[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
[Dark Reading Virtual Event] Cybersecurity Outlook 2026
Fortinet Woes Continue With Another WAF Zero-Day Flaw
Do National Data Laws Carry Cyber-Risks for Large Orgs?
The AI Attack Surface: How Agents Raise the Cyber Stakes
Cloudflare Blames Outage on Internal Configuration Error
Critical Railway Braking Systems Open to Tampering
Cloud Break: IoT Devices Open to Silent Takeover Via Firewalls
Can a Global, Decentralized System Save CVE Data?
Iran-Nexus Threat Actor UNC1549 Takes Aim at Aerospace
How We Ditched the SaaS Status Quo for Time-Series Telemetry
Ars Technica
Critics scoff after Microsoft warns AI feature can infect machines and pilfer data
Tech giants pour billions into Anthropic as circular AI investments roll on
Bonkers Bitcoin heist: 5-star hotels, cash-filled envelopes, vanishing funds
Google CEO: If an AI bubble pops, no one is getting out clean
5 plead guilty to laptop farm and ID theft scheme to land North Koreans US IT jobs
Oracle hit hard in Wall Street’s tech sell-off over its huge AI bet
Forget AGI—Sam Altman celebrates ChatGPT finally following em dash formatting rules
Researchers question Anthropic claim that AI-assisted attack was 90% autonomous
OpenAI walks a tricky tightrope with GPT-5.1’s eight new personalities
Meta’s star AI scientist Yann LeCun plans to leave for own startup
CyberScoop
Amazon warns of global rise in specialized cyber-enabled kinetic targeting
Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says
Hackers turn open-source AI framework into global cryptojacking operation
Completed draft of cyber strategy emphasizes imposing costs, industry partnership
The realities of CISO burnout and exhaustion
Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage
Dozens of groups call for governments to protect encryption
DOJ lauds series of gains against North Korean IT worker scheme, crypto thefts
China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work
Google, researchers see signs that Lighthouse text scammers disrupted after lawsuit
HITBSecNews
Found on VirusTotal: The world’s first UEFI bootkit for Linux
OpenAI is at war with its own Sora video testers following brief public leak
North Korean hackers posing as IT workers steal over $1B in cyberattack
WhatsApp: NSO Group Operates Pegasus Spyware for Customers
Korea extradites Russian, Vietnamese suspects linked to $16M ransomware scheme
CISA Director Jen Easterly, in Place Since 2021, to Step Down
Man sick of crashes sues Intel for allegedly hiding CPU defects
North Korean hackers target cryptocurrency with malware
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Youth of today say passwords are old news, passkeys are the future
ZDNet
Forget Dyson: This stick vacuum surpassed a skeptic's wildest expectations - and it's $250 off
I refused to believe this coin-sized gadget was a storage drive, until I tried it for myself
Yes, there exists $200 Android tablets that are actually worth the money - this one proves it
The best tablets of 2025: Lab-tested recommendations
OpenAI's Codex Max solves one of my biggest AI coding annoyances - and it's a lot faster
My favorite gaming laptop of 2025 is $1,150 off in this pop-up early Black Friday deal
Your Roku TV has 100+ free live channels - here's how to watch them (and what's available)
Amazon is selling a $430 refurbished MacBook Pro that was once $2,000 - here's what you get
Microsoft's new recovery tools rebuild Windows when it glitches – here's how
ChatGPT for Teachers rolls out, and it's free - here's what makes it different
The Hacker News
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
BleepingComputer
Sneaky2FA PhaaS kit now uses redteamers' Browser-in-the-Browser attack
Google's Gemini 3 is living up to the hype and creating games in one shot
Google Search is now using AI to create interactive UI to answer your questions
W3 Total Cache WordPress plugin vulnerable to PHP command injection
Russian bulletproof hosting provider sanctioned over ransomware ties
New WrtHug campaign hijacks thousands of end-of-life ASUS routers
The hidden risks in your DevOps stack data—and how to address them
CISA gives govt agencies 7 days to patch new Fortinet flaw
Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters
California man admits to laundering crypto stolen in $230M heist
Cybersecurity Dive
FCC plan to scrap telecom cyber rules draws congressional backlash
US, allies sanction Russian bulletproof hosting firm
Record-breaking DDoS attack against Microsoft Azure mitigated
Trump’s cyber strategy will emphasize adversary deterrence, industry partnerships
