News
Latest
Top
Search
Submit
Login
Search
▲
399
Norway reviews cybersecurity after remote-access feature found in Chinese buses
(scandasia.com)
by dredmorbius |
view
|
227 comments
▲
265
US cybersecurity chief leaked sensitive government files to ChatGPT: Report
(dexerto.com)
by randycupertino |
view
|
141 comments
▲
52
Cybersecurity breach at Congressional Budget Office remains a live threat
(politico.com)
by mooreds |
view
|
10 comments
▲
27
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
(pcmag.com)
by WaitWaitWha |
view
|
5 comments
▲
22
US Congressional Budget Office hit by cybersecurity incident
(reuters.com)
by petethomas |
view
|
0 comments
▲
14
Trump's FCC: Internet Providers Can Monitor Their Own Cybersecurity Standards
(cnet.com)
by mooreds |
view
|
3 comments
▲
10
America's cybersecurity defenses are cracking
(theverge.com)
by 01-_- |
view
|
4 comments
▲
9
FCC rolls back cybersecurity rules for telcos despite state hacking risks
(bleepingcomputer.com)
by sans_souse |
view
|
0 comments
▲
7
Pentagon Demands Verified Cybersecurity from Contractors
(securityweek.com)
by Bender |
view
|
0 comments
▲
7
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by jnord |
view
|
0 comments
▲
6
UC faculty push back against systemwide cybersecurity mandate
(dailycal.org)
by geox |
view
|
0 comments
▲
5
Every log must fire: applying Chekhov's gun to cybersecurity incident reports
(andreafortuna.org)
by speckx |
view
|
3 comments
▲
4
The cybersecurity mistakes tech startups make, according to an expert
(proton.me)
by devonnull |
view
|
0 comments
▲
4
Support the call for Memory Safety incentives in EU cybersecurity policies
(trifectatech.org)
by weinzierl |
view
|
0 comments
▲
4
Curated collection of 407 cutting-edge cybersecurity tools
(hacker-arsenal.tools)
by b16m |
view
|
0 comments
▲
3
A Search Warrant Sparked My Interest in Cybersecurity
(rz01.org)
by exitnode |
view
|
0 comments
▲
3
Comparing AI agents to cybersecurity professionals in real-world pen testing
(arxiv.org)
by littlexsparkee |
view
|
0 comments
▲
3
Cybersecurity industry overreacts to React vulnerability
(doublepulsar.com)
by speckx |
view
|
0 comments
▲
3
How classic anime'Ghost in the Shell'predicted cybersecurity future 30 years ago
(techcrunch.com)
by bookofjoe |
view
|
0 comments
▲
2
GPT 5.5 flags accounts for "potential high-risk cybersecurity"
(twitter.com)
by stared |
view
|
0 comments
▲
2
Is Cybersecurity Over? [video]
(youtube.com)
by 0xcrypto |
view
|
0 comments
▲
2
Anthropic Claims Its New A.I. Model, Mythos, Is a Cybersecurity ‘Reckoning’
(nytimes.com)
by jbegley |
view
|
0 comments
▲
2
Trump Drops a Cybersecurity Bombshell with Biden-Era Policy Reversal
(forbes.com)
by weinzierl |
view
|
0 comments
▲
2
Cybersecurity Bill: ORG calls on MPs to reduce UK reliance on US tech companies
(openrightsgroup.org)
by Jigsy |
view
|
0 comments
▲
2
Office of the Ombudsman responding to cybersecurity incident
(ombudsman.ie)
by austinallegro |
view
|
0 comments
▲
2
AI agent achieves Rank 1 across major CTFs – a defining moment for cybersecurity
(arxiv.org)
by vmayoral |
view
|
1 comments
▲
2
Show HN: A daily cybersecurity newsletter that's fun to read
(threatroad.substack.com)
by levberg |
view
|
0 comments
▲
2
Why Traditional Cybersecurity Won't "Fix" AI
(hiddenlayer.com)
by beabytes |
view
|
0 comments
▲
2
Cybersecurity interview prep sucks, so I built something better
(cyberinterviewprep.com)
by malwareandchill |
view
|
3 comments
▲
2
AI and Cybersecurity: Dan Boneh Interviews Sam Altman [video]
(youtube.com)
by simonpure |
view
|
0 comments
▲
2
Ex-cybersecurity staffers charged with moonlighting as hackers
(japantimes.co.jp)
by PaulHoule |
view
|
0 comments
▲
2
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by pseudolus |
view
|
1 comments
▲
2
SEBI Cybersecurity and Cyber Resilience Framework for Regulated Entities [pdf]
(sebi.gov.in)
by debarshri |
view
|
0 comments
▲
1
What Anthropic's Mythos Means for the Future of Cybersecurity
(spectrum.ieee.org)
by Brajeshwar |
view
|
0 comments
▲
1
Cybersecurity incident leaves U.S. drivers stranded
(spectrum.ieee.org)
by pseudolus |
view
|
1 comments
▲
1
OpenAI's better approach to CyberSecurity compared to Anthropic
(xbow.com)
by throwaway911282 |
view
|
0 comments
▲
1
Anthropic investigates unauthorized access to unreleased Mythos cybersecurity AI
(theguardian.com)
by DarenWatson |
view
|
0 comments
▲
1
Mythos and Cybersecurity
(schneier.com)
by omer_k |
view
|
0 comments
▲
1
Claude Mythos and Cybersecurity
(schneier.com)
by abhisek |
view
|
0 comments
▲
1
Update on AI CyberSecurity
(substack.norabble.com)
by nedruod |
view
|
0 comments
▲
1
Zero Days, Zero Truth – AI, Cybersecurity, and the Two-Tier Deception
(brutelogic.net)
by brutelogic |
view
|
0 comments
▲
1
Claude Mythos #2: Cybersecurity and Project Glasswing
(thezvi.substack.com)
by gmays |
view
|
0 comments
▲
1
AI cybersecurity is not proof of work
(antirez.com)
by surprisetalk |
view
|
0 comments
▲
1
Cybersecurity Looks Like Proof of Work Now
(dbreunig.com)
by brie22 |
view
|
0 comments
▲
1
Race for the best cybersecurity model heating up
(reuters.com)
by gaurangt |
view
|
0 comments
▲
1
Cybersecurity Looks Like Proof of Work Now
(dbreunig.com)
by dbreunig |
view
|
0 comments
▲
1
Anthropic's Mythos Will Force a Cybersecurity Reckoning–Just Not the One You Th
(wired.com)
by joozio |
view
|
0 comments
▲
1
AI and Cybersecurity: A Glass Half-Empty/Half-Full of Nitroglycerin
(techdirt.com)
by hn_acker |
view
|
1 comments
▲
1
Claude Mythos #2: Cybersecurity and Project Glasswing
(thezvi.substack.com)
by paulpauper |
view
|
0 comments
▲
1
AI Cybersecurity After Mythos: The Jagged Frontier
(aisle.com)
by akavel |
view
|
0 comments