#security

[ follow ]
US politics
fromNextgov.com
13 hours ago

Secret Service is embracing new solutions to combat malicious drones, director says

The U.S. Secret Service is adopting kinetic mitigation technologies to counter drone threats for upcoming large-scale events.
#data-breach
Privacy professionals
fromTechCrunch
22 hours ago

Exclusive: Fashion retailer Express left customers' personal data and order details exposed to the internet

Express fixed a security flaw that exposed customer order details and personal information on its website.
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy professionals
fromTechCrunch
22 hours ago

Exclusive: Fashion retailer Express left customers' personal data and order details exposed to the internet

Express fixed a security flaw that exposed customer order details and personal information on its website.
Privacy professionals
fromSilicon Canals
2 weeks ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Information security
fromSecurityWeek
23 hours ago

Splunk Enterprise Update Patches Code Execution Vulnerability

Splunk has released fixes for high and medium-severity vulnerabilities in its products, including Splunk Enterprise, Cloud Platform, and MCP Server.
Marketing tech
fromExchangewire
1 day ago

Shinka Achieves SOC 2 Type II Certification

Shinka achieved SOC 2 Type II certification, demonstrating its commitment to security and compliance as it scales globally.
Information security
fromArs Technica
1 day ago

"TotalRecall Reloaded" tool finds a side entrance to Windows 11's Recall database

The Recall system's security is compromised by AIXHost.exe, which lacks the same protections after user authentication.
#bitcoin
fromBitcoin Magazine
2 weeks ago
Cryptocurrency

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Cryptocurrency
fromBitcoin Magazine
1 day ago

Bitcoin Developers Propose Bitcoin Quantum Migration Plan That Would Freeze Legacy Coins

Bitcoin developers are addressing quantum computing risks with BIP-361, proposing a shift to quantum-resistant cryptography to protect the network.
Cryptocurrency
fromBitcoin Magazine
6 days ago

Bitcoin Policy Institute Warns Quantum Advances Are Compressing Timeline For Network Upgrades

Recent quantum computing advancements may threaten Bitcoin's cryptography sooner than expected, but developers are actively preparing solutions.
Cryptocurrency
fromBitcoin Magazine
1 week ago

Bitcoin Could Be Quantum-Safe Without Protocol Changes

A new proposal introduces Quantum Safe Bitcoin to protect transactions from quantum attacks without altering Bitcoin's core rules.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Satoshi's 2010 Quantum Response Is Getting A 2026 Stress Test As Google Warns Timeline May Be Closer Than Expected

Bitcoin's security can adapt to cryptographic threats, with potential upgrades to stronger algorithms if vulnerabilities arise.
Privacy technologies
fromTechRepublic
1 day ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
Privacy technologies
fromTheregister
1 day ago

Raspberry Pi OS ends open-door policy for sudo

Raspberry Pi OS now requires a password for sudo by default on new installations, enhancing security but potentially inconveniencing users.
#iam
Information security
fromComputerworld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Information security
fromInfoWorld
2 days ago

Curity looks to reinvent IAM with runtime authorization for AI agents

Traditional IAM tools are inadequate for managing agent access, which is ephemeral and complex, requiring a new approach to runtime enforcement.
Music
fromConsequence
2 days ago

G. Love Loses Reported $424,000 in Crypto Account Hack

G. Love lost approximately $424,000 in Bitcoin due to downloading a fake Ledger app from the Apple App Store.
#django
Django
fromPycoders
2 days ago

PyCoder's Weekly | Issue #730

Django's type hints integration is complex due to its early release before Python's standardization.
fromDjango Project
1 week ago
Django

Django security releases issued: 6.0.4, 5.2.13, and 4.2.30

Django releases 6.0.4, 5.2.13, and 4.2.30 address security issues; users should upgrade promptly.
Django
fromPycoders
2 days ago

PyCoder's Weekly | Issue #730

Django's type hints integration is complex due to its early release before Python's standardization.
Django
fromDjango Project
1 week ago

