Posts | Rating | new post |
| Substack notifies users about a "limited" data breach in October 2025, found on February 3 and now patched; a threat actor leaked a database | 0 user ratings | 2026-02-05 13:15:10 By: milo |
| Facing the Quantum Threat: Cisco s Strategic Approach to PQC | 0 user ratings | 2026-02-05 13:03:06 By: milo |
| Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries - SecurityWeek | 0 user ratings | 2026-02-05 12:39:55 By: milo |
| Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework | 0 user ratings | 2026-02-05 12:00:16 By: milo |
| New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability | 0 user ratings | 2026-02-05 11:55:55 By: milo |
| New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability - Infosecurity Magazine | 0 user ratings | 2026-02-05 11:53:52 By: milo |
| The Buyer s Guide to AI Usage Control | 0 user ratings | 2026-02-05 11:48:14 By: milo |
| European Officials Warn of Russian Satellites Intercepting Communications | 0 user ratings | 2026-02-05 11:45:22 By: milo |
| Asset Intelligence as Context Engineering for Cybersecurity Operations | 0 user ratings | 2026-02-05 11:25:15 By: milo |
| Why boards should be obsessed with their most ‘boring’ systems | 0 user ratings | 2026-02-05 11:12:26 By: milo |
| Securing Agents Isn t the Customer s Job, It s the Platform’s | 0 user ratings | 2026-02-05 10:49:14 By: milo |
| Healthcare Cybersecurity Is in Crisis These Proven Controls Could Be the Cure | 0 user ratings | 2026-02-05 10:20:47 By: milo |
| China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025 | 0 user ratings | 2026-02-05 10:20:05 By: milo |
| AI-Enabled Voice and Virtual Meeting Fraud Surges 1000%+ | 0 user ratings | 2026-02-05 10:06:56 By: milo |
| RapidFort, which develops tools for securing software supply chains, raised a $42M Series A led by Blue Cloud and ForgePoint, taking its total funding | 0 user ratings | 2026-02-05 10:03:10 By: milo |
| The best iPads for college in 2026: Expert tested and reviewed | 0 user ratings | 2026-02-05 10:03:09 By: milo |
| My favorite iPad Air accessories should be on every power user's list (including this Pencil alternative) | 0 user ratings | 2026-02-05 10:03:08 By: milo |
| Kali Linux vs. Parrot OS: Which security-forward distro is right for you? | 0 user ratings | 2026-02-05 09:05:08 By: milo |
| Getting 'slow charger' warnings? This gadget tells you which USB cables work as advertised | 0 user ratings | 2026-02-05 08:27:08 By: milo |
| APT28 Hackers Exploiting Microsoft Office Vulnerability to Compromise Government Agencies - CybersecurityNews | 0 user ratings | 2026-02-05 08:09:57 By: milo |
| Threat Actors Hacking NGINX Servers to Redirect Web Traffic to Malicious Servers - CybersecurityNews | 0 user ratings | 2026-02-05 08:09:55 By: milo |
| A look at the informal economy of rogue streaming box resellers, who sell hardware that offers free access to sports games, cable TV, and streaming se | 0 user ratings | 2026-02-05 07:40:10 By: milo |
| A look at Axiom, which is building AxiomProver, an "AI mathematician" it claims has solved at least four previously unsolved math problems ( | 0 user ratings | 2026-02-05 07:11:09 By: milo |
| Sources: HP, Dell, Acer, and Asus are considering sourcing memory chips from Chinese chipmakers; HP and Dell are currently qualifying DRAM products fr | 0 user ratings | 2026-02-05 06:42:09 By: milo |
| Cybersecurity company Varonis agrees to acquire AllTrue, which develops specialized tools for AI trust, risk, and security management, for $125M in ca | 0 user ratings | 2026-02-05 06:32:09 By: milo |