feed.sh
$ fetch-rss --list-sources
→ Bad Sector Labs · Cloudflare Blog · CNCF Blog · HashiCorp Blog · Infosecurity Magazine · Krebs on Security · Last Week in AWS · Risky Business · Risky Business Newsletter · SANS Internet Stormcast · Schneier on Security · Security Brief NZ · The Hacker News · The New Stack · The Register · Troy Hunt
$ fetch-rss --stats
→ 123 articles · 16 sources · refreshed on deploy
Bad Sector Labs ↗
SecurityResearch
Cloudflare Blog ↗
CloudInfrastructure
- 13 Feb Shedding old code with ecdysis: graceful restarts for Rust services at Cloudflare ↗
- 12 Feb Introducing Markdown for Agents ↗
- 05 Feb 2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults ↗
- 03 Feb Improve global upload performance with R2 Local Uploads ↗
- 30 Jan Google’s AI advantage: why crawler separation is the only path to a fair Internet ↗
- 30 Jan Building vertical microfrontends on Cloudflare’s platform ↗
- 29 Jan Introducing Moltworker: a self-hosted personal AI agent, minus the minis ↗
- 27 Jan Building a serverless, post-quantum Matrix homeserver ↗
- 26 Jan Cable cuts, storms, and DNS: a look at Internet disruptions in Q4 2025 ↗
- 23 Jan Route leak incident on January 22, 2026 ↗
CNCF Blog ↗
KubernetesCloud
- 18 Feb Announcing Kyverno 1.17! ↗
- 13 Feb KubeCon + CloudNativeCon Europe 2026 Co-located Event Deep Dive: Telco Day ↗
- 11 Feb Security Slam Returns for 2026 — Now Open to All Open Source Projects ↗
- 09 Feb What CNCF Project Velocity in 2025 Reveals About Cloud Native’s Future ↗
- 09 Feb Cluster API v1.12: Introducing in-place updates and chained upgrades ↗
- 06 Feb Dragonfly v2.4.0 is released ↗
- 04 Feb Conversing with Large Language Models using Dapr ↗
- 04 Feb CNCF celebrates successful mentees from LFX Mentorship 2025 Term 3 ↗
- 03 Feb The Best of KubeCon + CloudNativeCon: Watch the video! ↗
- 02 Feb OpenTelemetry Collector vs agent: How to choose the right telemetry approach ↗
HashiCorp Blog ↗
InfrastructureDevOps
- 17 Feb HCP Packer adds SBOM vulnerability scanning ↗
- 16 Feb Vault Radar 2025 recap: Expanding visibility, deepening integration, and simplifying security ↗
- 13 Feb Vault certificates and secrets inventory reporting: Improve visibility and audit readiness ↗
- 12 Feb Securing modern workloads with HashiCorp Vault and WIF ↗
- 10 Feb How World Bank manages hybrid cloud complexity with Terraform ↗
- 09 Feb How Duke Energy enforces cloud security at scale with Terraform & Vault, and 6 lessons ↗
- 05 Feb How to control session routing for multi-IP hosts in Boundary ↗
- 04 Feb 5 lessons from banking & finance: Why we need zero trust secrets management ↗
- 03 Feb PCI DSS 4.0.1 compliance with Vault, Boundary & Vault Radar ↗
- 02 Feb Introducing HashiCorp Agent Skills ↗
Infosecurity Magazine ↗
Security
- 19 Feb Researchers Reveal Six New OpenClaw Vulnerabilities ↗
- 18 Feb Cryptojacking Campaign Exploits Driver to Boost Monero Mining ↗
- 18 Feb AI Assistants Used as Covert Command-and-Control Relays ↗
- 18 Feb Record Number of Ransomware Victims and Groups in 2025 ↗
- 18 Feb Chinese APT Group Exploits Dell Zero-Day for Two Years ↗
- 17 Feb Android 17 Beta Introduces Secure-By-Default Architecture ↗
- 17 Feb Apple Expands RCS Encryption and Memory Protections in iOS 26.4 ↗
- 17 Feb Low-Skilled Cybercriminals Use AI to Perform "Vibe Extortion" Attacks ↗
- 17 Feb Over-Privileged AI Drives 4.5 Times Higher Incident Rates ↗
- 17 Feb Significant Rise in Ransomware Attacks Targeting Industrial Operations ↗
Risky Business ↗
SecurityPodcast
- 18 Feb Risky Business #825 -- Palo Alto Networks blames it on the boogie ↗
- 11 Feb Risky Business #824 -- Microsoft's Secure Future is looking a bit wobbly ↗
- 04 Feb Risky Business #823 -- Humans impersonate clawdbots impersonating humans ↗
- 28 Jan Risky Business #822 -- France will ditch American tech over security risks ↗
- 21 Jan Risky Business #821 -- Wiz researchers could have owned every AWS customer ↗
Risky Business Newsletter ↗
SecurityNewsletter
- 19 Feb Srsly Risky Biz: Europe's Cyber Bullets Can't Replace Political Will ↗
- 18 Feb Risky Bulletin: Supply chain attack plants backdoor on Android tablets ↗
- 16 Feb Risky Bulletin: Cambodia promises to dismantle scam networks by April ↗
- 13 Feb Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI ↗
- 12 Feb Srsly Risky Biz: Microsoft's Forgoes Its Secure Future ↗
- 11 Feb Risky Bulletin: Chinese cyber-spies breached all of Singapore's telcos ↗
- 09 Feb Risky Bulletin: SmarterTools hacked via its own product ↗
- 06 Feb Risky Bulletin: Denmark recruits hackers for offensive cyber operations ↗
- 05 Feb Srsly Risky Biz: Google's Cyber Disruption Unit Kicks Its First Goal ↗
- 04 Feb Risky Bulletin: Plone CMS stops supply-chain attack ↗
SANS Internet Stormcast ↗
SecurityThreats
- 19 Feb ISC Stormcast For Thursday, February 19th, 2026 https://isc.sans.edu/podcastdetail/9816, (Thu, Feb 19th) ↗
- 18 Feb Tracking Malware Campaigns With Reused Material, (Wed, Feb 18th) ↗
- 18 Feb ISC Stormcast For Wednesday, February 18th, 2026 https://isc.sans.edu/podcastdetail/9814, (Wed, Feb 18th) ↗
- 17 Feb Fake Incident Report Used in Phishing Campaign, (Tue, Feb 17th) ↗
- 17 Feb ISC Stormcast For Tuesday, February 17th, 2026 https://isc.sans.edu/podcastdetail/9812, (Tue, Feb 17th) ↗
- 16 Feb 2026 64-Bits Malware Trend, (Mon, Feb 16th) ↗
- 16 Feb ISC Stormcast For Monday, February 16th, 2026 https://isc.sans.edu/podcastdetail/9810, (Mon, Feb 16th) ↗
- 13 Feb 
AI-Powered Knowledge Graph Generator & APTs, (Thu, Feb 12th) ↗
- 13 Feb ISC Stormcast For Friday, February 13th, 2026 https://isc.sans.edu/podcastdetail/9808, (Fri, Feb 13th) ↗
- 12 Feb ISC Stormcast For Thursday, February 12th, 2026 https://isc.sans.edu/podcastdetail/9806, (Thu, Feb 12th) ↗
Schneier on Security ↗
SecurityPrivacy
- 18 Feb AI Found Twelve New Vulnerabilities in OpenSSL ↗
- 17 Feb Side-Channel Attacks Against LLMs ↗
- 16 Feb The Promptware Kill Chain ↗
- 14 Feb Upcoming Speaking Engagements ↗
- 13 Feb Friday Squid Blogging: Do Squid Dream? ↗
- 12 Feb 3D Printer Surveillance ↗
- 11 Feb Rewiring Democracy Ebook is on Sale ↗
- 11 Feb Prompt Injection Via Road Signs ↗
- 10 Feb AI-Generated Text and the Detection Arms Race ↗
- 09 Feb LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days ↗
Security Brief NZ ↗
SecurityNZ
- 19 Feb Axis report charts rise of intelligent video in business ↗
- 19 Feb 3DiVi sets four-layer defence for face authentication ↗
- 19 Feb Checkmarx brings IDE-native security checks to Kiro ↗
- 19 Feb F5 & Scality link object storage & security for AI ↗
- 19 Feb Proofpoint revamps global channel with new Partner Network ↗
- 19 Feb Goodbye VPNs, Hello cloud-delivered Zero Trust ↗
- 19 Feb Internal auditors fear AI fraud but lack readiness ↗
- 19 Feb Most enterprises unprepared for HPE’s virtualisation reset ↗
- 19 Feb CrowdStrike Falcon now available via Microsoft Marketplace ↗
- 19 Feb Datadog opens DASH 2026, spotlighting AI in production ↗
The Hacker News ↗
Security
- 19 Feb CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware ↗
- 18 Feb Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody ↗
- 18 Feb Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution ↗
- 18 Feb Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs ↗
- 18 Feb Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability ↗
- 18 Feb Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024 ↗
- 18 Feb 3 Ways to Start Your Intelligent Workflow Program ↗
- 18 Feb Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware ↗
- 18 Feb CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update ↗
- 17 Feb Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster ↗
The New Stack ↗
CloudDevOps
- 18 Feb Anthropic: You can still use your Claude accounts to run OpenClaw, NanoClaw and Co. ↗
- 18 Feb Beyond vibe coding: the case for spec-driven AI development ↗
- 18 Feb Is your on-call rotation quietly burning out top talent? ↗
- 18 Feb 6 agentic knowledge base patterns emerging in the wild ↗
- 17 Feb Simplify managing your Docker compose files with this handy tool ↗
- 17 Feb From notebooks to nodes: Architecting production-ready AI infrastructure ↗
- 17 Feb The “funhouse mirror”: How AI reflects the hidden truths of your software pipeline ↗
- 17 Feb Anthropic’s new Claude Sonnet 4.6 promises Opus-level coding at Sonnet pricing ↗
- 17 Feb Your AI strategy is built on layers of API sediment ↗
- 16 Feb Python virtual environments: isolation without the chaos ↗
The Register ↗
SecurityTech
- 19 Feb Poland bans camera-packing cars made in China from military bases ↗
- 18 Feb Adidas investigates third-party data breach after criminals claim they pwned the sportswear giant ↗
- 18 Feb ShinyHunters allegedly drove off with 1.7M CarGurus records ↗
- 18 Feb Fraudster hacked hotel system, paid 1 cent for luxury rooms, Spanish cops say ↗
- 18 Feb Texas sues TP-Link over China links and security vulnerabilities ↗
- 18 Feb Deutsche Bahn back on track after DDoS yanks the brakes ↗
- 18 Feb Your AI-generated password isn't random, it just looks that way ↗
- 18 Feb Notepad++ declares hardened update process 'effectively unexploitable' ↗
- 18 Feb You can jailbreak an F-35 just like an iPhone, says Dutch defense chief ↗
- 18 Feb HackerOne 'updating' Ts&Cs after bug hunters question if they're training AI ↗