News
Latest
Top
Search
Submit
Login
Search
▲
399
Norway reviews cybersecurity after remote-access feature found in Chinese buses
(scandasia.com)
by dredmorbius |
view
|
227 comments
▲
265
US cybersecurity chief leaked sensitive government files to ChatGPT: Report
(dexerto.com)
by randycupertino |
view
|
141 comments
▲
52
Cybersecurity breach at Congressional Budget Office remains a live threat
(politico.com)
by mooreds |
view
|
10 comments
▲
27
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
(pcmag.com)
by WaitWaitWha |
view
|
5 comments
▲
22
US Congressional Budget Office hit by cybersecurity incident
(reuters.com)
by petethomas |
view
|
0 comments
▲
14
Trump's FCC: Internet Providers Can Monitor Their Own Cybersecurity Standards
(cnet.com)
by mooreds |
view
|
3 comments
▲
10
America's cybersecurity defenses are cracking
(theverge.com)
by 01-_- |
view
|
4 comments
▲
9
FCC rolls back cybersecurity rules for telcos despite state hacking risks
(bleepingcomputer.com)
by sans_souse |
view
|
0 comments
▲
7
Pentagon Demands Verified Cybersecurity from Contractors
(securityweek.com)
by Bender |
view
|
0 comments
▲
7
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by jnord |
view
|
0 comments
▲
6
UC faculty push back against systemwide cybersecurity mandate
(dailycal.org)
by geox |
view
|
0 comments
▲
5
Every log must fire: applying Chekhov's gun to cybersecurity incident reports
(andreafortuna.org)
by speckx |
view
|
3 comments
▲
4
The cybersecurity mistakes tech startups make, according to an expert
(proton.me)
by devonnull |
view
|
0 comments
▲
4
Support the call for Memory Safety incentives in EU cybersecurity policies
(trifectatech.org)
by weinzierl |
view
|
0 comments
▲
4
Curated collection of 407 cutting-edge cybersecurity tools
(hacker-arsenal.tools)
by b16m |
view
|
0 comments
▲
3
A Search Warrant Sparked My Interest in Cybersecurity
(rz01.org)
by exitnode |
view
|
0 comments
▲
3
Comparing AI agents to cybersecurity professionals in real-world pen testing
(arxiv.org)
by littlexsparkee |
view
|
0 comments
▲
3
Cybersecurity industry overreacts to React vulnerability
(doublepulsar.com)
by speckx |
view
|
0 comments
▲
3
How classic anime'Ghost in the Shell'predicted cybersecurity future 30 years ago
(techcrunch.com)
by bookofjoe |
view
|
0 comments
▲
2
Trump Drops a Cybersecurity Bombshell with Biden-Era Policy Reversal
(forbes.com)
by weinzierl |
view
|
0 comments
▲
2
Cybersecurity Bill: ORG calls on MPs to reduce UK reliance on US tech companies
(openrightsgroup.org)
by Jigsy |
view
|
0 comments
▲
2
Office of the Ombudsman responding to cybersecurity incident
(ombudsman.ie)
by austinallegro |
view
|
0 comments
▲
2
AI agent achieves Rank 1 across major CTFs – a defining moment for cybersecurity
(arxiv.org)
by vmayoral |
view
|
1 comments
▲
2
Show HN: A daily cybersecurity newsletter that's fun to read
(threatroad.substack.com)
by levberg |
view
|
0 comments
▲
2
Why Traditional Cybersecurity Won't "Fix" AI
(hiddenlayer.com)
by beabytes |
view
|
0 comments
▲
2
Cybersecurity interview prep sucks, so I built something better
(cyberinterviewprep.com)
by malwareandchill |
view
|
3 comments
▲
2
AI and Cybersecurity: Dan Boneh Interviews Sam Altman [video]
(youtube.com)
by simonpure |
view
|
0 comments
▲
2
Ex-cybersecurity staffers charged with moonlighting as hackers
(japantimes.co.jp)
by PaulHoule |
view
|
0 comments
▲
2
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by pseudolus |
view
|
1 comments
▲
2
SEBI Cybersecurity and Cyber Resilience Framework for Regulated Entities [pdf]
(sebi.gov.in)
by debarshri |
view
|
0 comments
▲
1
Sober in Cyber – Nonprofit for Sober Professionals in Cybersecurity
(soberincyber.org)
by TheWiggles |
view
|
0 comments
▲
1
Cybersecurity and Ethical Hacking Cheatsheets
(github.com)
by Ilias1988 |
view
|
1 comments
▲
1
Cybersecurity Forecast 2026 [pdf]
(services.google.com)
by bookofjoe |
view
|
0 comments
▲
1
The Download: how AI is shaking up Go, and a cybersecurity mystery
(technologyreview.com)
by joozio |
view
|
0 comments
▲
1
CrowdStrike Plummets. Why a New AI Tool Is Crushing Cybersecurity Stocks
(barrons.com)
by captaincrunch |
view
|
0 comments
▲
1
Show HN:Panther – A Scripting Language Designed for Cybersecurity Workflows
by CzaxTanmay |
view
|
0 comments
▲
1
Show HN: Panther – a cross-platform cybersecurity scripting language
by CzaxTanmay |
view
|
0 comments
▲
1
LLMs became dangerously good for cybersecurity
(blog.vidocsecurity.com)
by kannthu |
view
|
1 comments
▲
1
Panther – a scripting language designed for cybersecurity workflows
by CzaxTanmay |
view
|
0 comments
▲
1
Making frontier cybersecurity capabilities available to defenders
(anthropic.com)
by surprisetalk |
view
|
0 comments
▲
1
Building a curated AI and cybersecurity room for engineers and CISOs – no fluff
(rbln.com)
by RBLN2026 |
view
|
1 comments
▲
1
The foundation problem: How a lack of accountability is destroying cybersecurity
(csoonline.com)
by ungreased0675 |
view
|
1 comments
▲
1
Show HN: Infoseclist.com – Compare 90 cybersecurity tools ranked by practition
(infoseclist.com)
by aleks5678 |
view
|
1 comments
▲
1
Show HN: Cyber+ – A DSL for scripting cybersecurity workflows
by CzaxTanmay |
view
|
0 comments
▲
1
AI Will Not Save Cybersecurity: Why the Arms Race Favors Attackers
(smarterarticles.co.uk)
by dxs |
view
|
0 comments
▲
1
OpenAI requires ID verification for cybersecurity related tasks
(openai.com)
by VortexLain |
view
|
0 comments
▲
1
How to make employees learn cybersecurity?
by dkozyatinskiy |
view
|
0 comments
▲
1
European and allied cybersecurity strategies shift from defence to offence
(bindinghook.com)
by campuscodi |
view
|
0 comments
▲
1
U.S. Cybersecurity Chief Uploaded Classified Files to ChatGPT
(peq42.com)
by peq42 |
view
|
0 comments
▲
1
Show HN: Subverted Academy – Rebelling against how cybersecurity is taught
(academy.subverted.io)
by x_ulla |
view
|
0 comments