sumi.news
Search
Following
Sign in
← Back to news
Computer Security
RSS Feed
sumi.news
Computer Security
Follow
Latest
Sun Jul 27
SIGINT During World War II
2w
China Questions Security of AI Chips From NVIDIA, AMD
2w
d
Microsoft Patch Tuesday, August 2025 Edition
2w
K
Elevation-of-Privilege Vulns Dominate Microsoft's Patch Tuesday
2w
d
Charon Ransomware Emerges With APT-Style Tactics
2w
d
How to Stay a Step Ahead of a Non-Obvious Threat
2w
d
ShinyHunters Tactics Now Mirror Scattered Spider
2w
d
The “Incriminating Video” Scam
2w
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
2w
d
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
2w
d
Black Hat NOC Expands AI Implementation Across Security Operations
2w
d
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery
2w
d
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
2w
d
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol
2w
d
Will Secure AI Be the Hottest Career Path in Cybersecurity?
2w
d
Automatic License Plate Readers Are Coming to Schools
2w
How Maclaren Racing Gets From the Browser to the Track
2w
d
Google Chrome Enterprise: Keeping Businesses Safe From Threats on the Web
2w
d
Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server
2w
KrebsOnSecurity in New ‘Most Wanted’ HBO Max Series
2w
K
60 RubyGems Packages Steal Data From Annoying Spammers
2w
d
BigID Launches Shadow AI Discovery to Uncover Rogue Models and Risky AI Data
2w
d
PwC Announces Addition of Morgan Adamski to Leadership of Cyber, Data & Technology Risk Platform
2w
d
Ransomware Attacks Fall by Almost Half in Q2
2w
d
Cybersecurity Incident at Allianz Life Exposes Personal Information of Hundreds of Thousands
2w
d
860K Compromised in Columbia University Data Breach
2w
d
Redefining the Role: What Makes a CISO Great
2w
d
Data Dump From APT Actor Yields Clues to Attacker Capabilities
2w
d
Attackers Target the Foundations of Crypto: Smart Contracts
2w
d
Google Project Zero Changes Its Disclosure Policy
2w
Silver Fox APT Blurs the Line Between Espionage & Cybercrime
2w
d
Air France, KLM Alert Authorities of Data Breach
2w
d
Prime Security Wins Black Hat's Startup Spotlight Competition
2w
d
Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking
2w
d
'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering
2w
d
Citizen Lab Founder Flags Rise of US Authoritarianism
2w
d
Payback: 'ShinyHunters' Clocks Google via Salesforce
2w
d
The Critical Flaw in CVE Scoring
2w
d
Chanel Alerts Clients of Third-Party Breach
2w
d
China Accuses Nvidia of Putting Backdoors into Their Chips
2w
Researcher Deploys Fuzzer to Test Autonomous Vehicle Safety
2w
d
Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Password Vaults
2w
d
'ReVault' Security Flaws Impact Millions of Dell Laptops
2w
d
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
2w
d
Google Gemini AI Bot Hijacks Smart Homes, Turns Off the Lights
2w
d
Attackers Exploit Critical Trend Micro Apex One Zero-Day Flaw
3w
d
What 'CMMC 3.0' Really Means for Government Contractors
3w
d
Phishers Abuse Microsoft 365 to Spoof Internal Users
3w
d
Who Got Arrested in the Raid on the XSS Crime Forum?
3w
K
SentinelOne Acquires AI Startup Prompt Security
3w
d
More →