
Tech Companies Are Trying to Neuter Colorado’s Landmark Right-to-Repair Law
A bill in Colorado is a glimpse into the future of how corporations are working to limit the freedom people have to make their own fixes and upgrades.
Source FileReal-time disclosures, zero-day alerts, and threat intelligence filtered for security leaders.

A bill in Colorado is a glimpse into the future of how corporations are working to limit the freedom people have to make their own fixes and upgrades.
Source File
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware. [...]
Source File
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]
Source File
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]
Source File
The Vergecast is hosting a special in-person screening of Sneakers in partnership with IFC in New York City, and we're opening presale tickets exclusively to Verge subscribers. Sneakers is a movie about what happens when technology becomes more powerful than …
Source File
Special Dinner Invite Email Scam got me. - posted in Virus, Trojan, Spyware, and Malware Removal Help: I was sent a special dinner e-invite from a friend but it appears to be a potential virus. It downloaded a program and when complete it opened Ninite. Acc…
Source File
An exposed Amazon-hosted server allowed anyone to access reams of customer data without needing a password.
Source File
NoVoice can clone people's WhatsApp accounts on different devices, experts warn.
Source File
Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]
Source File
Sophisticated cyber-espionage campaign recently uncovered targeting government entities in Southeast Asia.
Source File
Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]
Source File
Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments. [...]
Source File