DETSEC
Home
(current)
Local Alerts
Blog
About
About Us
Event Calendar
Media Gallery
Newsletter
Login
Security news
Wired Security
Zohran Mamdani Just Inherited the NYPD Surveillance State
FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves
An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’
Hack Exposes Kansas City’s Secret Police Misconduct List
How to Hack a Poker Game
Krebs on Security
Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody
Aisuru Botnet Shifts from DDoS to Residential Proxies
Canada Fines Cybercrime Friendly Cryptomus $176M
Email Bombs Exploit Lax Authentication in Zendesk
Patch Tuesday, October 2025 ‘End of 10’ Edition
Schneier on Security
Scientists Need a Positive Vision for AI
Cybercriminals Targeting Payroll Sites
AI Summarization Optimization
Friday Squid Blogging: Giant Squid at the Smithsonian
Will AI Strengthen or Undermine Democracy?
Dark Reading
ThreatPost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
HackerNews
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
Securing the Open Android Ecosystem with Samsung Knox
Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
SecurityWeek
Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns
Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders
Flare Raises $30 Million for Threat Exposure Management Platform
Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation
Malanta Emerges from Stealth With $10 Million Seed Funding
Sophos
Faster, safer, stronger: Sophos Firewall v22 security enhancements
5 ways to strengthen your firewall and endpoint’s defenses against ransomware
Detecting fraudulent North Korean hires: A CISO playbook
Phake phishing: Phundamental or pholly?
BRONZE BUTLER exploits Japanese asset management software vulnerability
WonderHowTo
How Hackers Can Control Anything Remotely Using LoRa Modules
Hacking the Skies: How a $20 Device Can Spoof Drone IDs and Create Ghost Swarms
Create Your Own Ethical Hacking Kit with a Raspberry Pi 5
How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number
How to Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter