News
Latest
Top
Search
Submit
Login
Search
▲
399
Norway reviews cybersecurity after remote-access feature found in Chinese buses
(scandasia.com)
by dredmorbius |
view
|
227 comments
▲
52
Cybersecurity breach at Congressional Budget Office remains a live threat
(politico.com)
by mooreds |
view
|
10 comments
▲
27
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
(pcmag.com)
by WaitWaitWha |
view
|
5 comments
▲
22
US Congressional Budget Office hit by cybersecurity incident
(reuters.com)
by petethomas |
view
|
0 comments
▲
14
Trump's FCC: Internet Providers Can Monitor Their Own Cybersecurity Standards
(cnet.com)
by mooreds |
view
|
3 comments
▲
10
America's cybersecurity defenses are cracking
(theverge.com)
by 01-_- |
view
|
4 comments
▲
9
FCC rolls back cybersecurity rules for telcos despite state hacking risks
(bleepingcomputer.com)
by sans_souse |
view
|
0 comments
▲
7
Pentagon Demands Verified Cybersecurity from Contractors
(securityweek.com)
by Bender |
view
|
0 comments
▲
7
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by jnord |
view
|
0 comments
▲
6
UC faculty push back against systemwide cybersecurity mandate
(dailycal.org)
by geox |
view
|
0 comments
▲
5
Every log must fire: applying Chekhov's gun to cybersecurity incident reports
(andreafortuna.org)
by speckx |
view
|
3 comments
▲
4
Support the call for Memory Safety incentives in EU cybersecurity policies
(trifectatech.org)
by weinzierl |
view
|
0 comments
▲
4
Curated collection of 407 cutting-edge cybersecurity tools
(hacker-arsenal.tools)
by b16m |
view
|
0 comments
▲
3
Cybersecurity industry overreacts to React vulnerability
(doublepulsar.com)
by speckx |
view
|
0 comments
▲
3
How classic anime'Ghost in the Shell'predicted cybersecurity future 30 years ago
(techcrunch.com)
by bookofjoe |
view
|
0 comments
▲
2
Office of the Ombudsman responding to cybersecurity incident
(ombudsman.ie)
by austinallegro |
view
|
0 comments
▲
2
AI agent achieves Rank 1 across major CTFs – a defining moment for cybersecurity
(arxiv.org)
by vmayoral |
view
|
1 comments
▲
2
Show HN: A daily cybersecurity newsletter that's fun to read
(threatroad.substack.com)
by levberg |
view
|
0 comments
▲
2
Why Traditional Cybersecurity Won't "Fix" AI
(hiddenlayer.com)
by beabytes |
view
|
0 comments
▲
2
Cybersecurity interview prep sucks, so I built something better
(cyberinterviewprep.com)
by malwareandchill |
view
|
3 comments
▲
2
AI and Cybersecurity: Dan Boneh Interviews Sam Altman [video]
(youtube.com)
by simonpure |
view
|
0 comments
▲
2
Ex-cybersecurity staffers charged with moonlighting as hackers
(japantimes.co.jp)
by PaulHoule |
view
|
0 comments
▲
2
How to trade your $214,000 cybersecurity job for a jail cell
(arstechnica.com)
by pseudolus |
view
|
1 comments
▲
2
SEBI Cybersecurity and Cyber Resilience Framework for Regulated Entities [pdf]
(sebi.gov.in)
by debarshri |
view
|
0 comments
▲
1
ServiceNow acquiring cybersecurity startup Armis for nearly $8B
(cnbc.com)
by myth_drannon |
view
|
0 comments
▲
1
Vulnerability Databases: The Holy Grail of Cybersecurity?
(nocomplexity.substack.com)
by runningmike |
view
|
0 comments
▲
1
Five Annoying Cybersecurity Trends We've Somehow Accepted as Normal
(ip-ninja.com)
by d4n3ws |
view
|
0 comments
▲
1
NIST Cybersecurity Framework Profile for Artificial Intelligence
(csrc.nist.gov)
by JoachimS |
view
|
0 comments
▲
1
Norway: Ruter Examines Cybersecurity Risks in Chinese Electric Buses
(news.busworld.org)
by gscott |
view
|
0 comments
▲
1
AI-Driven Partner in Cybersecurity, Ethical Hacking, and VAPT
(zehrasec.com)
by salkahfi |
view
|
0 comments
▲
1
Reimagining cybersecurity in the era of AI and quantum
(technologyreview.com)
by fleahunter |
view
|
0 comments
▲
1
Preparing for Threats to Come: Cybersecurity Forecast 2026
(cloud.google.com)
by meysamazad |
view
|
0 comments