sumi.news
Search
Following
Sign in
← Back to news
Computer Security
RSS Feed
sumi.news
Computer Security
Follow
Latest
Sun May 4
Attackers Impersonate Ruby Packages to Steal Sensitive Telegram Data
1h
d
Beware of Device Code Phishing
2h
d
The Ramifications of Ukraine’s Drone Attack
5h
How to Approach Security in the Era of AI Agents
17h
d
LayerX Launches ExtensionPedia
19h
d
TXOne Networks Introduces Capability for Intelligent Vulnerability Mitigation
19h
d
'Crocodilus' Sharpens Its Teeth on Android Users
19h
d
Victoria's Secret Delays Earnings Call Due to Cyber Incident
20h
d
Chrome Drops Trust for Chunghwa, Netlock Certificates
21h
d
LummaC2 Fractures as Acreed Malware Becomes Top Dog
21h
d
Is Your CISO Navigating Your Flight Path?
1d
d
New Linux Vulnerabilities
1d
Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs
1d
d
EMR-ISAC Shuts Down: What Happens Now?
1d
d
Exploitation Risk Grows for Critical Cisco Bug
1d
d
Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak
1d
d
Australia Begins New Ransomware Payment Disclosure Rules
2d
d
Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform
2d
d
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
2d
d
In the AI Race With China, Don't Forget About Security
2d
d
Australia Requires Ransomware Victims to Declare Payments
2d
'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia
4d
d
FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams
4d
d
Vibe Coding Changed the Development Process
5d
d
Tenable to Acquire AI Security Startup Apex
5d
d
CISO Stature Rises, but Security Budgets Remain Tight
5d
d
ConnectWise Breached, ScreenConnect Customers Targeted
5d
d
From Code Red to Rust: Microsoft's Security Journey
5d
d
Why Take9 Won’t Improve Cybersecurity
5d
'Everest Group' Extorts Global Orgs via SAP's HR Tool
5d
d
U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
5d
K
Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy”
5d
NSA, CISA Urge Organizations to Secure Data Used in AI Models
5d
d
Victoria's Secret Goes Offline After 'Incident' Claims
5d
d
New Botnet Plants Persistent Backdoors in ASUS Routers
5d
d
SentinelOne Reports Services Are Back Online After Global Outage
5d
d
Zscaler's Buyout of Red Canary Shows Telemetry's Value
5d
d
APT41 Uses Google Calendar Events for C2
5d
d
PumaBot Targets Linux Devices in Latest Botnet Campaign
5d
d
LexisNexis Informs 360K+ Customers of Third-Party Data Leak
6d
d
A Defense-in-Depth Approach for the Modern Era
6d
d
Surveillance Via Smart Toothbrush
6d
'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs
6d
d
Certified Randomness Uses Quantum Cryptography to Make Stronger Keys
6d
d
Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files
6d
d
CISA Issues SOAR, SIEM Implementation Guidance
6d
d
Implementing Secure by Design Principles for AI
6d
d
Pakistan Arrests 21 in ‘Heartsender’ Malware Service
6d
K
More →