X-Request-Purpose: Identifying “research” and bug bounty related scans?, (Thu, Oct 30th) on October 30, 2025 Posted by SANS Internet Storm Center, InfoCON: green
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense on October 30, 2025 Posted by The Hacker News
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising on October 30, 2025 Posted by The Hacker News
Posted in data breach Smashing Security podcast #441: Inside the mob’s million-dollar poker hack, and a Formula 1 fumble on October 29, 2025 Graham Cluley
Posted in cell phones First Wap: A Surveillance Computer You’ve Never Heard Of on October 27, 2025 Bruce Schneier
Posted in activism The Trump Administration’s Increased Use of Social Media Surveillance on October 14, 2025 Bruce Schneier
Posted in data breach Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience on October 8, 2025 Graham Cluley
Posted in computer security Digital Threat Modeling Under Authoritarianism on September 26, 2025 Bruce Schneier
Posted in censorship Details About Chinese Surveillance and Propaganda Companies on September 22, 2025 Bruce Schneier
Posted in data breach Vastaamo psychotherapy hack: US citizen charged in latest twist of notorious data breach on September 19, 2025 Graham Cluley
Posted in Iran Smashing Security podcast #435: Lights! Camera! Hacktion! on September 17, 2025 Graham Cluley