Django security releases issued: 6.0.4, 5.2.13, and 4.2.30

Django releases 6.0.4, 5.2.13, and 4.2.30 address security issues; users should upgrade promptly.
DevOps
fromAzure DevOps Blog
2 days ago

April Patches for Azure DevOps Server - Azure DevOps Blog

Customers should update to the latest version of Azure DevOps Server for security and reliability.
Information security
fromZero Day Initiative
2 days ago

Zero Day Initiative - The April 2026 Security Update Review

Several critical vulnerabilities in Microsoft products require attention, particularly those related to Office, RDP, Active Directory, and .NET Framework.
Information security
fromSecurityWeek
2 days ago

Adobe Patches 55 Vulnerabilities Across 11 Products

Adobe's Patch Tuesday updates address 55 vulnerabilities across 11 products, with critical ColdFusion flaws requiring immediate attention.
UK politics
fromwww.theguardian.com
2 days ago

UK's armed forces are in a sad state and they have only themselves to blame

George Robertson criticizes Keir Starmer for complacency in defense investment amid growing security threats.
#google
Germany news
fromwww.dw.com
3 days ago

Germany, Ukraine discuss drone deal as Merz hosts Zelenskyy

Germany supports Ukraine's EU membership and emphasizes the need for peace and security in ongoing discussions.
DevOps
fromInfoQ
3 days ago

Beyond One-Click: Designing an Enterprise-Grade Observability Extension for Docker

Docker Extensions enhance developer productivity but may not meet enterprise needs for security, compliance, and integration.
Information security
fromnews.bitcoin.com
3 days ago

Relm Insurance Launches Crypto and Cannabis Kidnap Coverage

Relm Insurance launched a specialized kidnap and ransom insurance product for the Web3 and cannabis sectors to address rising physical threats.
Berlin
fromwww.dw.com
3 days ago

Germany news: Merz hosts Zelenskyy in Berlin

Ukrainian President Volodymyr Zelenskyy visited Berlin for government consultations, prompting extraordinary security measures.
#openai
Silicon Valley
fromFuturism
6 days ago

Someone Just Threw a Molotov Cocktail At Sam Altman's House

A suspect was arrested for attacking Sam Altman's home with a Molotov cocktail and making threats outside OpenAI's headquarters.
Europe news
fromwww.businessinsider.com
3 days ago

The West is preparing for cheap drone attacks, but many businesses and civilians can only watch, not stop them

Civilian and corporate organizations struggle to counter small drone threats due to legal restrictions, leading to increased demand for drone detection devices.
New York Rangers
fromwww.bbc.com
3 days ago

Falkirk will 'learn lessons' after alleged Rangers fan incidents

Falkirk FC will review ticketing and security after incidents involving away fans during the match against Rangers.
Juventus
fromConsequence
3 days ago

Jorginho Admits Own Goal in Chappell Roan Security Guard Mix-Up

Jorginho acknowledged misunderstanding the incident involving Chappell Roan and clarified that her security guard was not representing her.
Information security
fromInfoWorld
3 days ago

Critical flaw in Marimo Python notebook exploited within 10 hours of disclosure

CVSS-9.3 vulnerability in Marimo allows unauthenticated remote code execution, exploited shortly after disclosure.
Business intelligence
fromTechzine Global
4 days ago

AI deployment in networks is stalling as pressure on infrastructure mounts

AI adoption in network environments is slower than expected, with increasing infrastructure demands and significant challenges in deployment and integration.
#cryptocurrency
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#ai
Artificial intelligence
fromFuturism
5 days ago

The Effects of AI-Generated Code Tearing Through Corporations Is Actually Kind of Funny

Corporations are facing challenges with AI-generated code, leading to increased workloads for programmers and potential security vulnerabilities.
Software development
fromMedium
2 weeks ago

The AI Revolution in Development: Why Outer Loop Agents Are the Next Big Thing

AI is set to revolutionize post-code push processes, automating tasks like security fixes, error logging, and code reviews.
Artificial intelligence
fromSecurityWeek
2 weeks ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
Artificial intelligence
fromFuturism
5 days ago

