[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
ColdRiver Drops Fresh Malware on Targets
International Sting Takes Down SIM Box Criminal Network
Is Your Car a BYOD Risk? Researchers Demonstrate How
Flawed Vendor Guidance Exposes Enterprises to Avoidable Risk
New Microchip Tech Protects Vehicles from Laser Attacks
Self-Propagating GlassWorm Attacks VS Code Supply Chain
Cyber Academy Founder Champions Digital Safety for All
Microsoft Disrupts Ransomware Campaign Abusing Azure Certificates
AI Agent Security: Whose Responsibility Is It?
AI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
Ars Technica
NSO permanently barred from targeting WhatsApp users with Pegasus spyware
Nation-state hackers deliver malware from “bulletproof” blockchains
Ars Live recap: Is the AI bubble about to pop? Ed Zitron weighs in.
Thousands of customers imperiled after nation-state ransacks F5’s network
Anthropic’s Claude Haiku 4.5 matches May’s frontier model at fraction of cost
ChatGPT erotica coming soon with age verification, CEO says
Feds seize $15 billion from alleged forced labor scam built on “human suffering”
Nvidia sells tiny new computer that puts big AI on your desktop
OpenAI wants to stop ChatGPT from validating users’ political views
Hackers can steal 2FA codes and private messages from Android phones
CyberScoop
Apple and Google challenged by parents’ rights coalition on youth privacy protections
China’s spy agency accuses NSA of yearslong attack on the country’s timekeeping service
Judge forbids NSO Group from targeting WhatsApp users
Behind the struggle for control of the CVE program
Europol dismantles cybercrime network linked to $5.8M in financial losses
John Bolton indictment says suspected Iranian hackers accessed his emails, issued threats
North Korean operatives spotted using evasive techniques to steal data and cryptocurrency
Why the web-hosting industry needs a trust seal
PowerSchool hacker sentenced to 4 years in prison
CISA warns of imminent risk posed by thousands of F5 products in federal agencies
HITBSecNews
Found on VirusTotal: The world’s first UEFI bootkit for Linux
OpenAI is at war with its own Sora video testers following brief public leak
North Korean hackers posing as IT workers steal over $1B in cyberattack
WhatsApp: NSO Group Operates Pegasus Spyware for Customers
Korea extradites Russian, Vietnamese suspects linked to $16M ransomware scheme
CISA Director Jen Easterly, in Place Since 2021, to Step Down
Man sick of crashes sues Intel for allegedly hiding CPU defects
North Korean hackers target cryptocurrency with malware
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Youth of today say passwords are old news, passkeys are the future
ZDNet
How much RAM do you need in 2025? My expert advice for Windows and Mac users
Everyone thinks AI will transform their business - but only 13% are making it happen
50+ Windows keyboard shortcuts that effectively improved my work productivity
The 4K monitor that effectively changed how I work and consume content at the office
This $8 cleaning solution keeps my screens crystal clear (and seeing is believing)
Samsung offers free $100 deal to new Android XR headset users - how to redeem it now
I compared the best headphones from Sony and Bose - here's the ANC king right now
My 6 favorite Spotlight actions in MacOS Tahoe so far - and how to add your own
You can use Anthropic's popular Claude Code tool on the web now - how to get access
I saw the future of Windows PCs - and it may finally be time to ditch my MacBook
The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets
⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
BleepingComputer
DNS0.EU private DNS service shuts down over sustainability issues
Microsoft: October updates break USB input in Windows Recovery
Retail giant Muji halts online sales after ransomware attack on supplier
Over 75,000 WatchGuard security devices vulnerable to critical RCE
CISA: High-severity Windows SMB flaw now exploited in attacks
Self-spreading GlassWorm malware hits OpenVSX, VS Code registries
Microsoft fixes Windows Server Active Directory sync issues
Microsoft warns of Windows smart card auth issues after October updates
Find hidden malicious OAuth apps in Microsoft 365 using Cazadora
AWS outage crashes Amazon, Prime Video, Fortnite, Perplexity and more
Cybersecurity Dive
Top cybersecurity conferences to attend in 2026
Why security awareness training doesn’t work — and how to fix it
Federated security: Building resilient operating models in complex organizations
Fortune 500 companies designate specialist roles to bolster security operations teams
F5 supply chain hack endangers more than 600,000 internet-connected devices
