Introducing oniux: Kernel-level Tor isolation for any Linux app

Malware Attack and Counterattack

O2 VoLTE: locating any customer with a phone call

Breaking out of restricted mode: XSS to RCE in Visual Studio Code

Hello My Perverted Friend

Firefox Security Privacy Newsletter 2025 Q1

Ending TLS Client Authentication Certificate Support in 2026

Easily Using SSH with FIDO2/U2F Hardware Security Keys

Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks

Go Cryptography Security Audit

'Aggressive' Hackers of UK Retailers Are Now Targeting US Stores, Says Google

HACKSAT25: The first multi-tenant satellite unikernel security challenge

CHERIoT: The Last Ten Years

Tuscolo Static Certificate Transparency Log

Training Solo: New Set Of Serious Security Vulnerabilities Exposed For Intel & Arm CPUs

Data Safety Levels Framework: The foundation of how we look at data in Block

Chinese Hackers Exploit SAP NetWeaver RCE Flaw

Passwords are okay, impulsive Internet isn't

proposal: net/http: add CrossOriginForgeryHandler

Delivering malware via Google Calendar invites and PUAs in an npm package

JavaScript security best practices guide for developers

ETH Zurich researchers discover new security vulnerability in Intel processors

A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf]

Removal of Deepin Desktop from OpenSUSE Due to Packaging Policy Violation

Microsoft Says 394,000 Windows Computers Infected By Lumma Malware Globally

At Trump's $148 million meme coin dinner, 'the food sucked' and security was lax, attendee says

Private Internet (2024)

Go’s FIPS 140-3 Compliance

A Survey of Database TLS Libraries (2022)

Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape

More →