CyberSec RSS News Feeds

CyberSec RSS News Feeds

<<Page Under Construction 😉 >>

What does RSS even mean? RSS stands for “Really Simple Syndication”, which is a standardized system for the distribution of content from an online publisher to Internet users.

What this really means is that below, you’ll find some news feeds that I’ve chosen to follow on this page. I’m not responsible for the content, but I have tried to focus the sources to be interesting to Cybersecurity and Information Security professionals. Or, anyone who is interested in those topics. Or, anyone at all who would like to read them.

If you’re the author of a feed, or have a suggestion on one I should add to this page, please drop me a note!

General Cyber News Feeds

Forbes – Cybersecurity News
ZDNet – Security News
KrebsOnSecurity – In-depth Security News and Investigation
CSO Online, from IDG – Hottest Topics on Cyber and Security
The Hacker News – Cybersecurity News and Analysis
The Guardian – Data and Security
Threatpost – First Stop for Security News
Dark Reading – Connecting the Information and Security Community
SANS Institute – Security Awareness Tip of the Day
Help Net Security – Daily infosec news with a focus on enterprise security
IT Security Central – User Activity Monitoring | DLP | Employee Productivity
TechRepublic – Straight up Security
WeLiveSecurity – News, views, and insight from the ESET security community
Schneier on Security – A blog covering security and security technology
Lohrmann on Cybersecurity – Government Technology RSS Feed

Top

Forbes – Cybersecurity News

    Feed has no items.

Top

ZDNet – Security News

    Feed has no items.


Top

Krebs On Security – In-depth Security News and Investigation

  • Patch Tuesday, May 2026 Edition
    on 2026-05-12

    Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers -- including Apple, Google, Microsoft, Mozilla and […]

  • Canvas Breach Disrupts Schools & Colleges Nationwide
    on 2026-05-08

    An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service's login page with a ransom demand that threatened to leak data from 275 million students and faculty […]

  • Anti-DDoS Firm Heaped Attacks on Brazilian ISPs
    on 2026-04-30

    A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other network operators in Brazil, KrebsOnSecurity has learned. The firm's chief executive says the malicious activity resulted from a […]

  • ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty
    on 2026-04-21

    A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology […]

  • Patch Tuesday, April 2026 Edition
    on 2026-04-14

    Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in Windows Defender dubbed "BlueHammer." Separately, Google Chrome fixed its fourth zero-day of 2026, and an emergency update for […]

  • Russia Hacked Routers to Steal Microsoft Office Tokens
    on 2026-04-07

    Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without […]

Top

CSO Online, from IDG – Hottest Topics on Cyber and Security

    Feed has no items.

Top

The Hacker News – Cybersecurity News and Analysis

Top

The Guardian – Data and Security

    Feed has no items.

Top

Threatpost – First Stop for Security News

Top

Dark Reading – Connecting the Information and Security Community

    Feed has no items.

Top

SANS Institute – Security Awareness Tip of the Day

    Feed has no items.

Top

Help Net Security – Daily infosec news with a focus on enterprise security

  • Unpatched Microsoft Exchange Server vulnerability exploited (CVE-2026-42897)
    on 2026-05-15 by Zeljka Zorz

    A critical cross-site scripting (XSS) vulnerability (CVE-2026-42897) in Microsoft Exchange Server is being exploited by attackers, Microsoft warned on Thursday. A permanent fix is still in the works. In the meantime, Microsoft provided temporary mitigations. About CVE-2026-42897 CVE-2026-42897 affects on-premises versions of Microsoft Exchange […]

  • Rocky Linux launches opt-in security repository for urgent fixes
    on 2026-05-15 by Sinisa Markovic

    Rocky Linux has introduced a Security Repository that allows the distribution to ship urgent security fixes ahead of upstream Enterprise Linux when public exploit code exists and upstream patches are unavailable. “The repository is disabled by default. That’s intentional. The default Rocky Linux experience stays exactly what it has always […]

  • Keycard helps developers secure autonomous AI agents with scoped access
    on 2026-05-15 by Industry News

    Keycard has announced Keycard for Multi-Agent Apps, extending its platform to support delegated, session-based access across systems of autonomous agents. Keycard lets developers build apps where every agent has its own identity, access is scoped to each task and every action is fully attributable across agents, users and systems. “Enterprises […]

  • Deepfake detection is losing ground to generative models
    on 2026-05-15 by Sinisa Markovic

    Deepfake detection has been built around a single question for close to a decade. Given a video or audio clip, is it real or synthetic? Commercial detectors analyze pixels, frequencies, and biometric signals to answer that question, and the best of them post strong accuracy numbers on standard benchmarks. In deployment, performance drops sharply […]

  • Zombie linkages are keeping expired domains trusted for years
    on 2026-05-15 by Sinisa Markovic

    Domains expire, get transferred, and return to the market every day. The systems connected to those domains can continue trusting the original owner long after control has changed. Researchers at USC and the University of Twente examined this problem in three widely used systems: Web PKI, Maven Central, and Ethereum Name Service. They use the term […]

  • The AI oversight paradox: Is the investment worth the cost of watching it?
    on 2026-05-15 by Anamarija Pogorelec

    Unlike in 2025, when AI adoption and testing drove business strategies, organizations in 2026 want proven ROI before committing budgets, according to a report by Globalization Partners. How global executives characterize their organization’s approach to AI adoption (Source: Globalization Partners) 62% of business leaders said they felt pressure […]

Top

IT Security Central – User Activity Monitoring | DLP | Employee Productivity

    Feed has no items.

Top

TechRepublic – Straight up Security

Top

WeLiveSecurity – News, views, and insight from the ESET security community

Top

Schneier on Security – A blog covering security and security technology

  • Upcoming Speaking Engagements
    on 2026-05-14

    This is a current list of where and when I am scheduled to speak: I’m giving a virtual talk on “The Security of Trust in the Age of AI,” hosted by the Financial Women’s Association of New York, at 6:00 PM ET on May 21, 2026. I’m speaking at the Potsdam Conference on National Cybersecurity at the Hasso Plattner Institut in Potsdam, […]

  • How Dangerous Is Anthropic’s Mythos AI?
    on 2026-05-14

    Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not release it to the general public. Instead, it would only be available to a select group of companies to scan and fix their own software. The announcement requires […]

  • OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities
    on 2026-05-13

    The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Mythos. Note that the OpenAI model is generally available. Here is the Institute’s evaluation of Mythos. And here is an analysis of a smaller, cheaper model. It requires more scaffolding from the prompter, […]

  • Copy.Fail Linux Vulnerability
    on 2026-05-12

    This is the worst Linux vulnerability in years. TL;DR copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working PoC. It abuses the kernel crypto API (AF_ALG sockets) plus splice() to write four bytes at a time straight into the page cache of a file the attacker […]

  • LLMs and Text-in-Text Steganography
    on 2026-05-11

    Turns out that LLMs are really good at hiding text messages in other text messages.

  • Friday Squid Blogging: Giant Squid Live in the Waters of Western Australia
    on 2026-05-08

    Evidence of them has been found by analyzing DNA in the seawater. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

Top

Lohrmann on Cybersecurity – Government Technology RSS Feed

#StayVigilant
#StaySafe
#LookOutForEachOther

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.