Skip to content
April 13, 2026
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
  • The vulnerability flood is here. Here’s what it means – and how to prepare
  • Adobe Reader zero-day vulnerability in active exploitation

itcnu.com

Newsletter
Random News
  • Cisco
  • Cyber Security
  • RSS APP cyber security
  • RSS APP cybersecurity
  • Uncategorized

Chief Editor

Saroj Mhr

Lorem ipsum is simply dummy text
  • Home
  • Single PostFeatured
  • Contact Us
  • Cyber Security
  • Cloud Security
  • Network Security
  • Application Security
  • News
Youtube Live
Headlines
  • How Sugar and Sedentary Lifestyle Affects Men

    3 years ago
  • Simple lifestyle changes that will help reduce stress

    3 years ago
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

    23 minutes ago
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

    2 days ago
  • The vulnerability flood is here. Here’s what it means – and how to prepare

    3 days ago
  • Adobe Reader zero-day vulnerability in active exploitation

    3 days ago
  • Behind the Blog: Smoking the Whole Carton

    3 days ago
  • World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

    4 days ago

Highlight News

  • Cyber Security

This Web Tool Sabotages AI Chatbots By Making Them Really, Really Slow

storshop.dk@gmail.com3 weeks ago06 mins

Watching people outsource their critical thinking, emotions, and sanity to glitchy “AI” chatbots has been one of the most uniquely terrifying aspects of being a human being in recent years.  While wealthy tech evangelists like Sam Altman continue to make wild proclamations about how large language models (LLMs) are destined to do our jobs and…

Read More
  • Cyber Security

An Adrenaline Junkie Millionaire’s Quest to Become a Cocaine Kingpin

storshop.dk@gmail.com3 weeks ago017 mins

The British de Havilland DH-112 Venom is one of the most iconic combat jets of the Cold War, with a distinctive two-pronged tail design that stretched out far behind the main body of the aircraft and a striking red and black paint job. It also gained a reputation for handling issues at high speeds. And…

Read More
  • Cyber Security

Ridicule as Praxis (with Emily Bender and Alex Hanna)

storshop.dk@gmail.com3 weeks ago02 mins

This week, Sam talks to Emily Bender and Alex Hanna about the marketing ploys of “artificial intelligence,” why ridicule works to keep big tech’s claims in check, and what makes them hopeful for the future. They’re the authors of The AI Con: How to Fight Big Tech’s Hype and Create the Future We Want. Dr….

Read More
  • Uncategorized

NICKEL ALLEY strategy: Fake it ‘til you make it

storshop.dk@gmail.com3 weeks ago01 mins

Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency Categories: Threat Research Tags: NICKEL ALLEY, Contagious Interview, North Korea, clickfix

Read More
  • Cyber Security

Scientists Narrow Down the Hunt for Aliens to 45 Planets

storshop.dk@gmail.com3 weeks ago06 mins

Welcome back to the Abstract! Here are the studies this week that visited strange new worlds, broke the adorability scale, pigged out, and took in an alien light show. First, scientists sift through thousands of planets to find the best possible sites for life. Then: meet a Cretaceous cutie, check out some python blood, and…

Read More
  • Cyber Security

Behind the Blog: Marathon and the Metaverse

storshop.dk@gmail.com3 weeks ago01 mins

This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss getting stories from Twitter, the metaverse, and the new game Marathon. EMANUEL: I think I’m addicted to Twitter again.  We haven’t written a ton about the war…

Read More
  • Cyber Security

Tiny City Fears Iran Drone Strikes Because of New Nuclear Weapons Datacenter

storshop.dk@gmail.com3 weeks ago05 mins

The tiny city of Ypsilanti, Michigan, is worried about being a target for drone strikes thanks to a planned datacenter that the University of Michigan is building to support nuclear weapons research According to Douglas Winters, the city’s attorney, the University and Los Alamos National Laboratories (LANL) “have put a big bulls eye target on…

Read More
  • Uncategorized

Android devices ship with firmware-level malware

storshop.dk@gmail.com4 weeks ago01 mins

Keenadu malware gives an attacker control over a device but appears to be used primarily to facilitate ad fraud Categories: Threat Research Tags: Android, Keenadu

