Cybersecurity

Cybersecurity

Threats, defenses, and AI in security.

157 stories
15 sources
r/netsec ·18BleepingComputer ·15The Register ·15The Hacker News ·15Wired Security ·15
Cybersecurity·SANS ISC

SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)

SANS ISC — SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)

Read original ↗
60 stories
Law & PolicyRepo
trycompai/comp
AI Native platform to get companies compliant - Vanta & Drata Alternative
GitHub · Security·TypeScript·1,429 stars
CybersecurityRepo
reconmap/reconmap
Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, from reconnaissance throu
GitHub · Security·JavaScript·913 stars
CybersecurityRepo
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
GitHub · Security·Python·31,553 stars
TechnologyRepo
Infisical/infisical
Infisical is the open-source platform for secrets, certificates, and privileged access management.
GitHub · Security·TypeScript·25,403 stars
Law & PolicyRepo
intuitem/ciso-assistant-community
CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports 100+ global frameworks
GitHub · Security·Python·3,658 stars
CybersecurityRepo
stamparm/maltrail
Malicious traffic detection system
GitHub · Security·Python·8,325 stars
CybersecurityRepo
pglombardo/PasswordPusher
🔐 Securely share sensitive information with automatic expiration & deletion after a set number of views or duration. Track who, what and when with full audi
GitHub · Security·Ruby·2,901 stars
CybersecurityRepo
AI 10/10
eugene1g/agent-safehouse
Sandbox your local AI agents so they can read/write only what they need
GitHub · Security·Shell·1,275 stars
CybersecurityRepo
mthcht/awesome-lists
Awesome Security lists for SOC/CERT/CTI
GitHub · Security·YARA·1,278 stars
Finance & CryptoRepo
gmh5225/awesome-game-security
awesome game security [Welcome to PR]
GitHub · Security·Python·2,761 stars
Cybersecurity
Betterleaks, a new open-source secrets scanner to replace Gitleaks
A new open-source tool called Betterleaks can scan directories, files, and git repositories and identify valid secrets using default or customized
BleepingComputer·2m read
Cybersecurity
GlassWorm V2 analysis: Part 2. Infrastructure rotation and GitHub injection
Discussion on r/netsec: GlassWorm V2 analysis: Part 2. Infrastructure rotation and GitHub injection
r/netsec·2m read·1 pts
Technology
We audited authorization in 30 AI agent frameworks — 93% rely on unscoped API keys
Published a research report auditing how popular AI agent projects (OpenClaw, AutoGen, CrewAI, LangGraph, MetaGPT, AutoGPT, etc.) handle authorization. Key
r/netsec·3m read·1 pts·2 comments
Cybersecurity
Jury out on whether Americans approve or disapprove of datacenters
Most don't think they are good for the environment. Three-quarters of the American public have heard of datacenters, but they haven't quite made their minds up
The Register·2m read
Cybersecurity
Post AI Agent Hacked Amazon & McKinsey, I compiled a list of 5 situations where deploying agents can be catastrophic
Discussion on r/netsec: Post AI Agent Hacked Amazon & McKinsey, I compiled a list of 5 situations where deploying agents can be catastrophic
r/netsec·2m read·3 pts·3 comments
Cybersecurity
Loblaw Data Breach Impacts Customer Information
Personal information such as names, email addresses, and phone numbers was accessed by hackers. The post Loblaw Data Breach Impacts Customer Information appeare
SecurityWeek·2m read
Science
Those who 'circle back' and 'synergize' also tend to be crap at their jobs
Cornwell Uni researchers pivot to pluck low-hanging fruit to optimize bandwidth Workers who believe "leveraging cross-functional synergies" sounds profound may
The Register·3m read
Cybersecurity
CVE-2024-45163: Remote DoS in Mirai C2 – research writeup + what it led me to build
Discussion on r/netsec: CVE-2024-45163: Remote DoS in Mirai C2 – research writeup + what it led me to build
r/netsec·2m read·2 pts·2 comments
Cybersecurity
Quick question for people running CrowdStrike, Zscaler, Netskope or similar in production.
As these platforms add more AI-driven automation: autonomous triage, auto-response, AI-based policy changes, how are you currently keeping track of what these A
r/netsec·3m read·6 pts·2 comments
