sumi.news
  • Search
  • Following
  • Sign in
← Back to news

Computer Security RSS Feed

  • sumi.news
  • Computer Security

  • Latest
  • Sun May 4

Attackers Impersonate Ruby Packages to Steal Sensitive Telegram Data

1h
d

Beware of Device Code Phishing

2h
d

The Ramifications of Ukraine’s Drone Attack

5h

How to Approach Security in the Era of AI Agents

17h
d

LayerX Launches ExtensionPedia

19h
d

TXOne Networks Introduces Capability for Intelligent Vulnerability Mitigation

19h
d

'Crocodilus' Sharpens Its Teeth on Android Users

19h
d

Victoria's Secret Delays Earnings Call Due to Cyber Incident

20h
d

Chrome Drops Trust for Chunghwa, Netlock Certificates

21h
d

LummaC2 Fractures as Acreed Malware Becomes Top Dog

21h
d

Is Your CISO Navigating Your Flight Path?

1d
d

New Linux Vulnerabilities

1d

Open-Weight Chinese AI Models Drive Privacy Innovation in LLMs

1d
d

EMR-ISAC Shuts Down: What Happens Now?

1d
d

Exploitation Risk Grows for Critical Cisco Bug

1d
d

Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak

1d
d

Australia Begins New Ransomware Payment Disclosure Rules

2d
d

Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform

2d
d

Beyond the Broken Wall: Why the Security Perimeter Is Not Enough

2d
d

In the AI Race With China, Don't Forget About Security

2d
d

Australia Requires Ransomware Victims to Declare Payments

2d

'Earth Lamia' Exploits Known SQL, RCE Bugs Across Asia

4d
d

FBI Warns of Filipino Tech Company Running Sprawling Crypto Scams

4d
d

Vibe Coding Changed the Development Process

5d
d

Tenable to Acquire AI Security Startup Apex

5d
d

CISO Stature Rises, but Security Budgets Remain Tight

5d
d

ConnectWise Breached, ScreenConnect Customers Targeted

5d
d

From Code Red to Rust: Microsoft's Security Journey

5d
d

Why Take9 Won’t Improve Cybersecurity

5d

'Everest Group' Extorts Global Orgs via SAP's HR Tool

5d
d

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams

5d
K

Friday Squid Blogging: NGC 1068 Is the “Squid Galaxy”

5d

NSA, CISA Urge Organizations to Secure Data Used in AI Models

5d
d

Victoria's Secret Goes Offline After 'Incident' Claims

5d
d

New Botnet Plants Persistent Backdoors in ASUS Routers

5d
d

SentinelOne Reports Services Are Back Online After Global Outage

5d
d

Zscaler's Buyout of Red Canary Shows Telemetry's Value

5d
d

APT41 Uses Google Calendar Events for C2

5d
d

PumaBot Targets Linux Devices in Latest Botnet Campaign

5d
d

LexisNexis Informs 360K+ Customers of Third-Party Data Leak

6d
d

A Defense-in-Depth Approach for the Modern Era

6d
d

Surveillance Via Smart Toothbrush

6d

'Haozi' Gang Sells Turnkey Phishing Tools to Amateurs

6d
d

Certified Randomness Uses Quantum Cryptography to Make Stronger Keys

6d
d

Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files

6d
d

CISA Issues SOAR, SIEM Implementation Guidance

6d
d

Implementing Secure by Design Principles for AI

6d
d

Pakistan Arrests 21 in ‘Heartsender’ Malware Service

6d
K
More →

Entries updated Jun 4, 2025 09:00:58 AM PDT

Questions? Suggestions? alex@sumi.news