The Effects of AI-Generated Code Tearing Through Corporations Is Actually Kind of Funny

Corporations are facing challenges with AI-generated code, leading to increased workloads for programmers and potential security vulnerabilities.
Privacy technologies
fromnews.bitcoin.com
1 week ago

Ethereum's Vitalik Buterin Warns Against AI Agent Security Risks, Shares His Private LLM Stack

Vitalik Buterin has transitioned to a fully local AI setup, citing security concerns with cloud AI services.
Software development
fromMedium
2 weeks ago

The AI Revolution in Development: Why Outer Loop Agents Are the Next Big Thing

AI is set to revolutionize post-code push processes, automating tasks like security fixes, error logging, and code reviews.
Artificial intelligence
fromSecurityWeek
2 weeks ago

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI assistance in policy as code can introduce serious flaws, leading to incorrect access permissions despite syntactically valid policies.
fromwww.nytimes.com
6 days ago

Video: Mexico's Police Focus on World Cup While Thousands Remain Missing

Families of the disappeared argue that the focus on safety for World Cup teams and fans ignores their desperate search for missing loved ones, highlighting a stark contrast in priorities.
US news
fromThe Cipher Brief
6 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
Information security
fromTechRepublic
6 days ago

Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed

A critical flaw in the EngageLab SDK allowed malicious apps to exploit trusted permissions, affecting over 50 million Android users.
DevOps
fromInfoQ
1 week ago

CNCF and Kusari Partner to Strengthen Software Supply Chain Security Across Cloud-Native Projects

CNCF and Kusari collaborate to enhance software supply chain security for cloud-native projects using AI-powered tools.
Information security
fromSecurityWeek
1 week ago

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

Google released Chrome 147, fixing 60 vulnerabilities, including two critical ones affecting WebML, with significant bug bounties awarded to researchers.
London politics
fromwww.independent.co.uk
1 week ago

Police get extra 5m to patrol places of worship after Golders Green attack

Police forces in London and Manchester will receive £5 million to enhance security around places of worship following recent attacks.
fromwww.dw.com
1 week ago

India news: Marco Rubio to visit India for trade talks

US Secretary of State Marco Rubio will visit India in May, focusing on trade and security to limit the impact of the US-Israel war with Iran.
World news
Web frameworks
fromInfoQ
1 week ago

Cloudflare Introduces EmDash: TypeScript CMS Positioned as WordPress Successor

EmDash is a new open-source CMS by Cloudflare, designed to enhance security and scalability compared to WordPress.
#artificial-intelligence
Business intelligence
fromComputerWeekly.com
1 week ago

Cisco: Network readiness a determining factor for AI success | Computer Weekly

Two-thirds of industrial organizations have adopted AI in live operations, with infrastructure and security being crucial for successful transformation.
Privacy professionals
fromSecurityWeek
1 week ago

The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security

Visibility through security measures can deter undesirable behavior and enhance safety in challenging situations.
#quantum-computing
Cryptocurrency
fromBitcoin Magazine
1 week ago

Adam Back Says Quantum Threat To Bitcoin Is Decades Away

Quantum computing poses no immediate threat to Bitcoin's cryptographic security, but preparation for future risks is essential.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Google's Quantum Advances Bring Bitcoin Security Debate Into Focus

Breaking elliptic curve cryptography may require fewer quantum resources than previously thought, raising urgency in the crypto industry.
Node JS
fromZero Day Initiative
1 week ago

Zero Day Initiative - Node.js Trust Falls: Dangerous Module Resolution on Windows

Node.js module resolution can lead to security vulnerabilities if malicious packages are placed in the root node_modules directory.
Information security
fromThe Hacker News
1 week ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
#meta
EU data protection
fromTNW | Apps
1 week ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
fromwww.bbc.com
1 week ago
Privacy professionals