Cybersecurity
Analysis of 1,808 MCP servers: 66% had security findings, 427 critical (tool poisoning, toxic data flows, code execution)
Discussion on r/netsec: Analysis of 1,808 MCP servers: 66% had security findings, 427 critical (tool poisoning, toxic data flows, code execution
r/netsec·2m read·80 pts·7 comments
Cybersecurity
Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
Microsoft has released an out-of-band (OOB) update to fix a security vulnerabilities affecting Windows 11 Enterprise devices that receive hotpatch updates inste
BleepingComputer·2m read
AI 10/10
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning ab
The Hacker News·3m read
Finance & Crypto
AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain
BleepingComputer·2m read
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say repre
The Hacker News·3m read
Cybersecurity
Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
The vulnerability can be exploited remotely, without authentication, to circumvent existing authentication controls. The post Critical HPE AOS-CX Vulnerability
SecurityWeek·2m read
A Hacker Accidentally Broke Into the FBI’s Epstein Files
Plus: A porn-quitting app exposed the masturbation habits of hundreds of thousands of users, Russian
Wired Security·2m read
Cybersecurity
Inside the datacenter where the day starts with topping up cerebrospinal fluid
Biological computing is messy and gassy – It’s now cloudy, too At the start of the working day at Cortical Labs’ datacenter in Melbourne, Australia, technicians
The Register·3m read
Cybersecurity
I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
Discussion on r/netsec: I Found 39 Algolia Admin Keys Exposed Across Open Source Documentation Sites
r/netsec·2m read·15 pts·3 comments
Cybersecurity
AI 10/10
Claude charts a new course with charts, of course
Conversations with Anthropic's models may now be accompanied by interactive apps Seeing is believing, or so it was said up until AI required questioning everyth
The Register·2m read
Cybersecurity
Microsoft: Windows 11 users can't access C: drive on some Samsung PCs
Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users los
BleepingComputer·2m read
Technology
Phishing campaign abusing Google Cloud Storage redirectors to multiple scam pages
I’ve been analyzing a phishing campaign that abuses Google Cloud Storage (storage.googleapis.com) as a redirect layer to send victims to multiple scam pages hos
r/netsec·3m read·39 pts·10 comments
Gaming
FBI seeks victims of Steam games used to spread malware
The FBI is asking gamers who installed Steam titles containing malware to provide information as part of an ongoing investigation into eight malicious games upl
BleepingComputer·2m read
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, a
Dark Reading·2m read
Education
GitHub infuriates students by removing some models from free Copilot plan
Coding education may become a bit more challenging, but the economics lesson is free You don't get what you don't pay for! Microsoft's GitHub is dialing back on
The Register·2m read
Cybersecurity
AFRINIC accuses litigant of trying to ‘paralyse’ it
A 'web of litigation' The African Network Information Centre (AFRINIC) has accused one its members of trying to "paralyse" the
The Register·2m read
Cybersecurity
'Are you freaking crazy?' Bot harasses woman, gets led away by cops
An incident in Macau A 70-year old woman in China loudly shouted at a robot to leave her alone, but the bot instead stood its ground and did a “raise the roof”
The Register·2m read
The Data Gap: Why Nonprofit Cyber Incidents Go Underreported
Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of s
Dark Reading·2m read
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
A suspected China-based cyber espionage operation has targeted Southeast Asian military organization
The Hacker News·3m read
Cybersecurity
Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others
And then they send victims to the legit VPN download to hide their tracks A group of cybercriminals tracked as Storm-2561 is using fake enterprise VPN clients f
The Register·3m read
Cyberattackers Don't Care About Good Causes
Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems
Dark Reading·2m read
Cybersecurity
RegPwn - Windows LPE vulnerability (now fixed)
Discussion on r/netsec: RegPwn - Windows LPE vulnerability (now fixed)
r/netsec·1m read·10 pts·1 comments
Cybersecurity
Poland's nuclear research centre targeted by cyberattack
Poland's National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any
BleepingComputer·2m read
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instag
The Hacker News·3m read
Cybersecurity
Microsoft investigates classic Outlook sync and connection issues
​Microsoft is investigating several issues causing email synchronization and connection problems when using the classic Outlook desktop
BleepingComputer·2m read
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making
Dark Reading·2m read
Cybersecurity
CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
Discussion on r/netsec: CrackArmor: Critical AppArmor Flaws Enable Local Privilege Escalation to Root
r/netsec·2m read·72 pts·6 comments
Cybersecurity
After years of being stood up, ARM64 Linux users finally get Chrome date
Someone, somewhere, ticked a box on a build farm. The wait is over Chrome is finally coming to ARM64 Linux devices, years after it turned up on macOS and Window
The Register·2m read
Cybersecurity
Starbucks Data Breach Impacts Employees
Starbucks said the incident involved phishing attacks targeting an employee portal, affecting hundreds. The post Starbucks Data Breach Impacts Employees appeare
SecurityWeek·2m read
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in conne
The Hacker News·3m read
Cybersecurity
In Other News: N8n Flaw Exploited, Slopoly Malware, Interpol Cybercrime Crackdown
Other noteworthy stories that might have slipped under the radar: Telus Digital data breach, vulnerabilities in Linux AppArmor allow root privileges, US defense
SecurityWeek·3m read
Cybersecurity
From VMware to what’s next: Protecting data during hypervisor migration
Hypervisor migrations can introduce hidden risks that threaten data availability and recovery. Acronis explains why verified backups and cross-platform recovery
BleepingComputer·2m read
Cybersecurity
Watchdog boss calls Capita's £370M DWP win 'extraordinary' amid pension portal dumpster fire
PAC chair asks Cabinet Office if anyone bothered telling dept about the shambles before handing over the keys The chair of the UK Parliament's public spending w
The Register·3m read
Technology
Microsoft veteran Rajesh Jha prepares to retire, triggers yet another reorg
35-year staffer comes from time before company's cloud and Copilot obsessions Microsoft Executive Vice President (EVP) for Experiences and Devices, Rajesh Jha,
The Register·2m read
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
Microsoft has disclosed details of a credential theft campaign that employs fake virtual private net
The Hacker News·3m read
Cybersecurity
Police sinkholes 45,000 IP addresses in cybercrime crackdown
An international law enforcement action codenamed "Operation Synergia III" has sinkholed tens of thousands of IP addresses and seized servers linked to cybercri
BleepingComputer·2m read
Investigating a New Click-Fix Variant
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awa
The Hacker News·2m read
Cybersecurity
Fake enterprise VPN sites used to steal company credentials
A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting
BleepingComputer·2m read
Most Google Cloud Attacks Start With Bug Exploitation
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching
Dark Reading·2m read
Technology
AI 10/10
Azure startup credits don't apply to Claude via Azure AI Foundry, reader finds – after $1,600 charge
Gets bounced between Microsoft and Anthropic like a support ticket nobody wants to own Companies using credits bundled with Microsoft for Startups have found so
The Register·3m read
Cybersecurity
RAM is getting expensive, so squeeze the most from it
Zram versus zswap – two ways to get a quart into a pint pot Linux has two ways to do memory compression – zram and zswap – but you rarely hear about the second.
The Register·2m read
WokHei Digest
Workflow insights, delivered
Curated tips, tools, and tutorials for builders — twice a month, no spam.
Customize topics first