sumi.news
Search
Following
Sign in
← Back to news
Computer Security
RSS Feed
sumi.news
Computer Security
Follow
Latest
Sun Apr 13
When Threat Actors Behave Like Managed Service Providers
1w
d
Microsoft Readies Administrator Protection Option for Windows 11
1w
d
Putin's Cyberattacks on Ukraine Rise 70%, With Little Effect
1w
d
Cisco Boosts XDR Platform, Splunk With Agentic AI
1w
d
Billbug Expands Cyber-Espionage Campaign in Southeast Asia
1w
d
Alleged ‘Scattered Spider’ Member Extradited to U.S.
1w
K
Prolific RansomHub Operation Goes Dark
1w
d
Former CISA Head Slams Trump Admin Over 'Loyalty Mandate'
1w
d
Adversaries Are Toying With US Networks & DC Is Short on Answers
1w
d
TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack
2w
d
Debunking Security 'Myths' to Address Common Gaps
2w
d
Phishers Take Advantage of Iberian Blackout Before It's Even Over
2w
d
DARPA Highlights Critical Infrastructure Security Challenges
2w
d
WhatsApp Case Against NSO Group Progressing
2w
Many Fuel Tank Monitoring Systems Vulnerable to Disruption
2w
d
From Mission-Centric to People-Centric: Competitive Leadership in Cyber
2w
d
Hacking in Space: Not as Tough as You Might Think
2w
d
US Critical Infrastructure Still Struggles With OT Security
2w
d
DHS Boss Noem Vows to Get CISA Back 'On Mission'
2w
d
Risks of Using AI Models Developed by Competing Nations
2w
d
Windows Backdoor Targets Members of Exiled Uyghur Community
2w
d
NVIDIA's New AI Security Offering Protects Against Software Landmines
2w
d
Applying Security Engineering to Prompt Injection Security
2w
Vulnerability Exploitation Is Shifting in 2024-25
2w
d
SAP NetWeaver Visual Composer Flaw Under Active Exploitation
2w
d
Windscribe Acquitted on Charges of Not Collecting Users’ Data
2w
AI, Automation, and Dark Web Fuel Evolving Threat Landscape
2w
d
Forget the Stack; Focus on Control
2w
d
DoJ Data Security Program Highlights Data-Sharing Challenges
2w
d
Friday Squid Blogging: Squid Facts on Your Phone
2w
Mobile Applications: A Cesspool of Security Issues
2w
d
How Organizations Can Leverage Cyber Insurance Effectively
2w
d
Vehicles Face 45% More Attacks, 4 Times More Hackers
2w
d
Cryptocurrency Thefts Get Physical
2w
[Virtual Event] Anatomy of a Data Breach: And what to do if it happens to you
2w
d
'SessionShark' ToolKit Evades Microsoft Office 365 MFA
2w
d
'Digital Twins' Bring Simulated Security to the Real World
2w
d
Max-Severity Commvault Bug Alarms Researchers
2w
d
New Linux Rootkit
2w
NFC-Powered Android Malware Enables Instant Cash-Outs
2w
d
Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers
2w
d
Phishing Kit Darcula Gets Lethal AI Upgrade
2w
d
FBI: Cybercrime Losses Rocket to $16.6B in 2024
2w
d
Navigating Regulatory Shifts & AI Risks
2w
d
'Industrial-Scale' Asian Scam Centers Expand Globally
2w
d
Microsoft Claims Steady Progress Revamping Security Culture
2w
d
Ransomware Gangs Innovate With New Affiliate Models
2w
d
DOGE Worker’s Code Supports NLRB Whistleblower
3w
K
Attackers Capitalize on Mistakes to Target Schools
3w
d
Popular British Retailer Marks & Spencer Addresses 'Cyber Incident'
3w
d
More →