week in security
20
Oct
2025

A week in security (October 13 – October 19)

October 17, 2025 – While Prosper says no funds or accounts were accessed, the stolen data could lead to targeted…

Why I Think Karpathy is Wrong on the AGI Timeline
20
Oct
2025

Why I Think Karpathy is Wrong on the AGI Timeline

Andrej Karpathy came on Dwarkesh’s podcast recently, and I have a number of thoughts. Many are saying that Karpathy thinks…

Product comparison: Detectify vs. Escape
20
Oct
2025

Product comparison: Detectify vs. Escape

Escape Pros Escape provides deep, contextual visibility by integrating with internal developer and cloud tools. Its AI-powered assessment finds complex…

Inside the messy reality of Microsoft 365 management
20
Oct
2025

Inside the messy reality of Microsoft 365 management

Most MSPs agree that Microsoft 365 is now the backbone of business operations, but a Syncro survey shows that complexity,…

PoC Exploit for Windows Server Update Services Vulnerability Enables Remote Code Execution
20
Oct
2025

PoC Exploit for Windows Server Update Services Vulnerability Enables Remote Code Execution

A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Microsoft’s Windows Server Update Services (WSUS), enabling unauthenticated…

Most AI privacy research looks the wrong way
20
Oct
2025

Most AI privacy research looks the wrong way

Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie…

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems
20
Oct
2025

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

Oct 20, 2025Ravie LakshmananCyber Espionage / National Security China on Sunday accused the U.S. National Security Agency (NSA) of carrying…

Microsoft breaks Windows 11 Recovery Environment in October update
20
Oct
2025

Microsoft breaks Windows 11 Recovery Environment in October update

Microsoft has confirmed an unspecified problem with the built-in Windows Recovery Environment (WinRE) following this month’s security update for its…

Insight to Acquire Sekuro - Australian Cyber Security Magazine
20
Oct
2025

Insight to Acquire Sekuro – Australian Cyber Security Magazine

Insight Enterprises subsidiary, Insight Enterprises Australia Pty Limited, has signed a definitive agreement to acquire Sekuro. The acquisition wis intended…

Why ex-military professionals are a good fit for cybersecurity
20
Oct
2025

Why ex-military professionals are a good fit for cybersecurity

After years of working as part of a team, many military veterans look for work that still carries meaning, challenge,…

President Trump fired the head of U.S. Cyber Command and NSA
20
Oct
2025

China finds “irrefutable evidence” of US NSA cyberattacks on time Authority

China finds “irrefutable evidence” of US NSA cyberattacks on time Authority Pierluigi Paganini October 20, 2025 China claims the US…

Nodepass: Open-source TCP/UDP tunneling solution
20
Oct
2025

Nodepass: Open-source TCP/UDP tunneling solution

When you think of network tunneling, “lightweight” and “enterprise-grade” rarely appear in the same sentence. NodePass, an open-source project, wants…