envelope envelope search heart bookmark close clock arrow down arrow up list arrow right feed link tag glasses star share twitter ampersand hamburger add
Serendeputy
Sign In

Personal Newsfeed Engine for the Open Web

The current open web, curated by people you follow on Twitter and organized by an intelligent software deputy you train and command.

Start by organizing your Twitter feed

How Serendeputy works for you

@gerry_mccaff-infosec
@gerry_mccaff's infosec list on Twitter

  • Trending
  • Latest
  • Profile

  • Chauvin trial verdict: Jury deliberations resume as nation awaits decision in landmark case on policing in America

    washingtonpost.com | 1 day ago | Article Details | Related Articles | Share
    • Chauvin
    • Darnella Frazier
    • Floyd Justice
    • Gianna Floyd
    • Steve Schleicher
    • 1207 Tags
    • 313 Tweets
    • 592 Twitter Lists
    • 11 Linking Sites
    • 1 Feed
  • Most common cyberattack techniques on Windows networks for 2020

    csoonline.com | 18 hours ago | Article Details | Related Articles | Share
    • Cyber-attack
    • Network
    • Techniques
    • Windows
    • 6 Tags
    • 20 Tweets
    • 170 Twitter Lists
    • 1 Feed
  • Brace yourselves. Facebook has a new mega-leak on its hands

    arstechnica.com | 1 day ago | Article Details | Related Articles | Share
    • Brace
    • Database dump
    • Email address
    • Facebook
    • Hands
    • 352 Tags
    • 121 Tweets
    • 528 Twitter Lists
    • 18 Linking Sites
  • Court Says Jury Has Reached Verdict In Derek Chauvin's Murder Trial

    npr.org | 1 day ago | Article Details | Related Articles | Share
    • Derek Chauvin
    • Jerry Blackwell
    • Murder
    • Trial
    • Verdict
    • 486 Tags
    • 58 Tweets
    • 133 Twitter Lists
    • 14 Linking Sites
    • 2 Feeds
  • Massive QLocker ransomware attack uses 7zip to encrypt QNAP devices

    bleepingcomputer.com | 9 hours ago | Article Details | Related Articles | Share
    • Attack
    • Device
    • Encrypt
    • QNAP Systems, Inc.
    • Ransomware
    • 139 Tags
    • 22 Tweets
    • 161 Twitter Lists
  • Areas To Be Focused On In Cybersecurity Training - Phishing.org.uk

    phishing.org.uk | 13 hours ago | Article Details | Related Articles | Share
    • Computer security
    • IT department
    • SMS phishing
    • Training
    • Voice phishing
    • 220 Tags
    • 10 Tweets
    • 122 Twitter Lists
  • MI5 warns of spies using LinkedIn to trick staff into spilling secrets

    bbc.com | 1 day ago | Article Details | Related Articles | Share
    • Around the World
    • Spy
    • 13 Tags
    • 42 Tweets
    • 230 Twitter Lists
    • 8 Linking Sites
  • REvil threatens to release Apple’s hardware schematics | IT PRO

    itpro.co.uk | 16 hours ago | Article Details | Related Articles | Share
    • Apple
    • Dennis Publishing
    • Hardware
    • Schematics
    • Travelex
    • 162 Tags
    • 6 Tweets
    • 127 Twitter Lists
  • Crypto, freedom, cybersecurity and the challenges we face in the future to be free and happy, a conversation with Jasper Hamill by The Irish Tech News Podcast • A podcast on Anchor

    anchor.fm | 1 day ago | Article Details | Related Articles | Share
    • Challenges
    • Computer security
    • Crypto
    • Podcast
    • Technology journalism
    • 513 Tags
    • 13 Tweets
    • 327 Twitter Lists
  • FTC warns it could crack down on biased AI

    theverge.com | 1 day ago | Article Details | Related Articles | Share
    • Bias
    • Crack Down
    • FTC
    • Rohit Chopra
    • Warn
    • 193 Tags
    • 42 Tweets
    • 185 Twitter Lists
    • 3 Linking Sites
  • UK’s IoT security regulation will also include smartphones | IT PRO

    itpro.co.uk | 14 hours ago | Article Details | Related Articles | Share
    • Dennis Publishing
    • IOT
    • Regulation
    • Security
    • U.K.
    • 177 Tags
    • 6 Tweets
    • 129 Twitter Lists
  • Hatching Triage | Malware sandboxing report by Hatching Triage

    tria.ge | 18 hours ago | Article Details | Related Articles | Share
    • Sandboxing
    • Triage
    • 5 Tags
    • 14 Tweets
    • 143 Twitter Lists
  • Buy Yelp Reviews - With 100% Parmanet Reviews Service

    usatopservices.com | 16 hours ago | Article Details | Related Articles | Share
    • Marketing plan
    • Neteller
    • Payoneer
    • United Kingdom
    • Yelp
    • 222 Tags
    • 10 Tweets
    • 123 Twitter Lists
  • Israel Cyber Security Companies - The First Global Cyber Security Observatory

    cyberstartupobservatory.com | 18 hours ago | Article Details | Related Articles | Share
    • Computer security
    • Cyber
    • Observatory
    • 7 Tags
    • 9 Tweets
    • 122 Twitter Lists
  • 150+ Top Global Cloud Thought Leaders and Next Generation Leaders of 2021 - Whizlabs Blog

    whizlabs.com | 1 day ago | Article Details | Related Articles | Share
    • 2021
    • Blog
    • Cloud strategy
    • Next Generation
    • Platform
    • 498 Tags
    • 24 Tweets
    • 297 Twitter Lists
  • The World Economic Forum

    weforum.org | 9 hours ago | Article Details | Related Articles | Share
    • Economic Forum in Krynica
    • World Economic Forum
    • 5 Tags
    • 6 Tweets
    • 123 Twitter Lists
    • 5 Linking Sites
  • Hackers exploit unpatched bugs to attack governments, contractors

    scmagazine.com | 1 day ago | Article Details | Related Articles | Share
    • Attack
    • Bugs
    • Exploit
    • General contractor
    • Hackers
    • 325 Tags
    • 7 Tweets
    • 140 Twitter Lists
    • 1 Linking Site
  • Most Important Phishing Types and Detection Methods - Phishing.org.uk

    phishing.org.uk | 19 hours ago | Article Details | Related Articles | Share
    • Cyber-attack
    • Detection
    • Methods
    • SMS phishing
    • Voice phishing
    • 213 Tags
    • 7 Tweets
    • 15 Twitter Lists
  • Over 750,000 Users Downloaded New Billing Fraud Apps From Google Play Store

    thehackernews.com | 1 day ago | Article Details | Related Articles | Share
    • Apps
    • Billing
    • Downloaded
    • Google Play
    • Store
    • 148 Tags
    • 34 Tweets
    • 236 Twitter Lists
    • 1 Linking Site
  • Four years after NotPetya, cyber insurance is still catching up

    csoonline.com | 18 hours ago | Article Details | Related Articles | Share
    • Body of Evidence
    • Catching
    • Cyber
    • Insurance policy
    • Microsoft Exchange Server
    • 84 Tags
    • 12 Tweets
    • 50 Twitter Lists
    • 1 Feed
  • What in the World Does It Take to Be an Effective CISO?

    tripwire.com | 1 day ago | Article Details | Related Articles | Share
    • Chief information security officer
    • Computer security
    • Cover letter
    • Soft skills
    • Taking Stock
    • 386 Tags
    • 16 Tweets
    • 204 Twitter Lists
  • Fake Microsoft Store, Spotify sites spread info-stealing malware

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Malware
    • Microsoft Store
    • Sites
    • Spotify
    • Spread
    • 145 Tags
    • 29 Tweets
    • 209 Twitter Lists
    • 7 Linking Sites
  • Biden administration unveils effort to strengthen cybersecurity of power grid

    cnn.com | 1 day ago | Article Details | Related Articles | Share
    • Administration
    • Biden
    • Dragoș, Voivode of Moldavia
    • Jennifer Granholm
    • Power Grid
    • 142 Tags
    • 7 Tweets
    • 51 Twitter Lists
    • 1 Linking Site
  • Note to Self: Create Non-Exhaustive List of Competitors – Krebs on Security

    krebsonsecurity.com | 1 day ago | Article Details | Related Articles | Share
    • Brian Krebs
    • Competitors
    • Note To Self
    • Publishing
    • Security
    • 223 Tags
    • 23 Tweets
    • 135 Twitter Lists
    • 2 Linking Sites
    • 1 Feed
  • New Australian cyber package includes AU$37.5m Indo-Pacific investment | ZDNet

    zdnet.com | 22 hours ago | Article Details | Related Articles | Share
    • Australian
    • Cyber
    • Indo-Pacific
    • Investment
    • ZDNet
    • 253 Tags
    • 11 Tweets
    • 172 Twitter Lists
  • Netflix: Shares plunge as subscribers switch off

    bbc.com | 1 day ago | Article Details | Related Articles | Share
    • Netflix
    • Plungė
    • Subscription business model
    • Switch Off
    • 5 Tags
    • 19 Tweets
    • 116 Twitter Lists
    • 1 Linking Site
  • Hundreds of networks reportedly hacked in Codecov supply-chain attack

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Attack
    • Continuous integration
    • Hacked
    • Network
    • Supply chain
    • 215 Tags
    • 21 Tweets
    • 162 Twitter Lists
    • 1 Linking Site
  • How AI is being used for COVID-19 vaccine creation and distribution

    techrepublic.com | 1 day ago | Article Details | Related Articles | Share
    • AI
    • COVID-19
    • Distribution
    • Vaccination
    • Vaccine
    • 348 Tags
    • 16 Tweets
    • 72 Twitter Lists
  • How To Keep Your Email Safe Against Increasing Attacks - Phishing.org.uk

    phishing.org.uk | 1 day ago | Article Details | Related Articles | Share
    • Attack
    • Cybersquatting
    • Incident management
    • Safe
    • Security awareness
    • 155 Tags
    • 11 Tweets
    • 120 Twitter Lists
  • SonicWall warns customers to patch 3 zero-days exploited in the wild

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Customer
    • Exploit
    • In the Wild
    • SonicWall
    • Warn
    • 120 Tags
    • 37 Tweets
    • 177 Twitter Lists
    • 1 Linking Site
  • CloudFail - Information Gathering to Discover Identity of the Server Behind Cloudflare

    skynettools.com | 1 day ago | Article Details | Related Articles | Share
    • Cloudflare
    • Identity
    • Server
    • 7 Tags
    • 41 Tweets
    • 187 Twitter Lists
    • 1 Feed
  • A Planning Guide for a Master’s Degree in Cybersecurity

    cybersguards.com | 16 hours ago | Article Details | Related Articles | Share
    • Computer security
    • Data security
    • Guide
    • Master's degree
    • Planning
    • 391 Tags
    • 3 Tweets
    • 16 Twitter Lists
    • 1 Feed
  • Q1 Vulnerability Roundup | Digital Shadows

    digitalshadows.com | 16 hours ago | Article Details | Related Articles | Share
    • Digital
    • Hafnium
    • Q1
    • Roundup
    • Vulnerability
    • 436 Tags
    • 2 Tweets
    • 22 Twitter Lists
  • White House Winds Down SolarWinds, Exchange Cyber Teams

    breakingdefense.com | 1 day ago | Article Details | Related Articles | Share
    • Anne Neuberger
    • Exchange
    • SolarWinds
    • Teams
    • White House
    • 188 Tags
    • 6 Tweets
    • 125 Twitter Lists
  • Most users don't know the capabilities and risks of QR codes - Help Net Security

    helpnetsecurity.com | 22 hours ago | Article Details | Related Articles | Share
    • Codes
    • Net
    • QR code
    • Risk
    • Security
    • 155 Tags
    • 13 Tweets
    • 143 Twitter Lists
    • 2 Feeds
  • Rethink and Shrink Your Security Perimeter – Varonis’ Justin Wilkins on Zero Trust

    meritalk.com | 1 day ago | Article Details | Related Articles | Share
    • Rethink
    • Security perimeter
    • Shrink
    • Trust
    • Zero
    • 407 Tags
    • 4 Tweets
    • 121 Twitter Lists
  • How to Become a Security Software Developer: A Complete Career Guide

    cybersguards.com | 16 hours ago | Article Details | Related Articles | Share
    • Career guide
    • Complete
    • Computer security software
    • Information security operations center
    • Software developer
    • 351 Tags
    • 2 Tweets
    • 13 Twitter Lists
    • 1 Feed
  • Facts About Cyber Security - Terralogic Security Operation Center

    terralogic.com | 1 day ago | Article Details | Related Articles | Share
    • Attackers
    • Computer security
    • Cyber
    • Facts
    • Security operations center
    • 134 Tags
    • 6 Tweets
    • 121 Twitter Lists
  • UK Cyber Security Companies - The First Global Cyber Security Observatory

    cyberstartupobservatory.com | 1 day ago | Article Details | Related Articles | Share
    • Computer security
    • Cyber
    • Observatory
    • U.K.
    • 7 Tags
    • 10 Tweets
    • 122 Twitter Lists
  • CYBER ATTACK TRENDS:2020 MID-YEAR REPORT -

    cybermaterial.com | 1 day ago | Article Details | Related Articles | Share
    • Cyber-attack
    • Global Research
    • Medical research
    • Rapid
    • Research institute
    • 75 Tags
    • 4 Tweets
    • 120 Twitter Lists
  • FIDO’s new open IoT standard for device onboarding helps tackle security issues

    iottechnews.com | 1 day ago | Article Details | Related Articles | Share
    • Device
    • Helps
    • IOT
    • Onboarding
    • Security
    • 230 Tags
    • 8 Tweets
    • 129 Twitter Lists
    • 1 Feed
  • Securing vehicles from potential cybersecurity threats - Help Net Security

    helpnetsecurity.com | 22 hours ago | Article Details | Related Articles | Share
    • Computer security
    • G. M. Ford
    • Net
    • United Nations Economic Commission for Europe
    • Vehicles
    • 320 Tags
    • 13 Tweets
    • 70 Twitter Lists
    • 2 Feeds
  • Memory Forensics Cheat Sheet v2.0 -

    cybermaterial.com | 1 day ago | Article Details | Related Articles | Share
    • Cheat sheet
    • Digital forensics
    • Forensic science
    • Memory forensics
    • SANS Institute
    • 31 Tags
    • 6 Tweets
    • 120 Twitter Lists
  • How do I select an identity management solution for my business? - Help Net Security

    helpnetsecurity.com | 21 hours ago | Article Details | Related Articles | Share
    • Identity management
    • Lee Ryan
    • Net
    • Security
    • Solution
    • 421 Tags
    • 12 Tweets
    • 37 Twitter Lists
    • 2 Feeds
  • FDA Reverses 11th Hour HHS Action to Exempt Certain Devices from 510(k) Premarket Requirement | JD Supra

    jdsupra.com | 1 day ago | Article Details | Related Articles | Share
    • FDA
    • Federal Food, Drug, and Cosmetic Act
    • HHS
    • Jd Supra
    • Requirement
    • 244 Tags
    • 9 Tweets
    • 127 Twitter Lists
  • DalFox - Fast, Powerful Parameter Analysis and XSS Scanner

    skynettools.com | 1 day ago | Article Details | Related Articles | Share
    • Analysis
    • Parameter
    • Powerful
    • Scanner
    • XSS
    • 202 Tags
    • 5 Tweets
    • 119 Twitter Lists
    • 1 Feed
  • BruteSpray - Automatically Brute Force Services from NMAP GNMAP/XML with Default Credentials

    skynettools.com | 1 day ago | Article Details | Related Articles | Share
    • Brute
    • 8 Tags
    • 4 Tweets
    • 119 Twitter Lists
    • 1 Feed
  • Car Insurance Company GEICO Discloses Data Breach | SecurityWeek.Com

    securityweek.com | 1 day ago | Article Details | Related Articles | Share
    • Car
    • Data breach
    • GEICO
    • Security breach notification laws
    • Vehicle insurance
    • 170 Tags
    • 14 Tweets
    • 55 Twitter Lists
    • 1 Linking Site
  • Privacy and Security in the Age of Surveillance Capitalism and Surveillance State

    nikhilborkar.medium.com | 1 day ago | Article Details | Related Articles | Share
    • Citizen Lab
    • NSO Group
    • Privacy
    • Security
    • Surveillance capitalism
    • 475 Tags
    • 2 Tweets
    • 80 Twitter Lists
  • The Incredible Rise of North Korea’s Hacking Army

    newyorker.com | 2 days ago | Article Details | Related Articles | Share
    • Hacking
    • Incredible
    • Korean People's Army
    • North Korea
    • People's Armed Forces
    • 549 Tags
    • 165 Tweets
    • 413 Twitter Lists
    • 9 Linking Sites
    • 1 Feed
  • About
  • How Serendeputy Works
  • Privacy Policy
  • Terms of Service

  • Serendeputy Blog
  • Customer Forum
  • @Serendeputy