GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
1.
Multiple ChatGPT Security Bugs Allow Rampant Data Theft
(darkreading.com)
2025-11-06 |
related products
| tags:
actions
,
arbitrary
,
arbitrary prompts
2.
Critical Cisco UCCX flaw lets attackers run commands as root
(bleepingcomputer.com)
2025-11-06 |
related products
| tags:
arbitrary
,
attackers
,
cisco
3.
APT 'Bronze Butler' Exploits Zero-Day to Root Japan Orgs
(darkreading.com)
2025-11-06 |
related products
| tags:
allowed
,
allowed chinese
,
attackers
4.
Critical Site Takeover Flaw Affects 400K WordPress Sites
(darkreading.com)
2025-11-05 |
related products
| tags:
account
,
account website
,
allows
5.
Europe Sees Increase in Ransomware, Extortion Attacks
(darkreading.com)
2025-11-04 |
related products
| tags:
ai enhanced
,
attackers
,
attackers leverage
6.
Critical vulnerability in AMD Zen 5 CPUs could make encryption keys predictable
(techspot.com)
2025-11-04 |
related products
| tags:
allow
,
allow local
,
amd sb
7.
Critical security vulnerability in AMD Zen 5 CPUs could make encryption keys predictable
(techspot.com)
2025-11-04 |
related products
| tags:
allow
,
allow local
,
amd sb
8.
On the Road Again: Hackers Hijack Physical Cargo Freight
(darkreading.com)
2025-11-03 |
related products
| tags:
actually
,
actually steal
,
attackers
9.
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
attackers
,
bronze butler
,
endpoint
10.
'TruffleNet' Attack Wields Stolen Credentials Against AWS
(darkreading.com)
2025-11-03 |
related products
| tags:
accounts
,
accounts using
,
activities
11.
Why UUIDs won't protect your secrets
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attacker
,
random
12.
Microsoft warns of new “Payroll Pirate” scam stealing employees’ direct deposits
(arstechnica.com)
2025-10-31 |
related products
| tags:
account
,
accounts
,
attackers
13.
Why attackers are moving beyond email-based phishing attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
apps
,
attacker
,
email
14.
How weak passwords and other failings led to catastrophic breach of Ascension
(arstechnica.com)
2025-10-31 |
related products
| tags:
ascension
,
attackers
,
contractor
15.
An attacker’s blunder gave us a look into their operations
(news.ycombinator.com)
2025-10-31 | by Jamie Levy |
related products
| tags:
actor
,
attacker
,
figure
16.
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
(news.ycombinator.com)
2025-10-31 | by Jamie Levy |
related products
| tags:
actor
,
attacker
,
figure
17.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
browser
,
malicious
18.
MATLAB dev says ransomware gang stole data of 10,000 people
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
breach
,
gang
19.
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
file
,
phishing
20.
Google discovered a new scam—and also fell victim to it
(arstechnica.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
campaign
21.
How attackers are still phishing "phishing-resistant" authentication
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
access
,
attacker
,
attacks
22.
Google spoofed via DKIM replay attack: A technical breakdown
(news.ycombinator.com)
2025-10-31 | by Gerasim Hovhannisyan |
related products
| tags:
attacker
,
com
,
dkim
23.
Shattering the rotation illusion: The attacker view and AWSKeyLockdown (2024)
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
aws
24.
Shattering the Rotation Illusion: The Attacker View & AWSKeyLockdown
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
access
,
attackers
,
aws
25.
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
(news.ycombinator.com)
2025-10-31 | by Maryam Motallebighomi |
related products
| tags:
attacker
,
attacks
,
bike
26.
Employee gets $920 for credentials used in $140 million bank heist
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
brazilian
,
company
27.
PSA: If you have a Brother printer, change the password now
(9to5mac.com)
2025-10-31 | by Ben Lovejoy |
related products
| tags:
access
,
attacker
,
brother
28.
Alleged Verizon data breach sees 61M customer records offered for sale
(9to5mac.com)
2025-10-31 | by Ben Lovejoy |
related products
| tags:
address
,
attackers
,
data
29.
Brother printer bug in 689 models exposes default admin passwords
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
2024
,
attacker
,
cve
30.
New Linux udisks flaw lets attackers get root on major Linux distros
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
attackers
,
gain
,
linux
1
2
next ›
Today's top topics:
apple
google
camera
battery
china
apps
phone
code
galaxy
android
View all today's topics →