
Direct Links | Infosec News Feeds
The San Francisco Beat
SFInfoSec aggregates the latest news, podcasts and books covering Cyber Security, Hacking, Infosec, Online Privacy, Cryptography, Threat Research and Vulnerability Disclosures from all the leading sources.
Threatpost The First Stop For Security News
- Student Loan Breach Exposes 2.5M Recordsby Nate Nelson on August 31, 2022 at 12:57 pm
2.5 million people were affected, in a breach that could spell more trouble […]
- Watering Hole Attacks Push ScanBox Keyloggerby Nate Nelson on August 30, 2022 at 4:00 pm
Researchers uncover a watering hole attack likely carried out by APT TA423, […]
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firmsby Nate Nelson on August 29, 2022 at 2:56 pm
Over 130 companies tangled in sprawling phishing campaign that spoofed a […]
Krebs on Security In-depth security news and investigation
- How Each Pillar of the 1st Amendment is Under Attackby BrianKrebs on March 31, 2025 at 1:22 am
In an address to Congress this month, President Trump claimed he had “brought […]
- When Getting Phished Puts You in Mortal Dangerby BrianKrebs on March 27, 2025 at 4:39 pm
Many successful phishing attacks result in a financial loss or malware […]
- Arrests in Tap-to-Pay Scheme Powered by Phishingby BrianKrebs on March 21, 2025 at 7:12 pm
Authorities in at least two U.S. states last week independently announced […]
darkreading Public RSS feed
- Social Engineering Just Got Smarterby Steve Stasiukonis on April 3, 2025 at 2:00 pm
Polices that forbid employees from divulging company details are worthless if […]
- Emerging Risks Require IT/OT…by Arielle Waldman on April 3, 2025 at 1:47 pm
With an increase in cyber-physical attacks that can cause significant […]
- Google Quick Share Bug Bypasses Allow…by Tara Seals, Managing Editor, News, Dark Reading on April 3, 2025 at 10:24 am
Google addresses patch bypasses for CVE-2024-38272 and CVE-2024-38271, part of […]
Blog RSS Feed Fortra Blog
- HellCat Ransomware: What You Need To Knowby Graham Cluley on April 3, 2025 at 2:07 pm
What is HellCat? HellCat is the name of a relatively new […]
- Japan Passes Active Cyber Defense Billby Josh Breaker-Rolfe on April 1, 2025 at 8:39 am
Over the past few years, many countries have made considerable efforts to […]
- Top Cybersecurity Considerations When Moving Commercial Premisesby Chester Avey on April 1, 2025 at 8:38 am
When relocating office locations domestically or internationally, organizations […]
Security Latest Channel Description
- Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing,…by Zeyi Yang, Louise Matsakis, Caroline Haskins on April 2, 2025 at 5:31 pm
A lawyer for Xiaofeng Wang and his wife says they are “safe” after FBI […]
- Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homesby Dan Goodin, Ars Technica on March 31, 2025 at 7:42 pm
Xiaofeng Wang, a longtime computer science professor at Indiana University, has […]
- An AI Image Generator’s Exposed Database Reveals What People Really Used It…by Matt Burgess on March 31, 2025 at 10:00 am
An unsecured database used by a generative AI app revealed prompts and tens of […]
Graham Cluley Cybersecurity expert & keynote speaker
- Smashing Security podcast #411: The fall of Troy, and whisky barrel scammersby Graham Cluley on April 2, 2025 at 11:00 pm
Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, […]
- The AI Fix #44: AI-generated malware, and a stunning AI breakthroughby Graham Cluley on April 1, 2025 at 3:10 pm
In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o […]
- Hackers exploit little-known WordPress MU-plugins feature to hide malwareby Graham Cluley on April 1, 2025 at 9:29 am
A new security issue is putting WordPress-powered websites at risk. Hackers are […]
BleepingComputer BleepingComputer – All Stories
- Genetic data site openSNP to close and delete data over privacy concernsby Bill Toulas on April 2, 2025 at 9:09 pm
The openSNP project, a platform for sharing genetic and phenotypic data, will […]
- Verizon Call Filter API flaw exposed customers’ incoming call historyby Bill Toulas on April 2, 2025 at 7:47 pm
A vulnerability in Verizon’s Call Filter feature allowed customers to access […]
- GitHub expands security tools after 39 million secrets leaked in 2024by Bill Toulas on April 2, 2025 at 6:24 pm
Over 39 million secrets like API keys and account credentials were leaked on […]
TechCrunch Startup and Technology News
