sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Computer Security RSS Feed

  • sumi.news
  • Computer Security

  • Latest
  • Sun Apr 13

When Threat Actors Behave Like Managed Service Providers

1w
d

Microsoft Readies Administrator Protection Option for Windows 11

1w
d

Putin's Cyberattacks on Ukraine Rise 70%, With Little Effect

1w
d

Cisco Boosts XDR Platform, Splunk With Agentic AI

1w
d

Billbug Expands Cyber-Espionage Campaign in Southeast Asia

1w
d

Alleged ‘Scattered Spider’ Member Extradited to U.S.

1w
K

Prolific RansomHub Operation Goes Dark

1w
d

Former CISA Head Slams Trump Admin Over 'Loyalty Mandate'

1w
d

Adversaries Are Toying With US Networks & DC Is Short on Answers

1w
d

TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack

2w
d

Debunking Security 'Myths' to Address Common Gaps

2w
d

Phishers Take Advantage of Iberian Blackout Before It's Even Over

2w
d

DARPA Highlights Critical Infrastructure Security Challenges

2w
d

WhatsApp Case Against NSO Group Progressing

2w

Many Fuel Tank Monitoring Systems Vulnerable to Disruption

2w
d

From Mission-Centric to People-Centric: Competitive Leadership in Cyber

2w
d

Hacking in Space: Not as Tough as You Might Think

2w
d

US Critical Infrastructure Still Struggles With OT Security

2w
d

DHS Boss Noem Vows to Get CISA Back 'On Mission'

2w
d

Risks of Using AI Models Developed by Competing Nations

2w
d

Windows Backdoor Targets Members of Exiled Uyghur Community

2w
d

NVIDIA's New AI Security Offering Protects Against Software Landmines

2w
d

Applying Security Engineering to Prompt Injection Security

2w

Vulnerability Exploitation Is Shifting in 2024-25

2w
d

SAP NetWeaver Visual Composer Flaw Under Active Exploitation

2w
d

Windscribe Acquitted on Charges of Not Collecting Users’ Data

2w

AI, Automation, and Dark Web Fuel Evolving Threat Landscape

2w
d

Forget the Stack; Focus on Control

2w
d

DoJ Data Security Program Highlights Data-Sharing Challenges

2w
d

Friday Squid Blogging: Squid Facts on Your Phone

2w

Mobile Applications: A Cesspool of Security Issues

2w
d

How Organizations Can Leverage Cyber Insurance Effectively

2w
d

Vehicles Face 45% More Attacks, 4 Times More Hackers

2w
d

Cryptocurrency Thefts Get Physical

2w

[Virtual Event] Anatomy of a Data Breach: And what to do if it happens to you

2w
d

'SessionShark' ToolKit Evades Microsoft Office 365 MFA

2w
d

'Digital Twins' Bring Simulated Security to the Real World

2w
d

Max-Severity Commvault Bug Alarms Researchers

2w
d

New Linux Rootkit

2w

NFC-Powered Android Malware Enables Instant Cash-Outs

2w
d

Gig-Work Platforms at Risk for Data Breaches, Fraud, Account Takeovers

2w
d

Phishing Kit Darcula Gets Lethal AI Upgrade

2w
d

FBI: Cybercrime Losses Rocket to $16.6B in 2024

2w
d

Navigating Regulatory Shifts & AI Risks

2w
d

'Industrial-Scale' Asian Scam Centers Expand Globally

2w
d

Microsoft Claims Steady Progress Revamping Security Culture

2w
d

Ransomware Gangs Innovate With New Affiliate Models

2w
d

DOGE Worker’s Code Supports NLRB Whistleblower

3w
K

Attackers Capitalize on Mistakes to Target Schools

3w
d

Popular British Retailer Marks & Spencer Addresses 'Cyber Incident'

3w
d
More →

Entries updated May 14, 2025 12:00:55 PM PDT

Questions? Suggestions? alex@sumi.news