read.ehrlich.dev
ai-curated rss
about
github
rss
dark
cybersecuritynews.com
posts from cybersecuritynews.com
hot
new
week
month
year
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth
480
New VoidStealer Variant Bypasses Chrome ABE Without Injection or Privilege Escalation
(cybersecuritynews.com)
24 days ago ·
indie games
·
exploit development
110
Malicious Script Injection in Trivy Compromise Enables Credential Theft
(cybersecuritynews.com)
23 days ago ·
security
·
containers
115
Oracle Issues Urgent Security Update for Critical RCE Flaw in Identity Manager and Web Services Manager
(cybersecuritynews.com)
24 days ago ·
security
·
git internals
70
Hackers Compromised 7,500+ Magento Websites to Upload Hidden Malicious Files and Steal Data
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
digital rights
28
FBI, CISA Warn Russian Hackers Are Targeting High-Value Individuals Through Signal
(cybersecuritynews.com)
23 days ago ·
security
·
cryptography
68
Perseus Android Malware Steals User Notes and Enables Full Device Takeover
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
reverse engineering
72
CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks
(cybersecuritynews.com)
24 days ago ·
security
·
malware analysis
45
Windows 11 March Update Breaks Microsoft Teams and OneDrive Sign-Ins
(cybersecuritynews.com)
24 days ago ·
security
·
git internals
24
Chrome Security Update Fixes 26 Vulnerabilities Allowing Remote Code Execution
(cybersecuritynews.com)
24 days ago ·
reverse engineering
·
open source
52
Ransomware Actors Expand EDR Killer Tactics Beyond Vulnerable Drivers
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
security
35
FBI, Thai Partners Target Southeast Asia Scam Centers Behind Cyber Fraud on Americans
(cybersecuritynews.com)
24 days ago ·
digital rights
·
internet culture
23
Anthropic Launches Projects Feature for Claude Cowork Desktop
(cybersecuritynews.com)
24 days ago ·
design
·
information design
28
Critical Jenkins Vulnerabilities Expose CI/CD Servers to RCE Attacks
(cybersecuritynews.com)
24 days ago ·
reverse engineering
·
git internals
20
Microsoft Unveils New Teams Optimizations for Windows App on iOS & Android
(cybersecuritynews.com)
24 days ago ·
webdev
·
devops
155
FortiGate Firewalls Exploited in Wave of Attacks to Breach Networks and Steal Credentials
(cybersecuritynews.com)
1 month ago ·
cloud infrastructure
·
site reliability
295
Malicious npm Packages Posing as Solara Executor Target Discord, Browsers, and Crypto Wallets
(cybersecuritynews.com)
1 month ago ·
open source
·
malware analysis
250
GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach
(cybersecuritynews.com)
1 month ago ·
malware analysis
42
Microsoft Releases Out-of-Band Patch For Critical RRAS RCE Vulnerabilities in Windows 11
(cybersecuritynews.com)
29 days ago ·
security
·
site reliability
25
Meta to Permanently Remove End-to-End Encryption Feature in Instagram DMs
(cybersecuritynews.com)
29 days ago ·
digital rights
·
internet culture
95
Critical LangSmith Account Takeover Vulnerability Puts Users at Risk
(cybersecuritynews.com)
1 month ago ·
security
58
Microsoft Confirms Windows 11 24H2/25H2 Bug Blocks Access to the System Drive C
(cybersecuritynews.com)
1 month ago ·
operating systems
·
linux
20
Authorities Crack Down on 45,000 Malicious IPs Powering Ransomware Attacks
(cybersecuritynews.com)
1 month ago ·
digital rights
·
malware analysis
42
Authorities Dismantle Malicious Proxy Service Used to Deploy Malware Attacking Thousands of Users
(cybersecuritynews.com)
1 month ago ·
digital rights
·
malware analysis
52
Starbucks Data Breach – Hundreds of Users’ Personal Data Exposed
(cybersecuritynews.com)
1 month ago ·
data engineering
·
digital rights
38
Apple Released Emergency Updates for iOS 15.8.7 to Thwart ‘Coruna’ Exploit Kit
(cybersecuritynews.com)
1 month ago ·
swift
·
reverse engineering
22
Loblaw Data Breach – Hackers Accessed IT Network and Customer Information
(cybersecuritynews.com)
1 month ago ·
security
22
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