Read More
  • Cyber Security

RIP Metaverse, an $80 Billion Dumpster Fire Nobody Wanted

storshop.dk@gmail.com4 weeks ago04 mins

A few things on the end of Horizon Worlds, the metaverse that Mark Zuckerberg believed in so much that he renamed his company:  1) It’s very sad that many of the people who worked on it have been unceremoniously laid off because their leaders appear to have no idea what they’re doing2) lol 3) lmao, even…

Read More
  • Cyber Security

Tinder Plans to Let AI Scan Your Camera Roll

storshop.dk@gmail.com4 weeks ago04 mins

Tinder plans to let machine vision algorithms loose on your camera roll. Instead of building a profile on their own, AI will scan users’ locally-stored photos—everything from gym selfies to pictures of their family, sensitive documents and dick pics—to help construct profiles by determining what users’ interests and values are. Dating apps are the go-to…

Read More
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 172
  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery ProgramsApril 13, 2026
    WebinarTV, a site that scrapes Zoom webinars without permission, has downloaded and posted Zoom Webinars for anonymous addiction recovery meetings, support groups for caregivers and people who suffer from chronic illness, and a meeting of nudists. WebinarTV’s Michael Robertson told me that the company asks every single person for permission to “promote” their webinars, but...
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists DiscoverApril 11, 2026
    Welcome back to the Abstract! Here are the studies this week that were ritually sacrificed, kicked out of the galaxy, taxonomically revised, and wore many hats. First, scientists shed light on human sacrifice and cousin sex using ancient DNA from the bones of people who lived in fifth-century Korea. Then: the yeeting of a star,...
  • The vulnerability flood is here. Here’s what it means – and how to prepareApril 10, 2026
    We can’t control the pace of AI-driven vulnerability discovery, but we can control how fast we respond. Categories: Sophos Insights Tags: LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim
  • Adobe Reader zero-day vulnerability in active exploitationApril 10, 2026
    Categories: Threat Research Tags: advisory, vulnerability, Adobe Reader
  • Behind the Blog: Smoking the Whole CartonApril 10, 2026
    This is Behind the Blog, where we share our behind-the-scenes thoughts about how a few of our top stories of the week came together. This week, we discuss gun violence and chatbots and acceptance of depravity. EMANUEL: It takes a lot for a post to shock me these days, especially if it’s from a known...

Recent Posts

  • WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs
  • The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
  • The vulnerability flood is here. Here’s what it means – and how to prepare
  • Adobe Reader zero-day vulnerability in active exploitation
  • Behind the Blog: Smoking the Whole Carton
  • World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover
  • Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight
  • We let OpenClaw loose on an internal network. Here’s what it found
  • FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
  • Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates

Categories

  • Cisco
  • Cyber Security
  • RSS APP cyber security
  • RSS APP cybersecurity
  • Uncategorized

Popular News

1

WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

  • Cyber Security
2

The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

  • Cyber Security
3

The vulnerability flood is here. Here’s what it means – and how to prepare

  • Uncategorized
4

Adobe Reader zero-day vulnerability in active exploitation

  • Uncategorized
5

Behind the Blog: Smoking the Whole Carton

  • Cyber Security
6

World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

  • Cyber Security
7

Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight

  • Cyber Security
8

We let OpenClaw loose on an internal network. Here’s what it found

  • Uncategorized

Trending News

Cyber Security
WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs 01
23 minutes ago
02
Cyber Security
The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover
03
Uncategorized
The vulnerability flood is here. Here’s what it means – and how to prepare

Recent News

1

WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs

  • Cyber Security
2

The Oldest Octopus Fossil Ever Isn’t An Octopus At All, Scientists Discover

  • Cyber Security
3

The vulnerability flood is here. Here’s what it means – and how to prepare

  • Uncategorized
4

Adobe Reader zero-day vulnerability in active exploitation

  • Uncategorized
5

Behind the Blog: Smoking the Whole Carton

  • Cyber Security
6

World’s Largest Group of Chimps Waging Deadly ‘Civil War,’ Scientists Discover

  • Cyber Security
7

Farmer Arrested for Speaking Too Long at Datacenter Town Hall Vows to Fight

  • Cyber Security
8

We let OpenClaw loose on an internal network. Here’s what it found

  • Uncategorized
Newsmatic - News WordPress Theme 2026. Powered By BlazeThemes.
  • Blog
  • Privacy
  • Contact