sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Computer Security RSS Feed

  • sumi.news
  • Computer Security

  • Latest
  • Sun Jul 27

African Law Enforcement Agencies Nab Cybercrime Syndicates

22m
d

1M Farmers Insurance Customers' Data Compromised

10h
d

Citrix Gear Under Active Attack Again With Another Zero-Day

10h
d

Malicious Scanning Waves Slam Remote Desktop Services

10h
d

Data I/O Becomes Latest Ransomware Attack Victim

10h
d

Hook Android Trojan Now Delivers Ransomware-Style Attacks

12h
d

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’

16h
K

The Hidden Risk of Consumer Devices in the Hybrid Workforce

16h
d

Encryption Backdoor in Military/Police Radios

19h

Hackers Lay in Wait, Then Knocked Out Iran Ship Comms

1d
d

FTC Chair Tells Tech Giants to Hold the Line on Encryption

1d
d

ClickFix Attack Tricks AI Summaries Into Pushing Malware

1d
d

Fast-Spreading, Complex Phishing Campaign Installs RATs

1d
d

Securing the Cloud in an Age of Escalating Cyber Threats

1d
d

Poor Password Choices

1d

Friday Squid Blogging: Bobtail Squid

4d

Silk Typhoon Attacks North American Orgs in the Cloud

4d
d

ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination

4d
d

Apple Intelligence Is Picking Up More User Data Than Expected, Researcher Finds

4d
d

I’m Spending the Year at the Munk School

4d

Interpol Arrests Over 1K Cybercriminals in 'Operation Serengeti 2.0'

4d
d

Apple Patches Zero-Day Flaw Used in 'Sophisticated' Attack

4d
d

The Growing Challenge of AI Agent and NHI Management

4d
d

Insurers May Limit Payments in Cases of Unpatched CVEs

4d
d

Do Claude Code Security Reviews Pass the Vibe Check?

4d
d

Personal Liability, Security Become Bigger Issues for CISOs

4d
d

AI Agents Need Data Integrity

4d

Scattered Spider Member Sentenced to a Decade in Prison

5d
d

Easy ChatGPT Downgrade Attack Undermines GPT-5 Security

5d
d

How Architectural Controls Can Help Fill the AI Security Gap

5d
d

Hackers Abuse VPS Infrastructure for Stealth, Speed

5d
d

K-12 School Incident Response Plans Fall Short

5d
d

Prepping the Front Line for MFA Social Engineering Attacks

5d
d

Tailing Hackers, Columbia University Uses Logging to Improve Security

5d
d

DARPA: Closing the Open Source Security Gap With AI

5d
d

Jim Sanborn Is Auctioning Off the Solution to Part Four of the Kryptos Sculpture

5d

Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail

6d
d

SIM-Swapper, Scattered Spider Hacker Gets 10 Years

6d
K

DPRK, China Suspected in South Korean Embassy Attacks

6d
d

Microsoft Lays Out Its Quantum-Safe Plans

6d
d

Fake Employees Pose Real Security Risks

6d
d

Critical SAP Vulns Under Exploitation in 'One-Two Punch' Attack

6d
d

System Shocks? EV Smart Charging Tech Poses Cyber-Risks

6d
d

How Warlock Ransomware Targets Vulnerable SharePoint Servers

6d
d

Cybercriminals Abuse Vibe Coding Service to Create Malicious Sites

6d
d

Why Video Game Anti-Cheat Systems Are a Cybersecurity Goldmine

6d
d

FBI, Cisco Warn of Russian Attacks on 7-Year-Old Flaw

6d
d

How Outer Space Became the Next Big Attack Surface

6d
d

Incode Acquires AuthenticID to Enhance AI-Driven Identity Verification

6d
d

Tree of AST: A Bug-Hunting Framework Powered by LLMs

6d
d
More →

Entries updated Aug 26, 2025 10:35:27 PM PDT

Questions? Suggestions? alex@sumi.news