Many IT leaders click phishing links, and some don’t report them
Auto sector faces historic cyber threats to business continuity
Nation-state hackers breached sensitive F5 systems, stole customer data
CISA’s latest cuts reignite concerns among Democratic lawmakers
Fortune 100 firms accelerate disclosures linked to AI, cybersecurity risk
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
UK calls up Armed Forces veterans for digital ID soft launch
Have I Been Pwned logs 17.6M victims in Prosper breach
Labor unions sue Trump administration over social media surveillance
Carmakers fear chip crunch as Dutch sanctions hit Nexperia
Vulnerability scores, huh, what are they good for? Almost nothing
Chinese cyberspies snoop on Russian IT biz in rare east-on-east attack
Locked out of your Gmail account? Google says phone a friend
Microsoft kills 9.9-rated ASP.NET Core bug – 'our highest ever' score
Senator presses Cisco over firewall flaws that burned US agency
Auction house Sotheby's finds its data on the block after cyberattack
VentureBeat
Agentic AI security breaches are coming: 7 ways to make sure it's not your firm
Cisco warns enterprises: Without tapping machine data, your AI strategy is incomplete
Microsoft launches 'Hey Copilot' voice assistant and autonomous agents for all Windows 11 PCs
Visa just launched a protocol to secure the AI shopping boom — here’s what it means for merchants
Weaponized AI can dismantle patches in 72 hours — but Ivanti's kernel defense can help
MCP stacks have a 92% exploit probability: How 10 plugins became enterprise security's biggest blind spot
Stopping breaches at machine speed demands agents, not alerts
SOC teams face 51-second breach reality—Manual response times are officially dead
Why identity-first security is the first defense against sophisticated AI-powered social engineering
AI sharpens threat detection — but could it dull human analyst skills?
TechCrunch
Amazon identifies the issue that broke much of the internet today, but is still working to restore services
Spyware maker NSO Group blocked from WhatsApp
Amazon’s Ring to partner with Flock, a network of AI cameras used by ICE, feds, and police
Cyber giant F5 Networks says government hackers had ‘long-term’ access to its systems, stole code and customer data
Satellites found exposing unencrypted data, including phone calls and some military comms
Homeland Security reassigns ‘hundreds’ of CISA cyber staffers to support Trump’s deportation crackdown
Spyware maker NSO Group confirms acquisition by US investors
Discord data breach affects at least 70,000 users
Italian businessman’s phone reportedly targeted with Paragon spyware
‘Dozens’ of organizations had data stolen in Oracle-linked hacks
Network World Security
Riverbed tackles AI data bottleneck with new Oracle-based service
Wi-Fi 8 is coming — and it’s going to make AI a lot faster
AI certifications outpace non-certified AI skills in pay growth
AWS DNS error hits DynamoDB, causing problems for multiple services and customers
Network jobs watch: Hiring, skills and certification trends
Cisco: Latest news and insights
Nvidia: Latest news and insights
Nvidia, Infineon partner for AI data center power overhaul
BlackRock’s $40B data center deal opens a new infrastructure battle for CIOs
Meta details cutting-edge networking technologies for AI infrastructure
Help Net Security
Agentic AI security: Building the next generation of access controls
When everything’s connected, everything’s at risk
Your smart building isn’t so smart without security
AI’s split personality: Solving crimes while helping conceal them
10 data security companies to watch in 2026
Cybersecurity jobs available right now: October 21, 2025
Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
China-linked Salt Typhoon hackers attempt to infiltrate European telco
Jamf adds AI forensics to help organizations detect and respond to mobile threats
Most AI privacy research looks the wrong way
InfoSecurity Magazine
Lumma Stealer Developers Doxxed in Underground Rival Cybercrime Campaign
Experian Fined €2.7m For GDPR Breach in Netherlands
AI-Driven Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals
Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack
Criminal SIM Card Supply Network Busted by Europol
Microsoft Revokes 200+ Fake Certificates Used in Teams Malware Attack
Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
North Korean Hackers Use EtherHiding to Steal Crypto
Prosper Data Breach Exposes 17 Million Customers' Personal Info
Security Teams Must Deploy Anti-Infostealer Defenses Now
© 2025 RiskDiscovery | Sponsored by:
Deception Logic