Apple just changed AirTag 2’s anti-stalking feature
!https://9to5mac.com/wp-content/uploads/sites/6/2025/02/airtag-in-hand.jpg?quality=82&strip=all&w=1600 Apple shipped new AirTag firmware yesterdayhttps://9to5ma...
!https://9to5mac.com/wp-content/uploads/sites/6/2025/02/airtag-in-hand.jpg?quality=82&strip=all&w=1600 Apple shipped new AirTag firmware yesterdayhttps://9to5ma...
There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its...
Overview A multi‑pronged phishing campaign is targeting Spanish‑speaking users in organizations across Latin America and Europe to deliver Windows banking troj...
Overview Last week I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are...
!https://www.bleepstatic.com/content/hl-images/2026/04/01/Google-Drive.jpg Google announced that the AI‑powered Google Drive ransomware detection feature has re...
Incident Overview Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence AI coding assistant, Claude Code, had been inadvert...
!/_next/image/?url=https%3A%2F%2Fres.cloudinary.com%2Fsnyk%2Fimage%2Fupload%2Fv1773757842%2Fevo-og-image_hqmx8a_zrr7wg.png&w=2560&q=75 Discover, monitor, and se...
!https://www.bleepstatic.com/content/hl-images/2026/02/13/ClaudeAI.png Anthropic says it accidentally leaked the source code for Claude Code, which is normally...
!https://www.bleepstatic.com/content/hl-images/2026/03/31/vim.jpg Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with th...
Iran's Islamic Revolutionary Guard Corps has issued a direct strike threat to a slew of U.S. tech companies, including GPU giant Nvidia, Microsofthttps://www.to...
Vulnerability Overview A high‑severity security flaw in the TrueConf client video‑conferencing software has been exploited in the wild as a zero‑day as part of...
The city will allow agencies to return to TikTok, but with strict new device and security rules....
Google’s New Post‑Quantum Timeline A team of Google researchers announced a new migration deadline for post‑quantum cryptography: 2029. This means that Bitcoin...
Overview Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that could allow artificial intelligence AI agen...
Award Announcement Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. Reflection on the Recognition I am in...
TL;DR - Apple has reintroduced end‑to‑end encryption E2EE for RCS conversations with Android users in the iOS 26.5 developer beta, preventing third parties fro...
OAuth Token Vault Patterns for AI Agents AI agents that access third‑party APIs on behalf of users GitHub, Slack, Google Calendar face a hard security problem:...
Every time you paste a JWT into a decoder, run a regex against a sample string, or convert a color value from HSL to hex in an online tool, you're making a smal...
Malicious versions of the Axios npm package 1.14.1 and 0.30.4 were published via a compromised maintainer account, injecting a hidden dependency that deploys a...
!https://www.bleepstatic.com/content/hl-images/2025/07/02/Citrix.jpg?rand=1938731578 Vulnerability Overview Hackers are exploiting a critical‑severity vulnerabi...
!https://www.androidauthority.com/wp-content/uploads/2026/03/White-House-App-2-scaled.jpg TL;DR - The White House launched a new app for Android and iOS last we...
Most CI/CD pipelines are built around a simple idea: if your code passes tests and security scans before deployment, you’re good to go. That used to be enough....
!https://www.bleepstatic.com/content/hl-images/2023/06/05/apple-triangle.jpg Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and...
Some weeks are loud. This one was quieter but not in a good way. Long‑running operations are finally hitting courtrooms, old attack methods are showing up in ne...
What is really slowing Tier 1 down: the threat itself or the process around it? In many SOCs, the biggest delays do not come from the threat alone. They come fr...
!https://www.bleepstatic.com/content/hl-images/2025/10/15/F5.jpg Cybersecurity firm F5 Networks has reclassified a BIG‑IP APM denial‑of‑service DoS vulnerabilit...
Discovery Cybersecurity researchers have identified a remote access toolkit of Russian origin, dubbed the CTRL toolkit. The findings were reported by security...
Google’s new sideloading rules Google’s new sideloading ruleshttps://www.androidauthority.com/google-android-sideloading-unverified-apps-new-rules-3650343/ hav...
!https://www.bleepstatic.com/content/hl-images/2025/12/29/Fortinet.jpg Attackers are now actively exploiting a critical vulnerability in Fortinet's FortiClient...
Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a “complex and...
The European Commission has confirmed a data breach after its Europa.eu web platform was hacked in a cyber‑attack claimed by the ShinyHunters extortion gang. Bl...
The Real Problems with .env Let me be specific about what's wrong: 1. They're plaintext. Your DATABASE_URL sits in a text file on your disk, next to your code....
Overview President Donald Trump's new White House apphttps://mashable.com/article/white-house-launches-mobile-app was released for iOS and Android devices. The...
Overview There is a page on the internet right now that anyone can visit. The URL is public. The server is unprotected—no login, no password, no firewall, no e...
Overview An anonymous Slashdot reader notes that ClickFix attackshttps://it.slashdot.org/story/25/11/11/2233201/clickfix-may-be-the-biggest-security-threat-you...
!Cover image for SQL Injection in Cursor-Generated Code: What Gets Missedhttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravity=auto,format...
Summary The U.S. Cybersecurity and Infrastructure Security Agency CISA on Friday added a critical security flaw impacting F5 BIG‑IP Access Policy Manager APM t...
!https://9to5google.com/wp-content/uploads/sites/4/2024/03/Pixelated-cover.jpg?quality=82&strip=all&w=1600 Welcome to episode 93 of Pixelated, a podcast by 9to5...
About Bruce Schneier !https://www.schneier.com/wp-content/uploads/2019/10/Bruce-Schneier.jpg I am a public-interest technologisthttps://public-interest-tech.co...
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web‑based attacks and urge them t...
!https://www.bleepstatic.com/content/hl-images/2024/06/06/GitHub.jpg A large‑scale campaign is targeting developers on GitHub with fake Visual Studio Code VS Co...
Apple says it has no record of a successful spyware attack against any device running Lockdown Mode, the opt‑in security feature introduced in 2022. > “We are n...
Threat actors are using adversary-in-the-middle AitM phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a report fr...
Overview Node provides process permission flags such as allowNet, allowFsRead, etc. These flags apply to the entire running application, which can be problemat...
Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesyst...
Overview The idea for this project came up when I discovered React Doctor. I liked their concept and wanted to bring a similar auditing tool outside the React...
!https://www.bleepstatic.com/content/hl-images/2025/01/13/CISA-headpic.jpg The Cybersecurity and Infrastructure Security Agency CISA is warning that hackers are...
A long-term and ongoing campaign attributed to a China‑nexus threat actor has embedded itself in telecom networks to conduct espionage against government networ...