Ex-Meta worker investigated for downloading 30,000 private Facebook photos

A former Meta employee is under investigation for downloading 30,000 private Facebook images using a program to bypass security checks.
EU data protection
fromTNW | Apps
1 week ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
Privacy professionals
fromwww.bbc.com
1 week ago

Ex-Meta worker investigated for downloading 30,000 private Facebook photos

A former Meta employee is under investigation for downloading 30,000 private Facebook images using a program to bypass security checks.
#shoplifting
UK news
fromwww.standard.co.uk
1 week ago

Waitrose worker sacked after 17 years for confronting Lindt Easter egg shoplifter in Clapham store

A long-serving Waitrose employee was dismissed after intervening in a shoplifting incident involving luxury Easter eggs.
UK news
fromwww.theguardian.com
1 week ago

Waitrose employee sacked after stopping shoplifter from taking Easter eggs

A Waitrose employee was fired for intervening in a shoplifting incident after 17 years of service.
UK news
fromwww.standard.co.uk
1 week ago

Waitrose worker sacked after 17 years for confronting Lindt Easter egg shoplifter in Clapham store

A long-serving Waitrose employee was dismissed after intervening in a shoplifting incident involving luxury Easter eggs.
UK news
fromwww.theguardian.com
1 week ago

Waitrose employee sacked after stopping shoplifter from taking Easter eggs

A Waitrose employee was fired for intervening in a shoplifting incident after 17 years of service.
fromnews.bitcoin.com
1 week ago

Solana Foundation Launches STRIDE Security Program for DeFi Protocols Following Drift Incident

The program, which stands for Solana Trust, Resilience and Infrastructure for DeFi Enterprises, moves away from the traditional model of one-off audits and replaces it with continuous, foundation-funded protection scaled to each protocol's size and risk profile.
Information security
Software development
fromZDNET
1 week ago

Why Microsoft is forcing Windows 11 25H2 update on all eligible PCs

Microsoft is mandating the update to Windows 11 25H2 for eligible PCs running 24H2 due to security reasons.
fromwww.mediaite.com
1 week ago

Elon Musk's DOGE Security Deputized as Federal Agents Despite Lack of Basic Law Enforcement Training': Report

Members of Musk's private security team were deputized as federal agents last year, allowing them to carry firearms in certain federal buildings, despite some of the guards failing to meet what the Marshals Service considered to be the basic requirements to be deputized as federal law enforcement.
Washington DC
Node JS
fromYcombinator
1 week ago

Show HN: I rewrote my 2012 self-signed cert generator in Go - cert-depot.com | Hacker News

A new certificate generation tool was built in Go, eliminating external dependencies and improving security features.
Berlin food
fromThe Washington Post
1 week ago

It's Holy Week, but Jerusalem's Old City is quiet and eerily empty

The Austrian Pilgrim Hospice in Jerusalem experiences an unusually empty Holy Week due to wartime conditions and security restrictions.
Mission District
fromMission Local
1 week ago

The security guard who greets everyone in Mission Dolores

Jose Oscar Hernandez, a beloved security guard, fosters community connections at Holy Family Day Home, enhancing the neighborhood's spirit with his daily greetings.
Software development
fromInfoWorld
1 week ago

Internet Bug Bounty program hits pause on payouts

The Internet Bug Bounty program is pausing submissions for bug reports in open-source software to reassess its approach to security.
Design
fromInfoQ
2 weeks ago

Panel: Taking Architecture Out of the Echo Chamber

Architecture's importance is growing, necessitating a shift in practice to avoid past mistakes and engage with broader conversations.
fromInfoQ
2 weeks ago

Axios npm Package Compromised in Supply Chain Attack

The npm ecosystem absorbed one of its most significant supply chain attacks on March 31, 2026, when two versions of Axios were found to contain a fully functional Remote Access Trojan.
Node JS
#citigroup
France news
fromThe Local France
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromThe Local Germany
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to security concerns following a thwarted attack on a US bank.
France news
fromwww.thelocal.com
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromThe Local France
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
France news
fromThe Local Germany
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to security concerns following a thwarted attack on a US bank.
France news
fromwww.thelocal.com
2 weeks ago