Hackers increasingly target operational technology, with manufacturing sector bearing the brunt
Jaguar Land Rover reports major earnings impact from cyberattack
CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
US chips away at North Korean IT worker fraud
Critical vulnerability in Fortinet FortiWeb is under exploitation
CISO pay is on the rise, even as security budgets tighten
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Fortinet 'fesses up to second 0-day within a week
Amazon security boss: Hostile countries use cyber targeting for physical military strikes
Researchers claim 'largest leak ever' after uncovering WhatsApp enumeration flaw
Tens of thousands more ASUS routers pwned by suspected, evolving China operation
Selling technology investments to the board: a strategic guide for CISOs and CIOs
China recruiting spies in the UK with fake headhunters and ‘sites like LinkedIn’
Self-replicating botnet attacks Ray clusters
FCC looks to torch Biden-era cyber rules sparked by Salt Typhoon mess
Take fight to the enemy, US cyber boss says
Google Chrome bug exploited as an 0-day - patch now or risk full system compromise
VentureBeat
For AI to succeed in the SOC, CISOs need to remove legacy walls now
Human-centric IAM is failing: Agentic AI requires a new identity control plane
How Anthropic's AI was jailbroken to become a weapon
Forrester: Gen AI is a chaos agent, models are wrong 60% of the time
How Anthropic's Claude cuts SOC investigation time from 5 hours to 7 minutes
CrowdStrike & Nvidia's open source AI gives enterprises the edge against machine-speed attacks
Meet Aardvark, OpenAI’s security agent for code analysis and patching
TechCrunch
How the classic anime ‘Ghost in the Shell’ predicted the future of cybersecurity 30 years ago
US, UK, and Australia sanction Russian ‘bulletproof’ web host used in ransomware attacks
Security startup Guardio nabs $80M from ION Crossover Partners
DoorDash confirms data breach affecting users’ phone numbers and physical addresses
MCP AI agent security startup Runlayer launches with 8 unicorns, $11M from Khosla’s Keith Rabois and Felicis
Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’
Police take down three cybercrime operations in latest round of ‘whack-a-mole’
CISA warns federal agencies to patch flawed Cisco firewalls amid ‘active exploitation’ across the US government
Cybersecurity firm Deepwatch lays off dozens, citing move to ‘accelerate’ AI investment
Network World Security
Meter ups its NaaS portfolio with new hardware, autonomous operations
AWS boosts its long-distance cloud connections with custom DWDM transponder
How a bot management file push crippled Cloudflare’s global network
Singapore makes the leap to Wi-Fi 7 to boost fan experience
The latest Microsoft AI deal highlights tight links in AI supply chain
Dell targets enterprise AI with switches, servers, reinforced Nvidia partnership
Kentik bolsters network observability platform with autonomous investigation
IBM readies commercially valuable quantum technology
Microsoft bets on agentic AI for cloud ops, but analysts doubt the pitch
2025 global network outage report and internet health check
Help Net Security
Veeam Data Platform v13 strengthens AI-driven analysis
7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)
Immersive unveils Dynamic Threat Range to transform cyber readiness testing
Strata introduces AI Identity Gateway to secure and govern agentic systems
Exam prep hacked: Study tips and tricks that really work
BigID uses agentic AI to automate privacy and compliance mapping
Black Kite launches AI Agent to automate third-party risk work
Stealth-patched FortiWeb vulnerability under active exploitation (CVE-2025-58034)
Threat group reroutes software updates through hacked network gear
Sophos adds Intelix threat intelligence to Microsoft Security and 365 Copilot
InfoSecurity Magazine
Europol Operation Disrupts $55m in Cryptocurrency For Piracy
Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime
PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns
China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers
Half of Ransomware Access Due to Hijacked VPN Credentials
CISA 2015 Receives Extension, Offering Brief Relief for Cyber Information Sharing
New npm Malware Campaign Redirects Victims to Crypto Sites
AI-Enhanced Tuoni Framework Targets Major US Real Estate Firm
DoorDash Confirms Data Breach Exposing Customer Personal Information
GenAI and Deepfakes Drive Digital Forgeries and Biometric Fraud
© 2025 RiskDiscovery | Sponsored by:
Deception Logic