Explore

security × Feeds ×
  • screenshot

    Google rolls back reCaptcha update to fix Firefox issues

    Google has rolled back a recent release of its reCaptcha captcha script after a bug caused...

  • screenshot

    US Post Office phishing sites get as much traffic as the real one

    Security researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic...

  • screenshot

    Okta warns of "unprecedented" credential stuffing attacks on customers

    Okta warns of an "unprecedented" spike in credential stuffing attacks targeting its identity and access management...

  • screenshot

    Stop Using Your Face or Thumb to Unlock Your Phone

    Last week, the 9th Circuit Court of Appeals in California released a ruling that concluded state...

  • screenshot

    School Employee Allegedly Framed a Principal With Racist Deepfake Rant

    Plus: Google holds off on killing cookies, Samourai Wallet founders get arrested, and GM stops driver...

  • screenshot

    Russia Vetoed a UN Resolution to Ban Space Nukes

    A ban on weapons of mass destruction in orbit has stood since 1967. Russia apparently has...

  • Palo Alto Networks’ CTO on why machine learning is revolutionizing SOC performance

    We're moving away from investigating an attack once every few hours or once every few days...

  • Dropzone AI gets $16.85M for autonomous cybersecurity AI agents that reduce manual work by 90 percent

    Dropzone AI announced a $16.85 million Series A round led by Theory Ventures to help bring...

  • screenshot

    My Favorite Amazon Deal of the Day: Blink Outdoor 4

    One of the best budget entry-level outdoor security cameras is 40% off, its lowest price yet.

  • screenshot

    LXer: Strengthening Linux Security by Auditing with OpenSCAP

    Published at LXer: In today's digital landscape, where cyber threats are becoming increasingly sophisticated, ensuring the...

  • Amplifier emerges from stealth to orchestrate AI-driven ‘self-healing’ security for enterprises

    Amplifier's approach can easily enable companies to maximize the value of their existing security stack and...

  • screenshot

    LXer: If all kernel bugs are security bugs, how do you keep your Linux safe?

    Published at LXer: Since February, there[he]#039[/he]ve been 800 newly assigned CVEs. Your job? Update your main...

  • Microsoft Phi-3: Tiny language model, huge implications for enterprise AI adoption

    Microsoft unveils Phi 3, a groundbreaking 3 billion parameter language model that packs vast AI capabilities...

  • screenshot

    Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

    The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient...

  • screenshot

    Our Journey Migrating to AWS IMDSv2 - Slack Engineering

    Slack Journey Migrating to AWS IMDSv2 Have you ever query 169.254.169.254 you deal with AWS IDMS...

  • screenshot

    North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

    Thousands of exposed files on a misconfigured North Korean server hint at one way the reclusive...