• Kontrast
    • Izgled
    • Font
06.12.2025

Security – Weekly summary (29.11.2025 – 06.12.2025)

The past week has seen significant developments in the realm of security, with various stories shedding light on the complexities of autonomous driving technology, government-mandated app installations, and the...

Read more
05.12.2025

Feds find more complaints of Tesla’s FSD running red lights and crossing lanes

The National Highway Traffic Safety Administration (NHTSA) has uncovered at least 80 cases where Tesla’s Full Self-Driving (FSD) system violated traffic rules by running red lights or crossing into...

Read more
TechCrunch
03.12.2025

After intense backlash, India pulls mandate to preinstall government app on smartphones

India has abandoned its plan to mandate preinstallation of the Sanchar Saathi government app on smartphones due to public backlash and privacy concerns. The telecom ministry clarified the app...

Read more
TechCrunch
01.12.2025

Flock Uses Overseas Gig Workers to Build Its Surveillance AI

Flock employs remote workers from Upwork in the Philippines to annotate surveillance footage. An accidental data leak revealed these workers review and categorize footage of US vehicles and people....

Read more
Wired Security
27.11.2025

Advanced VirusTotal Tutorial | Learn Cybersecurity

This video explores the use of VirusTotal, a powerful tool in cybersecurity, to analyze malware. The creator demonstrates how to search for similar files using import hashes, a unique...

Read more
YT | Cybersecurity Essentials Playlist
27.11.2025

Best Malware Analysis Tools | Learn Malware Analysis

Here is a 5-sentence video description: This video covers some of the best malware analysis tools used for static and dynamic analysis. The tools discussed include Process Explorer,...

Read more
YT | Cybersecurity Essentials Playlist
27.11.2025

The host discusses various topics related to cyber security, including the importance of motivation and finding passion in one's work. He also talks about the future of pentesting with...

Read more
YT | The Cyber Mentor
27.11.2025

How to Decrypt Ransomware: A full guide

- This video explores the options available to decrypt files after a ransomware attack. - It discusses how some ransomware variants may have flaws in their encryption algorithm,...

Read more
YT | Cybersecurity Essentials Playlist
Show more