(cybersecuritynews.com)
1 month ago ·
cloud infrastructure
·
self hosted
85
FBI Arrested U.S. Government Contractor Who Allegedly Stole More than $46 Million
(cybersecuritynews.com)
1 month ago ·
digital rights
·
malware analysis
85
WordPress Membership Plugin Vulnerability Let Attackers Create Admin Accounts
(cybersecuritynews.com)
1 month ago ·
security
95
PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability Exploited in the Wild
(cybersecuritynews.com)
1 month ago ·
site reliability
85
OpenAI Launches GPT-5.4 With Advanced Reasoning, Coding, and Computer-Use Capabilities
(cybersecuritynews.com)
1 month ago ·
ai
42
Amazon AWS-LC Vulnerabilities Allows Attackers to Bypass Certificate Chain Verification
(cybersecuritynews.com)
1 month ago ·
cryptography
·
security
38
Google Confirms 90 Zero-Day Vulnerabilities Actively Exploited in 2025
(cybersecuritynews.com)
1 month ago ·
malware analysis
72
Suspected DPRK Threat Actors Compromise Crypto Firms, Steal Keys and Cloud Assets in Coordinated Attacks
(cybersecuritynews.com)
1 month ago ·
cryptography
85
New MongoDB Vulnerability Lets Hackers Crash Any MongoDB Server
(cybersecuritynews.com)
1 month ago ·
git internals
38
Threat Actors Using Fake Claude Code Download to Deploy Infostealer
(cybersecuritynews.com)
1 month ago ·
malware analysis
·
reverse engineering
42
ClickFix Campaign Uses Fake VCs on LinkedIn to Deliver Malware to Crypto and Web3 Professionals
(cybersecuritynews.com)
1 month ago ·
malware analysis
12
Apache ActiveMQ Allow Attackers to Trigger DoS Attacks With Malformed Packets
(cybersecuritynews.com)
1 month ago ·
security
42
RedAlert Mobile Espionage Campaign Targets Civilians with Trojanized Rocket Alert App for Surveillance
(cybersecuritynews.com)
1 month ago ·
security
·
malware analysis
12
New Android Mirax Bot Advertised on Cybercriminal Forums Claiming Advanced Capabilities
(cybersecuritynews.com)
1 month ago ·
malware analysis
12
Phishing Emails Push Fake ChatGPT and Gemini iOS Apps To Steal Logins
(cybersecuritynews.com)
1 month ago ·
security
·
swift
12
Hackers Can Use Indirect Prompt Injection Allows Adversaries to Manipulate AI Agents with Content
(cybersecuritynews.com)
1 month ago ·
ai agents
18
Threat Actors Intensify Targeting of IP Cameras Across Middle East Amid Ongoing Conflict
(cybersecuritynews.com)
1 month ago ·
digital rights
12
Threat Actors Use New RingH23 Arsenal to Compromise MacCMS and CDN Infrastructure at Scale
(cybersecuritynews.com)
1 month ago ·
digital rights
18
Cisco Secure Firewall Management Vulnerability Enables Remote Code Execution
(cybersecuritynews.com)
1 month ago ·
security
1
Cybersecurity Weekly Newsletter – Notepad++ hack, Office 0-Day, ESXi 0-day Ransomware Attacks and More
(cybersecuritynews.com)
2 months ago ·
security
·
site reliability
1
LocalGPT – A Secure Local Device Focused AI Assistant Built in Rust
(cybersecuritynews.com)
2 months ago ·
exploit development
·
wasm
1
Microsoft Data Center Power Outage Disrupts Windows 11 Updates and Store Functionality
(cybersecuritynews.com)
2 months ago ·
cloud infrastructure
·
data engineering
1
BridgePay Payment Gateway Hit by Ransomware, Causing Nationwide Outages
(cybersecuritynews.com)
2 months ago ·
cloud infrastructure
1
Hackers Linked to State Actors Target Signal Messages of Military Officials and Journalists
(cybersecuritynews.com)
2 months ago ·
digital rights
1
OpenClaw v2026.2.6 Released With Support for Opus 4.6, GPT-5.3-Codex and Safety Scanner
(cybersecuritynews.com)
2 months ago ·
ai agents
1
OpenClaw Partners with VirusTotal to Secure AI Agent Skill Marketplace
(cybersecuritynews.com)
2 months ago ·
ai agents
1
BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution
(cybersecuritynews.com)
2 months ago ·
security
1
nmapUnleashed Makes Nmap Scanning More Comfortable and Effective
(cybersecuritynews.com)
2 months ago ·
digital rights
1
Cybercriminals Use Malicious Cybersquatting Attacks to Distribute Malware and Hijack Data
(cybersecuritynews.com)
2 months ago ·
malware analysis
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth