envelope envelope search heart bookmark close clock arrow down arrow up list arrow right feed link tag glasses star share twitter ampersand hamburger add
Serendeputy
Sign In

Personal Newsfeed Engine for the Open Web

The current open web, curated by people you follow on Twitter and organized by an intelligent software deputy you train and command.

Start by organizing your Twitter feed

How Serendeputy works for you

@cti_analyst-cybersecurity-all
@cti_analyst's cybersecurity all list on Twitter

  • Trending
  • Latest
  • Profile

  • South Dakota AG pushed by critics to resign over new evidence in fatal car incident: ‘He knew what he hit and he lied’

    washingtonpost.com | 10 hours ago | Article Details | Related Articles | Share
    • Car
    • Dakota Ag
    • Evidence
    • Fatal
    • South Dakota
    • 286 Tags
    • 631 Tweets
    • 635 Twitter Lists
    • 7 Linking Sites
    • 1 Feed
  • The Fed's system that allows banks to send money back and forth is down

    cnbc.com | 5 hours ago | Article Details | Related Articles | Share
    • COVID-19
    • Money back guarantee
    • Pandemic
    • Supply
    • The Fed
    • 185 Tags
    • 84 Tweets
    • 255 Twitter Lists
    • 9 Linking Sites
    • 1 Feed
  • Top security leaders express concern over lack of cyber protection

    scmagazine.com | 55 minutes ago | Article Details | Related Articles | Share
    • Application security
    • Concern
    • Cyber
    • Express
    • Protection
    • 192 Tags
    • 1 Tweet
    • 9 Twitter Lists
  • More than 6,700 VMware servers exposed online and vulnerable to major new bug | ZDNet

    zdnet.com | 2 hours ago | Article Details | Related Articles | Share
    • 7th millennium
    • Bug
    • Server
    • Vulnerable
    • ZDNet
    • 170 Tags
    • 9 Tweets
    • 54 Twitter Lists
    • 1 Feed
  • Everything You Need to Know About Evolving Threat of Ransomware

    thehackernews.com | 11 hours ago | Article Details | Related Articles | Share
    • CD Projekt
    • Everything You Need
    • Need to Know
    • Ransomware
    • Smartbook
    • 463 Tags
    • 31 Tweets
    • 118 Twitter Lists
  • Cyberpunk 2077 patch 1.2 delayed by CD Projekt ransomware attack

    bleepingcomputer.com | 5 hours ago | Article Details | Related Articles | Share
    • CD Projekt
    • Cyberpunk 2077
    • Delay
    • Projekt Records
    • Ransomware
    • 120 Tags
    • 7 Tweets
    • 31 Twitter Lists
  • APIs are powering the acceleration in digital transformation

    betanews.com | 5 hours ago | Article Details | Related Articles | Share
    • Acceleration
    • COVID-19
    • Digital transformation
    • Distributed workforce
    • Pandemic
    • 332 Tags
    • 2 Tweets
    • 8 Twitter Lists
    • 1 Feed
  • CrowdStrike Slams Microsoft Over SolarWinds Hack

    infosecurity-magazine.com | 5 hours ago | Article Details | Related Articles | Share
    • CrowdStrike
    • George Kurtz
    • Hack!
    • Microsoft
    • SolarWinds
    • 175 Tags
    • 3 Tweets
    • 35 Twitter Lists
  • Heavily used Node.js package has a code injection vulnerability

    bleepingcomputer.com | 12 hours ago | Article Details | Related Articles | Share
    • Code injection
    • Heavy
    • Node.js
    • Package
    • Vulnerability
    • 116 Tags
    • 49 Tweets
    • 194 Twitter Lists
  • Ransomware gang extorts jet maker Bombardier after Accellion breach

    bleepingcomputer.com | 9 hours ago | Article Details | Related Articles | Share
    • Accellion
    • Breach
    • Extortion
    • Gang
    • Ransomware
    • 192 Tags
    • 33 Tweets
    • 99 Twitter Lists
  • This botnet is abusing Bitcoin blockchains to stay in the shadows | ZDNet

    zdnet.com | 11 hours ago | Article Details | Related Articles | Share
    • Bitcoin
    • Blockchain
    • Botnet
    • In the Shadows
    • ZDNet
    • 217 Tags
    • 12 Tweets
    • 77 Twitter Lists
    • 1 Linking Site
  • Workday

    ge.wd5.myworkdayjobs.com | 8 hours ago | Article Details | Related Articles | Share
    • 1 Tag
    • 26 Tweets
    • 158 Twitter Lists
  • Revealed: The military radar system swiped from aerospace biz, leaked online by Clop ransomware gang

    theregister.com | 3 hours ago | Article Details | Related Articles | Share
    • Aerospace
    • Clop
    • Gang
    • Military
    • Ransomware
    • 288 Tags
    • 2 Tweets
    • 11 Twitter Lists
  • What keeps you up at night? (audio feed)

    wkyuanaudio.podbean.com | 5 hours ago | Article Details | Related Articles | Share
    • Audio
    • End user
    • Feed
    • Platform
    • Up at Night
    • 442 Tags
    • 1 Tweet
    • 7 Twitter Lists
  • LazyScripter hackers target airlines with remote access trojans

    bleepingcomputer.com | 10 hours ago | Article Details | Related Articles | Share
    • Airlines
    • Hackers
    • Remote access
    • Target
    • Trojans
    • 239 Tags
    • 21 Tweets
    • 71 Twitter Lists
  • Cutting edge Katana Graph scores $28.5 Million Series A Led by Intel Capital | ZDNet

    zdnet.com | 12 hours ago | Article Details | Related Articles | Share
    • Cutting Edge
    • Graph
    • Intel Capital
    • Series A round
    • ZDNet
    • 368 Tags
    • 3 Tweets
    • 30 Twitter Lists
    • 2 Linking Sites
  • COVID pandemic causes spike in cyberattacks against hospitals, medical companies | ZDNet

    zdnet.com | 18 hours ago | Article Details | Related Articles | Share
    • Causes
    • COVID-19
    • Cyber-attack
    • Medical
    • Pandemic
    • 210 Tags
    • 28 Tweets
    • 319 Twitter Lists
    • 1 Linking Site
    • 1 Feed
  • Twelve-Year-Old Vulnerability Found in Windows Defender - Schneier on Security

    schneier.com | 11 hours ago | Article Details | Related Articles | Share
    • Bruce Schneier
    • Joseph B. MacInnis
    • Security
    • Vulnerability
    • Windows Defender
    • 61 Tags
    • 17 Tweets
    • 97 Twitter Lists
    • 1 Feed
  • Ukraine reports cyber-attack on government document management system | ZDNet

    zdnet.com | 8 hours ago | Article Details | Related Articles | Share
    • Cyber-attack
    • Denial-of-service attack
    • Document management system
    • Ukraine
    • ZDNet
    • 120 Tags
    • 9 Tweets
    • 54 Twitter Lists
  • Exploitation of Accellion File Transfer Appliance | CISA

    us-cert.cisa.gov | 9 hours ago | Article Details | Related Articles | Share
    • Accellion
    • Appliance
    • CISA
    • Exploitation
    • File transfer
    • 89 Tags
    • 10 Tweets
    • 44 Twitter Lists
    • 2 Linking Sites
  • Russian hackers linked to attack targeting Ukrainian government

    bleepingcomputer.com | 6 hours ago | Article Details | Related Articles | Share
    • Government of Ukraine
    • Hackers
    • Russian
    • Targeting
    • Ukrainian
    • 140 Tags
    • 12 Tweets
    • 36 Twitter Lists
  • Want to pass on your old PCs to good causes? Here's how to do it while staying secure | ZDNet

    zdnet.com | 9 hours ago | Article Details | Related Articles | Share
    • Good Causes
    • Old
    • PCS
    • Secure
    • ZDNet
    • 95 Tags
    • 3 Tweets
    • 31 Twitter Lists
  • Google funds Linux kernel developers to work exclusively on security | ZDNet

    zdnet.com | 7 hours ago | Article Details | Related Articles | Share
    • Developer
    • Google
    • Open-source software development
    • Supply chain security
    • ZDNet
    • 346 Tags
    • 5 Tweets
    • 42 Twitter Lists
    • 1 Linking Site
  • Top 30 Cybersecurity Experts You Should Follow in 2021

    cybersecurityventures.com | 11 hours ago | Article Details | Related Articles | Share
    • Computer security
    • Top 30
    • 6 Tags
    • 6 Tweets
    • 62 Twitter Lists
  • Bugs in Signal, other video chat apps allowed attackers to listen in on users - Help Net Security

    helpnetsecurity.com | 5 hours ago | Article Details | Related Articles | Share
    • Apps
    • Attackers
    • Bugs
    • Security
    • Videotelephony
    • 122 Tags
    • 1 Tweet
    • 6 Twitter Lists
  • Google introduces GKE Autopilot for hands-off Kubernetes | ZDNet

    zdnet.com | 6 hours ago | Article Details | Related Articles | Share
    • Autopilot
    • Google
    • Introduction
    • Kubernetes
    • ZDNet
    • 123 Tags
    • 3 Tweets
    • 31 Twitter Lists
    • 1 Linking Site
  • Five Eyes warns of Accellion FTA attacks leading to extortion

    bleepingcomputer.com | 8 hours ago | Article Details | Related Articles | Share
    • Accellion
    • Attack
    • Extortion
    • Five eyes
    • FTA
    • 254 Tags
    • 8 Tweets
    • 22 Twitter Lists
  • Off-Chain Reporting: Towards a new general purpose secure compute framework by Chainlink | ZDNet

    zdnet.com | 8 hours ago | Article Details | Related Articles | Share
    • Compute!
    • Framework
    • General-purpose
    • Secure
    • Sergey Nazarov
    • 280 Tags
    • 3 Tweets
    • 30 Twitter Lists
  • Poor Remote Working Behaviors and Procedures Putting Orgs at Risk

    infosecurity-magazine.com | 8 hours ago | Article Details | Related Articles | Share
    • At Risk
    • Behavior
    • Poor
    • Remote
    • Telecommuting
    • 120 Tags
    • 4 Tweets
    • 38 Twitter Lists
    • 1 Feed
  • APT32 state hackers target human rights defenders with spyware

    securityaffairs.co | 9 hours ago | Article Details | Related Articles | Share
    • Defenders
    • Hackers
    • Human rights activists
    • Spyware
    • Target
    • 204 Tags
    • 9 Tweets
    • 44 Twitter Lists
  • NASA and the FAA were also breached by the SolarWinds hackers

    bleepingcomputer.com | 10 hours ago | Article Details | Related Articles | Share
    • Anne Neuberger
    • Breached
    • Hackers
    • Microsoft Intune
    • SolarWinds
    • 147 Tags
    • 25 Tweets
    • 62 Twitter Lists
  • Hackers Leak Data Stolen From Jet Maker Bombardier | SecurityWeek.Com

    securityweek.com | 10 hours ago | Article Details | Related Articles | Share
    • Clop
    • Data
    • Hackers
    • Leak
    • Stolen
    • 143 Tags
    • 6 Tweets
    • 19 Twitter Lists
  • New 'LazyScripter' Hacking Group Targets Airlines | SecurityWeek.Com

    securityweek.com | 8 hours ago | Article Details | Related Articles | Share
    • Airlines for America
    • COVID-19
    • Hacking
    • Security
    • Targets
    • 129 Tags
    • 8 Tweets
    • 31 Twitter Lists
  • America’s Disastrous Vaccine Rollout Is Finally Recovering. Here’s What Went Wrong

    vice.com | 8 hours ago | Article Details | Related Articles | Share
    • America
    • COVID-19
    • Rollout
    • Social distancing
    • Vaccine
    • 495 Tags
    • 1 Tweet
    • 23 Twitter Lists
  • Vietnamese Hackers Target Human Rights Defenders: Amnesty | SecurityWeek.Com

    securityweek.com | 10 hours ago | Article Details | Related Articles | Share
    • Amnesty
    • Defenders
    • Hackers
    • Human rights activists
    • Vietnamese
    • 201 Tags
    • 5 Tweets
    • 29 Twitter Lists
  • How to Organize Your Workplace Without Getting Caught

    vice.com | 7 hours ago | Article Details | Related Articles | Share
    • Caught
    • Employee handbook
    • Organize
    • RDM
    • Workplace
    • 448 Tags
    • 4 Tweets
    • 32 Twitter Lists
  • darkreading.com/vulnerabilities---t

    darkreading.com | 9 hours ago | Article Details | Related Articles | Share
    • 10 Tweets
    • 64 Twitter Lists
  • Four Additional Threat Groups Seen Targeting Industrial Organizations in 2020 | SecurityWeek.Com

    securityweek.com | 9 hours ago | Article Details | Related Articles | Share
    • Organizational behavior
    • Remote administration tool
    • Sandworm
    • Targeting
    • Wind farm
    • 181 Tags
    • 7 Tweets
    • 22 Twitter Lists
  • Pandemic sees organizations of all sizes and industries invest in cyber threat intelligence (CTI)

    betanews.com | 12 hours ago | Article Details | Related Articles | Share
    • CTI
    • Cyber threat intelligence
    • Invest
    • Pandemic
    • Threat Intelligence Platform
    • 330 Tags
    • 3 Tweets
    • 9 Twitter Lists
    • 1 Feed
  • MAR-10325064-1.v1 - Accellion FTA | CISA

    us-cert.cisa.gov | 9 hours ago | Article Details | Related Articles | Share
    • Accellion
    • CISA
    • FTA
    • Links
    • Malicious
    • 158 Tags
    • 6 Tweets
    • 37 Twitter Lists
    • 1 Linking Site
  • Critical VMware vCenter Server Flaw Can Expose Organizations to Remote Attacks | SecurityWeek.Com

    securityweek.com | 11 hours ago | Article Details | Related Articles | Share
    • Flaw
    • Remote
    • Server
    • VMware ESXi
    • VMware Infrastructure
    • 166 Tags
    • 6 Tweets
    • 12 Twitter Lists
  • Campaigners demand judicial review of NHS deal with Peter Thiel's AI firm Palantir

    theregister.com | 9 hours ago | Article Details | Related Articles | Share
    • Deal
    • Judicial review
    • Judiciary
    • Palantír
    • Peter Thiel
    • 429 Tags
    • 1 Tweet
    • 10 Twitter Lists
  • Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

    securityaffairs.co | 15 hours ago | Article Details | Related Articles | Share
    • Breach
    • Data
    • Disclosed
    • Leak
    • Security
    • 191 Tags
    • 16 Tweets
    • 147 Twitter Lists
  • U.S. municipalities are the perfect target for cybercriminals in 2021 - Help Net Security

    helpnetsecurity.com | 18 hours ago | Article Details | Related Articles | Share
    • 2021
    • Municipality
    • Net
    • Perfect Target
    • Security
    • 239 Tags
    • 8 Tweets
    • 125 Twitter Lists
    • 1 Feed
  • 'We're finding bugs way faster than we can fix them': Google sponsors 2 full-time devs to improve Linux security

    theregister.com | 7 hours ago | Article Details | Related Articles | Share
    • Bugs
    • Fix
    • Full-time
    • Google
    • Security
    • 302 Tags
    • 2 Tweets
    • 11 Twitter Lists
    • 2 Linking Sites
  • Virtual Cybersecurity Events: Security Summit online conferences

    securitysummits.com | 12 hours ago | Article Details | Related Articles | Share
    • Computer security
    • Summit
    • Virtual
    • 7 Tags
    • 4 Tweets
    • 17 Twitter Lists
    • 1 Linking Site
  • How cybercrime has adapted to the pandemic

    betanews.com | 9 hours ago | Article Details | Related Articles | Share
    • Adaptation
    • Attack surface
    • Cyber-attack
    • Cybercrime
    • Pandemic
    • 140 Tags
    • 3 Tweets
    • 9 Twitter Lists
    • 1 Feed
  • Ransomware Attacks Double Against Global Universities

    infosecurity-magazine.com | 13 hours ago | Article Details | Related Articles | Share
    • 2702
    • Attack
    • Double
    • Ransomware
    • University
    • 123 Tags
    • 5 Tweets
    • 64 Twitter Lists
    • 1 Feed
  • Researchers propose more secure and private mobile contact tracing - Help Net Security

    helpnetsecurity.com | 19 hours ago | Article Details | Related Articles | Share
    • Contact tracing
    • Mobile
    • Research
    • Secure
    • Security
    • 189 Tags
    • 9 Tweets
    • 128 Twitter Lists
    • 1 Feed
  • Scottish rocketeers Orbex commission Europe's largest industrial 3D printer to crank out 35 engines a year

    theregister.com | 8 hours ago | Article Details | Related Articles | Share
    • 3D printing
    • Engines
    • Europe
    • Industrial
    • Printer
    • 184 Tags
    • 1 Tweet
    • 10 Twitter Lists
  • About
  • How Serendeputy Works
  • Privacy Policy
  • Terms of Service

  • Serendeputy Blog
  • Customer Forum
  • @Serendeputy