On (not) using “cryptographic hashes” for hash table keys

Finding a RCE in my old TP-Link router

Smart App Control

Kettle: Attested builds for verifiable software provenance

C8s: A Confidential Kubernetes Architecture

Project Wycheproof tests crypto libraries against known attacks

Plastic Flowers to Protect the Hive

Microsoft Issues Warning About Linux 'Copy Fail' Vulnerability

Ransomware Is Getting Uglier As Cybercriminals Fake Leaks and Skip Encryption Entirely

Post-Quantum VPN Based on QUIC

U.S. Congressional Leaders Warn Canadian Lawful Access Plans Harm U.S. National Security and Economic Interests

US bank discloses security lapse after sharing customer data with AI app

A million baby monitors and security cameras were easily viewable by hackers

Major DNS Outage Hits .de Domains: DNSSEC Failure on May 5, 2026

The Kremlin has been throttling the internet and blaming security threats. Many Russians aren't buying it

Getting LLMs Drunk to Find Remote Linux Kernel OOB Writes (and More)

4 Open-Source Security Tools Every Go Dev Should Know

Microsoft Edge will load all your passwords into memory in plaintext, but Microsoft says it's not a security concern

A hacker ran me over with a robot lawn mower | Forget robovacs — Yarbo’s bladed robots are an even bigger security nightmare

Dirty Frag: Linux kernel hit by second major security flaw in two weeks

Canadian sues U.S. Homeland Security, which allegedly sought his Google data after critical social media posts

FCC reverses course, allows software updates for foreign-made drones and routers until 2029 — agency says blocking security patches could create cybersecurity risks

Microsoft Update Warning—Windows 11 Security Fix Breaks Backups

Australian police officers can be tracked due to a security flaw in tasers and body-worn cameras

Google Says Hackers Used AI To Create Zero Day Security Flaw For the First Time

Proton's password manager passes audit by top security firm – Proton

Access to frontier AI will soon be limited by economic and security constraints

City and Flock Manipulate Security Scores

Rooting a VMC2040 security camera

Do we really check library security?

More →