sumi.news
Search
Following
Sign in
← Back to news
Computer Security
RSS Feed
sumi.news
Computer Security
Follow
Latest
Thu Mar 20
Troy Hunt Gets Phished
2w
Rafts of Security Bugs Could Rain Out Solar Grids
2w
d
Microsoft Boosts Email Sender Rules for Outlook
2w
d
China-Linked Threat Group Exploits Ivanti Bug
2w
d
Disclosure Drama Clouds CrushFTP Vulnerability Exploitation
2w
d
Counterfeit Phones Carrying Hidden Revamped Triada Malware
2w
d
Runtime Ventures Launches New Fund for Seed, Pre-Seed Startups
2w
d
Social Engineering Just Got Smarter
2w
d
Emerging Risks Require IT/OT Collaboration to Secure Physical Systems
2w
d
Web 3.0 Requires Data Integrity
2w
Google Quick Share Bug Bypasses Allow Zero-Click File Transfer
2w
d
Israel Enters 'Stage 3' of Cyber Wars With Iran Proxies
2w
d
DPRK 'IT Workers' Pivot to Europe for Employment Scams
2w
d
SolarWinds Adds Incident Management Tool From Squadcast
2w
d
In Salt Typhoon's Wake, Congress Mulls Potential Options
2w
d
New PCI DSS Rules Say Merchants on Hook for Compliance, Not Providers
2w
d
How an Interdiction Mindset Can Help Win War on Cyberattacks
2w
d
Gootloader Malware Resurfaces in Google Ads for Legal Docs
2w
d
Rational Astrologies and Security
2w
Malaysian Airport's Cyber Disruption a Warning for Asia
2w
d
Google Brings End-to-End Encryption to Gmail
2w
d
Visibility, Monitoring Key to Enterprise Endpoint Strategy
2w
d
Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks
2w
d
As CISA Downsizes, Where Can Enterprises Get Support?
2w
d
Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
2w
d
Check Point Disputes Hacker's Breach Claims
2w
d
Google 'ImageRunner' Bug Enabled Privilege Escalation
2w
d
FDA's Critical Role in Keeping Medical Devices Secure
2w
d
Lazarus APT Jumps on ClickFix Bandwagon in Recent Attacks
2w
d
Cell Phone OPSEC for Border Crossings
2w
Oracle Cloud Users Urged to Take Action
2w
d
CoffeeLoader Malware Is Stacked With Vicious Evasion Tricks
2w
d
Top 10 Most-Used RDP Passwords Are Not Complex Enough
2w
d
DoJ Seizes Over $8M From Sprawling Pig Butchering Scheme
2w
d
CISA Warns of Resurge Malware Connected to Ivanti Vuln
2w
d
Trend Micro Open Sources AI Tool Cybertron
2w
d
Bridging the Gap Between the CISO & the Board of Directors
2w
d
Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
2w
d
The Signal Chat Leak and the NSA
2w
How Each Pillar of the 1st Amendment is Under Attack
2w
K
GSA Plans FedRAMP Revamp
3w
d
Friday Squid Blogging: Squid Werewolf Hacking Group
3w
Evilginx Tool (Still) Bypasses MFA
3w
d
Oracle Still Denies Breach as Researchers Persist
3w
d
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market
3w
d
Traditional Data Loss Prevention Solutions Are Not Working for Most Organizations
3w
d
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
3w
d
Malaysia PM Refuses to Pay $10M Ransomware Demand
3w
d
Concord Orthopaedic Notifies Individuals of Security Incident
3w
d
Navigating Cyber-Risks and New Defenses
3w
d
More →