Citigroup orders home-working as US banks in Paris and Frankfurt tighten security

Citigroup has instructed employees in Paris and Frankfurt to work from home due to heightened security concerns following a thwarted attack on a US bank.
Business intelligence
fromInfoWorld
2 weeks ago

Kilo targets shadow AI agents with a managed enterprise platform

KiloClaw for Organizations enhances AI agent management with centralized governance, addressing security and compliance concerns for enterprises.
World politics
fromwww.theguardian.com
2 weeks ago

New Zealand signs defence pact with Cook Islands after quarrel over China deal

New Zealand and the Cook Islands signed a defence and security declaration, resolving a diplomatic row over the Cook Islands' agreements with China.
React
fromThisweekinreact
2 weeks ago

This Week In React #275: Next.js, TanStack, React Compiler, Inertia, Astro, Trusted Types, Signals | ExecuTorch, Unistyles, RN.run, Preflight, Confetti, AI, Lynx | Pretext, Axios, Node, Playwright, Turborepo | This Week In React

Next.js introduces a stable Adapter API for better compatibility across platforms, enhancing its functionality and support for developers.
New York City
fromgizmodo.com
2 weeks ago

Mamdani Lifts NYC TikTok Ban for City Employees, but with Some Unusual Restrictions

New York City employees can now use TikTok on city devices with strict restrictions after a previous ban due to security concerns.
fromInfoWorld
2 weeks ago

Anthropic employee error exposes Claude Code source

"Any exposure of source code or system-level logic is significant, because it shows how controls are implemented. In AI systems, that layer is especially critical. The orchestration, prompts, and workflows effectively define how the system operates. If those are exposed, it can make it easier to identify weaknesses or manipulate outcomes."
Java
#journalism
World news
fromwww.theguardian.com
2 weeks ago

American journalist kidnapped in Iraq, officials say

An American journalist, Shelly Kittleson, has been kidnapped in Baghdad by a suspected Iranian-backed group amid deteriorating regional security.
World news
fromwww.theguardian.com
2 weeks ago

American journalist kidnapped in Iraq, officials say

An American journalist, Shelly Kittleson, has been kidnapped in Baghdad by a suspected Iranian-backed group amid deteriorating regional security.
Media industry
fromwww.mediaite.com
2 weeks ago

JUST IN: American Journalist Kidnapped in Baghdad, Iraqi Ministry Says

American reporter Shelly Kittleson was kidnapped in Baghdad by unidentified perpetrators affiliated with Iranian-backed Iraqi Shiite militias.
React
fromInfoQ
2 weeks ago

TanStack Start Introduces Import Protection to Enforce Server and Client Boundaries

TanStack Start introduces import protection to prevent server-only and client-only code from leaking into incorrect bundles.
Privacy technologies
fromWIRED
2 weeks ago

This App Makes Even the Sketchiest PDF or Word Doc Safe to Open

Dangerzone is a free tool that safely opens potentially harmful documents by converting them into secure image-based PDFs.
fromThe Hacker News
2 weeks ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

"Its sole purpose is to execute a postinstall script that acts as a cross-platform remote access trojan (RAT) dropper, targeting macOS, Windows, and Linux," security researcher Ashish Kurmi said.
Node JS
fromwww.dw.com
2 weeks ago

Nigeria: Curfew in Jos area after attack near university

The government under the leadership of His Excellency, Governor Caleb Manasseh Mutfwang strongly condemns this barbaric and unprovoked attack on innocent citizens and assures the public that all necessary measures are being taken to apprehend the perpetrators and bring them to justice.
World news
France news
fromFortune
2 weeks ago

'They use proxies': France probes possible Iran link to thwarted bomb attack outside of a Bank of America | Fortune

French authorities investigate a thwarted bomb attack in Paris, suspecting a link to Iran due to similarities with other attacks in Europe.
[ Load more ]