Please turn on your JavaScript for this page to function normally.
Google Play
Google Play is changing how Android apps access your contacts and location

Google’s new set of Google Play policy updates and account transfer feature strengthen user privacy and protect businesses from fraud. Google is also expanding features for …

Tails
Tails 7.6.2 patches vulnerability that could expose saved files

The Tails Project released Tails v7.6.2, an emergency release of the popular open source secure portable operating system. What is Tails? Tails, which is based on Debian …

malware
Cargo theft malware actor spent a month inside a decoy network before researchers pulled the plug

Proofpoint researchers executed a malicious payload from a threat actor known to target trucking and logistics companies in late February 2026, doing so inside a decoy …

North Korea
Two US nationals jailed over scheme that generated $5 million for the North Korean regime

Two US nationals have been sentenced for their role in a scheme that placed North Korean IT workers inside American companies under false identities. Over several years, the …

OpenAI
OpenAI updates Agents SDK, adds sandbox for safer code execution

OpenAI’s updated Agents SDK helps developers build agents that inspect files, run commands, edit code, and handle tasks within controlled sandbox environments. The update …

Claude
Anthropic tests user trust with ID and selfie checks for Claude

Anthropic announced identity verification for Claude using government ID and selfie checks, becoming the first major AI chatbot to do so, a move that may prove unpopular with …

GitHub
GitHub lays out copyright liability changes and upcoming DMCA review for developers

A U.S. Supreme Court ruling issued in March has settled a question that has circulated among platform operators and developers for years: whether a service provider can be …

Europe
EU cybersecurity standards are at risk if supplier ban passes

Today, the European standards body ETSI sent a formal position paper to the European Commission, calling for changes to the proposed Cybersecurity Act 2 (CSA2), the EU’s …

LLM
Command integrity breaks in the LLM routing layer

Systems that rely on LLM agents often send requests through intermediary routing services before reaching a model. These routers connect to different providers through a …

Ente Auth
Product showcase: Ente Auth encrypts, backs up, and syncs 2FA

Two-factor authentication (2FA) is an essential layer of protection for online accounts, and Ente Auth makes it easier to manage securely across devices. Ente Auth is a free, …

wireless
Wi-Fi roaming security practices for access network providers and identity providers

Public Wi-Fi roaming networks carry authentication credentials across multiple administrative boundaries, and the protocols governing that process vary widely in their …

AI EU
European AI spending set to hit $290 billion by 2029

European enterprises are committing serious money to AI, and the numbers are accelerating. According to IDC’s Worldwide AI and Generative AI Spending Guide, AI spending …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools