sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Computer Security RSS Feed

  • sumi.news
  • Computer Security

  • Latest
  • Tue Mar 31

TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack

7h
SecurityS

Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug

7h
SecurityS

Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber

9h
SecurityS

Fast16 Malware

17h

Claude Mythos Fears Startle Japan's Financial Services Sector

1d
SecurityS

Reverse Engineering With AI Unearths High-Severity GitHub Bug

1d
SecurityS

AI Finds 38 Security Flaws in Electronic Health Record Platform

1d
SecurityS

Oracle Red Bull Racing Team Revs Up Automation to Boost Security

1d
SecurityS

Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error

1d
SecurityS

Lotus Wiper Attack Targets Venezuelan Energy Firms, Utilities

1d
SecurityS

Claude Mythos Has Found 271 Zero-Days in Firefox

1d

BlueNoroff Uses Fake Zoom Calls to Turn Victims Into Attack Lures

2d
SecurityS

NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later

2d
SecurityS

Feuding Ransomware Groups Leak Each Other's Data

2d
SecurityS

Vidar Rises to Top of Chaotic Infostealer Market

2d
SecurityS

Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain

2d
SecurityS

What Anthropic’s Mythos Means for the Future of Cybersecurity

2d

UNC6692 Combines Social Engineering, Malware, Cloud Abuse

3d
SecurityS

Unpatched 'PhantomRPC' Flaw in Windows Enables Privilege Escalation

3d
SecurityS

20-Year-Old Malware Rewrites History of Cyber Sabotage

3d
SecurityS

Parsing Agentic Offensive Security's Existential Threat

3d
SecurityS

Medieval Encrypted Letter Decoded

3d

Helping Romance Scam Victims Requires a Proactive, Empathic Approach

6d
SecurityS

Friday Squid Blogging: How Squid Survived Extinction Events

6d

US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

6d
SecurityS

Glasswing Secured the Code. The Rest of Your Stack Is Still on You

6d
SecurityS

AI Phishing Is No. 1 With a Bullet for Cyberattackers

6d
SecurityS

North Korea's Lazarus Targets macOS Users via ClickFix

6d
SecurityS

Hiding Bluetooth Trackers in Mail

6d

Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

1w
SecurityS

Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia

1w
SecurityS

China-Backed Hackers Are Industrializing Botnets

1w
SecurityS

Bad Memories Still Haunt AI Agents

1w
SecurityS

FBI Extracts Deleted Signal Messages from iPhone Notification Database

1w

'Zealot' Shows What AI's Capable of in Staged Cloud Attack

1w
SecurityS

Africa Relinquishes Cyberattack Lead to Latin America — For Now

1w
SecurityS

'The Gentlemen' Rapidly Rises to Ransomware Prominence

1w
SecurityS

DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'

1w
SecurityS

Electricity Is a Growing Area of Cyber-Risk

1w
SecurityS

Electricity Is a Growing Area of Cyber Risk

1w
SecurityS

ICE Uses Graphite Spyware

1w

Ransomware Negotiator Pleads Guilty to BlackCat Scheme

1w
SecurityS

Exploits Turn Windows Defender Into Attacker Tool

1w
SecurityS

Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk

1w
SecurityS

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

1w
K

Chinese APT Targets Indian Banks, Korean Policy Circles

1w
SecurityS

Mexican Surveillance Company

1w

Google Fixes Critical RCE Flaw in AI-Based 'Antigravity' Tool

1w
SecurityS

Vercel Employee's AI Tool Access Led to Data Breach

1w
SecurityS

Serial-to-IP Devices Hide Thousands of Old & New Bugs

1w
SecurityS
More →

Entries updated Apr 30, 2026 08:38:26 PM PDT

Questions? Suggestions? alex@sumi.news