DETSEC
Home
(current)
Local Alerts
Blog
About
About Us
Event Calendar
Media Gallery
Newsletter
Login
Security news
Wired Security
This Hacker Conference Installed a Literal Anti-Virus Monitoring System
4 People Indicted in Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China
With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech
WIRED Roundup: DHS’s Privacy Breach, AI Romantic Affairs, and Google Sues Text Scammers
Vaping Is ‘Everywhere’ in Schools—Sparking a Bathroom Surveillance Boom
Krebs on Security
Mozilla Says It’s Finally Done With Two-Faced Onerep
The Cloudflare Outage May Be a Security Roadmap
Microsoft Patch Tuesday, November 2025 Edition
Google Sues to Disrupt Chinese SMS Phishing Triad
Drilling Down on Uncle Sam’s Proposed TP-Link Ban
Schneier on Security
Friday Squid Blogging: New “Squid” Sneaker
More on Rewiring Democracy
AI as Cyberattacker
Scam USPS and E-Z Pass Texts and Websites
Legal Restrictions on Vulnerability Disclosure
Dark Reading
[Dark Reading Virtual Event] Cybersecurity Outlook 2026
Deja Vu: Salesforce Customers Hacked Again, Via Gainsight
LINE Messaging Bugs Open Asian Users to Cyber Espionage
Cloudflare's One-Stop-Shop Convenience Takes Down Global Digital Economy
Hack the Hackers: 6 Laws for Staying Ahead of the Attackers
ThreatPost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
HackerNews
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
Why IT Admins Choose Samsung for Mobile Security
SecurityWeek
In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day
Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise
SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance
Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
Sophos
WhatsApp compromise leads to Astaroth deployment
Securing your network for the holidays
Advancing Cybersecurity for Microsoft Environments
From point-in-time audits to continuous confidence: How Sophos IT transformed identity defense
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
WonderHowTo
How Hackers Can Control Anything Remotely Using LoRa Modules
Hacking the Skies: How a $20 Device Can Spoof Drone IDs and Create Ghost Swarms
Create Your Own Ethical Hacking Kit with a Raspberry Pi 5
How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number
How to Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter