Cognitive warfare: the new battlefield exploiting our brains
polytechnique-insights.comยท20hยท
Discuss: Hacker News
๐Ÿง PKM Systems
Flag this post
Show HN: Pingu Unchained an Unrestricted LLM for High-Risk AI Security Research
pingu.audn.aiยท11hยท
Discuss: Hacker News
๐Ÿง PKM Systems
Flag this post
Conduent Healthcare Data Breach Exposes 10.5 Million Patient Records in Massive 2025 Cyber Incident
blogger.comยท1d
๐Ÿ”Cryptography
Flag this post
RCMP launches national cybercrime and fraud website to report incidents
mobilesyrup.comยท12h
๐Ÿ”Cryptography
Flag this post
5 things I wish I never did on my home network (so you don't make the same mistake)
xda-developers.comยท8h
๐Ÿ”Cryptography
Flag this post
How China-Backed Hackers Are Targeting Telecom and What Needs to Happen Next
securityscorecard.comยท2d
๐Ÿ”Cryptography
Flag this post
If I made sure no kernels are running on my work Mac how much can my employer see of what I do?
reddit.comยท17hยท
Discuss: r/privacy
๐ŸชจObsidian
Flag this post
Why Data Centers Want James Bondโ€“Style Security Consultants
theinformation.comยท15h
๐Ÿ”Cryptography
Flag this post
Breaking systems : one industry professional journey into cyber insurance
canadianunderwriter.caยท2d
๐Ÿ”Cryptography
Flag this post
Understanding prompt injections: a frontier security challenge
openai.comยท20h
๐Ÿ”Cryptography
Flag this post
Read post
zscaler.comยท3d
๐Ÿ”Cryptography
Flag this post
Britain calls it safety. It is censorship
aljazeera.comยท1d
๐Ÿ”Cryptography
Flag this post
Trend Micro ID Protection for Chrome, WhatsApp, and Messenger 39.1.3.137
majorgeeks.comยท18h
๐Ÿ”Cryptography
Flag this post
Cisco fixes critical UCCX flaw allowing Root command execution
securityaffairs.comยท20h
๐Ÿ”Cryptography
Flag this post
๐Ÿ›ก๏ธ **2026 Enterprise Cyber Resilience Strategy: AI-Powered, Breach-Proof, Future-Ready** ๐Ÿ›ก๏ธ
dev.toยท15hยท
Discuss: DEV
๐Ÿ”Cryptography
Flag this post
The Blaze: We've Identified the J6 Pipe Bomber and It's a Government Worker at a Three-Letter Agency
acecomments.mu.nuยท1d
๐ŸชจObsidian
Flag this post
From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
thehackernews.comยท1d
๐Ÿ”Cryptography
Flag this post
Cybercrims plant destructive time bomb malware in industrial .NET extensions
theregister.comยท16h
๐Ÿ”Cryptography
Flag this post
China-linked Storm-1849 spent October targeting Cisco ASA firewalls
scworld.comยท2dยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
Security news weekly round-up - 7th November 2025
dev.toยท11hยท
Discuss: DEV
โฐTime Management
Flag this post