- Space solar startup Aetherflux raises $50M to launch first space demo in 2026by Rebecca Bellan on April 2, 2025 at 9:07 pm
Aetherflux, the space solar startup founded by Baiju Bhatt, the billionaire […]
- Stablecoin issuer Circle takes another stab at a public listingby Marina Temkin on April 2, 2025 at 9:00 pm
Circle, the issuer of USDC, a stablecoin pegged to the U.S. dollar, filed to go […]
- OpenAI’s o3 model might be costlier to run than originally estimatedby Kyle Wiggers on April 2, 2025 at 8:21 pm
When OpenAI unveiled its o3 “reasoning” AI model in December, the company […]
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost…by [email protected] (The Hacker News) on April 3, 2025 at 12:22 pm
The North Korean threat actors behind Contagious Interview have adopted the […]
- AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this…by [email protected] (The Hacker News) on April 3, 2025 at 11:25 am
The rules have changed. Again. Artificial intelligence is bringing powerful new […]
- AI Adoption in the Enterprise: Breaking Through the Security and Compliance…by [email protected] (The Hacker News) on April 3, 2025 at 10:34 am
AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud […]
The DFIR Report Real Intrusions by Real Attackers, The Truth Behind the Intrusion
- Fake Zoom Ends in BlackSuit Ransomwareby editor on March 31, 2025 at 12:01 am
Key Takeaways Case Summary This case from May 2024 started with a malicious download from a website mimicking the teleconferencing application Zoom. When visiting the website and downloading a file … Read More
- Confluence Exploit Leads to LockBit Ransomwareby editor on February 24, 2025 at 12:06 am
Key Takeaways Case Summary The intrusion started with the exploitation of CVE-2023-22527, a critical remote code execution vulnerability in Confluence, against a Windows server. The first indication of threat actor … Read More
- Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomwareby editor on January 27, 2025 at 1:42 am
Key Takeaways Case Summary This intrusion began near the end of January 2024 when the user downloaded and executed a file using the same name (setup_wm.exe) and executable icon, as … Read More
isecjobs.com – Jobs and Talents in InfoSec / Cybersecurity ☕☕💻😸🛡️👾 Latest jobs in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Compliance, Cryptography, Digital Forensics and Cyber Security in general
- Internal Audit IT Manager (Pipeline Mode) @ Japan Tobacco Internationalon April 3, 2025 at 3:28 pm
At JTI we celebrate differences, and everyone truly belongs. 46,000 people from […]
- Especialista de Seguridad Informática 4 @ SONDAon April 3, 2025 at 3:28 pm
Vive la experiencia SONDA ¡Aquí transformas tu carrera! ¿Por qué ser parte […]
- Senior Infrastructure Administrator @ Amplifyon April 3, 2025 at 3:28 pm
A pioneer in K–12 education since 2000, Amplify is leading the way in […]
The Daily Swig | Cybersecurity news and views Keeping you up to date with the latest cybersecurity news from around the world.
- We’re going teetotal: It’s goodbye to The Daily Swigon March 2, 2023 at 2:05 pm
PortSwigger today announces that The Daily Swig is closing down
- Bug Bounty Radar // The latest bug bounty programs for March 2023on February 28, 2023 at 7:15 pm
New web targets for the discerning hacker
- Indian transport ministry flaws potentially allowed creation of counterfeit driving licenseson February 28, 2023 at 2:15 pm
Armed with personal data fragments, a researcher could also access 185 million citizens’ PII
- Password managers: A rough guide to enterprise secret platformson February 27, 2023 at 3:30 pm
The second part of our password manager series looks at business-grade tech to handle API tokens, login credentials, and more
Biz & IT – Ars Technica Serving the Technologist since 1998. News, reviews, and analysis.
- AI bots strain Wikimedia as bandwidth surges 50%by Benj Edwards on April 2, 2025 at 5:06 pm
Automated AI bots seeking training data threaten Wikipedia project stability, […]
- MCP: The new “USB-C for AI” that’s bringing fierce rivals togetherby Benj Edwards on April 1, 2025 at 11:30 am
Model context protocol standardizes how AI uses data sources, supported by […]
- What could possibly go wrong? DOGE to rapidly rebuild Social Security codebase.by Makena Kelly, wired.com on March 29, 2025 at 2:08 pm
A safe and proper rewrite should take years not months.