sumi.news
Search
Following
Sign in
← Back to news
Computer Security
RSS Feed
sumi.news
Computer Security
Follow
Latest
Thu Nov 13
[Dark Reading Virtual Event] Cybersecurity Outlook 2026
1w
d
The Ransomware Holiday Bind: Burnout or Be Vulnerable
1w
d
AI Bolsters Python Variant of Brazilian WhatsApp Attacks
1w
d
China Researches Ways to Disrupt Satellite Internet
1w
d
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
1w
d
Iran's 'MuddyWater' Levels Up With MuddyViper Backdoor
1w
d
Researchers Use Poetry to Jailbreak AI Models
1w
d
New Raptor Framework Uses Agentic Workflows to Create Patches
1w
d
DPRK's 'Contagious Interview' Spawns Malicious Npm Package Factory
1w
d
Like Social Media, AI Requires Difficult Choices
1w
Tomiris Unleashes 'Havoc' With New Tools, Tactics
1w
d
CodeRED Emergency Alert Platform Shut Down Following Cyberattack
1w
d
Police Disrupt 'Cryptomixer,' Seize Millions in Crypto
1w
d
Banning VPNs
1w
Shai-hulud 2.0 Variant Threatens Cloud Ecosystem
1w
d
Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach
2w
Prompt Injection Through Poetry
2w
Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
2w
K
Digital Fraud at Industrial Scale: 2025 Wasn't Great
2w
d
'Dark LLMs' Aid Petty Criminals, But Underwhelm Technically
2w
d
Prompt Injections Loom Large Over ChatGPT's Atlas Browser
2w
d
How Malware Authors Are Incorporating LLMs to Evade Detection
2w
d
Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
2w
d
Huawei and Chinese Surveillance
2w
Iran Exploits Cyber Domain to Aid Kinetic Strikes
2w
d
Advanced Security Isn't Stopping Ancient Phishing Tactics
2w
d
Cheap Hardware Module Bypasses AMD, Intel Memory Encryption
2w
d
DPRK's FlexibleFerret Tightens macOS Grip
2w
d
With Friends Like These: China Spies on Russian IT Orgs
2w
d
As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact
2w
d
'JackFix' Attack Circumvents ClickFix Mitigations
2w
d
Four Ways AI Is Being Used to Strengthen Democracies Worldwide
2w
ShadowRay 2.0 Turns AI Clusters into Crypto Botnets
2w
d
Critical Flaw in Oracle Identity Manager Under Exploitation
2w
d
Infamous Shai-hulud Worm Resurfaces From the Depths
2w
d
Vision Language Models Keep an Eye on Physical Security
2w
d
Is Your Android TV Streaming Box Part of a Botnet?
2w
K
IACR Nullifies Election Because of Lost Decryption Key
2w
Friday Squid Blogging: New “Squid” Sneaker
3w
Deja Vu: Salesforce Customers Hacked Again, Via Gainsight
3w
d
LINE Messaging Bugs Open Asian Users to Cyber Espionage
3w
d
Cloudflare's One-Stop-Shop Convenience Takes Down Global Digital Economy
3w
d
Hack the Hackers: 6 Laws for Staying Ahead of the Attackers
3w
d
More on Rewiring Democracy
3w
With AI Reshaping Entry-Level Cyber, What Happens to the Security Talent Pipeline?
3w
d
Switching to Offense: US Makes Cyber Strategy Changes
3w
d
AI as Cyberattacker
3w
Inside Iran's Cyber Objectives: What Do They Want?
3w
d
Securing the Win: What Cybersecurity Can Learn From the Paddock
3w
d
CISOs Get Real About Hiring in the Age of AI
3w
d
More →