2025-11-19 |
related products
| tags:
cache
,
exploit
,
malicious
71.
AI's scary new trick: Conducting cyberattacks instead of just helping out
(zdnet.com)
2025-11-18 | by Charlie Osborne |
related products
| tags:
anthropic
,
attack
,
claude
72.
Cursor Issue Paves Way for Credential-Stealing Attacks
(darkreading.com)
2025-11-17 |
related products
| tags:
ai powered
,
allows
,
allows malicious
73.
150,000 Packages Flood NPM Registry in Token Farming Campaign
(darkreading.com)
2025-11-14 |
related products
| tags:
attack
,
attack led
,
led tidal
74.
AI doesn't just assist cyberattacks anymore - now it can carry them out
(zdnet.com)
2025-11-14 | by Charlie Osborne |
related products
| tags:
anthropic
,
attack
,
claude
75.
Google says group behind E-ZPass, USPS text scam has been 'shut down' after suit
(cnbc.com)
2025-11-13 | by Jaures Yip |
related products
| tags:
germany
,
google
,
group
76.
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
(arstechnica.com)
2025-11-07 |
related products
| tags:
attack
,
files
,
image
77.
Malicious NuGet packages drop disruptive 'time bombs'
(bleepingcomputer.com)
2025-11-07 |
related products
| tags:
code
,
malicious
,
operations
78.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
2025-11-06 |
related products
| tags:
attackers
,
code
,
compromised
79.
Google spots malware in the wild that morphs mid-attack, thanks to AI
(zdnet.com)
2025-11-06 | by Charlie Osborne |
related products
| tags:
code
,
generate
,
google
80.
Gootloader malware is back with new tricks after 7-month break
(bleepingcomputer.com)
2025-11-05 |
related products
| tags:
archive
,
gootloader
,
malicious
81.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
2025-11-04 |
related products
| tags:
aware
,
browser
,
browsers
82.
Fake Solidity VSCode extension on Open VSX backdoors developers
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
command
,
ethereum
,
malicious
83.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
extensions
,
malicious
,
open
84.
Show HN: I built a tech news aggregator that works the way my brain does
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
2025
,
hrs
,
october
85.
The security paradox of local LLMs
(news.ycombinator.com)
2025-10-31 | by Jacek Migdal |
related products
| tags:
code
,
local
,
malicious
86.
CISA: High-severity Windows SMB flaw now exploited in attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
2025
,
cisa
,
malicious
87.
Malicious crypto-stealing VSCode extensions resurface on OpenVSX
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
koi
,
malicious
,
security
88.
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
(wired.com)
2025-10-31 | by Dan Goodin |
related products
| tags:
app
,
attack
,
gpu
89.
Hackers can steal 2FA codes and private messages from Android phones
(arstechnica.com)
2025-10-31 |
related products
| tags:
android
,
app
,
attack
90.
Researchers find just 250 malicious documents can leave LLMs vulnerable to backdoors
(engadget.com)
2025-10-31 |
related products
| tags:
data
,
llm
,
malicious
‹ prev
1
2
3
4
5
next ›
Today's top topics:
google
apple
rust
android
phone
meta
amazon
openai
iphone
camera
View all today's topics →