Please turn on your JavaScript for this page to function normally.
Stratis
Linux storage management tool Stratis 3.9.0 adds online encryption and cache-less pool startup

Stratis is a tool for configuring pools and filesystems with enhanced storage functionality within the existing Linux storage management stack. It focuses on a command-line …

BleachBit
Open-source privacy tool BleachBit 6.0.0 upgrades code signing across Windows and Linux

System cleaning utilities have grown more relevant as web browsers stockpile larger volumes of cached data, tracking artifacts, and site storage on local disks. The …

IPFire
Open-source IPFire DNS Firewall blocks malware and phishing at the resolver

The IPFire project shipped Core Update 201 for its 2.29 release line, bringing DNS-layer domain blocking into the open-source firewall distribution. The update replaces two …

Help Net Security
BeyondTrust advances AI-native identity security with PathfinderAI and MCP Server

BeyondTrust has announced new AI capabilities for the Pathfinder platform, advancing the company’s vision for AI-native identity security operations. The release introduces …

arXiv
Even cybersecurity researchers are exposing secrets in their arXiv LaTeX source

Researchers submit papers to arXiv every day, and most of them upload the LaTeX source files alongside the PDF. The preprint service requires source uploads when available, …

automation
OpenAI releases Symphony to automate Codex work through Linear

Engineering teams running coding agents at scale find themselves managing dozens of parallel sessions across browser tabs and command-line windows. OpenAI has released an …

ics cybersecurity
ICS intrusion detection has blind spots that complicate plant security

Industrial control systems on plant floors run alongside a growing layer of monitoring software meant to catch intruders before they reach a turbine, a valve, or a chemical …

cybersecurity jobs
Cybersecurity jobs available right now: April 28, 2026

CISO Nokia | Finland | Hybrid – No longer accepting applications As a CISO, you will define and maintain the information security strategy for classified operations, …

phishing awareness
Cyber crooks got Robinhood to send phishing emails to its own users

An email phishing campaign is currently targeting a subset of users of the Robinhood brokerage / investment platform and, judging by the comments on Reddit, some have fallen …

hospital
500,000 UK volunteers’ medical data listed for sale on Alibaba

Medical data from around 500,000 British volunteers in the health research project, the UK Biobank, was offered for purchase through the Chinese marketplace Alibaba, the …

Microsoft Teams
Attackers use MS Teams, fake mailbox repair utility to breach organizations

A threat group has penetrated corporate networks by impersonating IT helpdesk staff on Microsoft Teams, tricking employees into downloading malware and surrendering their …

data breach
Hackers claim millions of records stolen in ADT breach

ADT, a Florida-based provider of alarm monitoring solutions, confirmed that hackers breached its systems and accessed a portion of customer data. According to a company …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools