Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

cyberscoop.com

Cyberscoop

Get the latest updates from Cyberscoop directly as they happen.

Follow now 507 followers

Latest posts

Last updated 13 minutes ago

Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace

14 minutes ago

The United States is falling “increasingly behind” its adversaries in cyberspace, a...

Top House E&C Republicans query public for ideas on data privacy law

about 20 hours ago

Republican leaders on a key House committee are canvassing the public for...

Apple pulls end-to-end encryption feature from UK after demands for law enforcement access

1 day ago

Apple has pulled Advanced Data Protection, a feature that provides end-to-end encrypted...

No, that’s not the acting head of the Social Security Administration. That’s a former CISA employee.

1 day ago

A longtime former employee of the Cybersecurity and Infrastructure Security Agency, an...

Salt Typhoon gained initial access to telecoms through Cisco devices

2 days ago

Salt Typhoon gained initial access to Cisco devices as part of the...

SEC rebrands cryptocurrency unit to focus on emerging technologies

2 days ago

The Securities and Exchange Commission announced Thursday that it was changing its...

Russia-aligned threat groups dupe Ukrainian targets via Signal

3 days ago

Russian state threat groups have compromised Signal accounts used by Ukrainian military...

Energy CISO: Agencies can’t implement zero trust alone

3 days ago

Federal agencies need help from stakeholders outside of government to solve some...

Salt Typhoon telecom breach remarkable for its ‘indiscriminate’ targeting, FBI official says

3 days ago

One of the most notable elements of the monumental hack of major...

Edge device vulnerabilities fueled attack sprees in 2024

3 days ago

Edge devices harboring zero-day and n-day vulnerabilities were linked to the most...

Java security: If you ain’t cheatin,’ you ain’t tryin’

3 days ago

Most industries have rules of engagement. In sports, there are referees. In...

Threat researchers spot ‘device code’ phishing attacks targeting Microsoft accounts

8 days ago

Microsoft threat researchers discovered a series of what they are calling “device...