envelope envelope search heart bookmark close clock arrow down arrow up list arrow right feed link tag glasses star share twitter ampersand hamburger add
Serendeputy
Sign In

Personal Newsfeed Engine for the Open Web

The current open web, curated by people you follow on Twitter and organized by an intelligent software deputy you train and command.

Start by organizing your Twitter feed

How Serendeputy works for you

@usmcinsc-infosec
@usmcinsc's infosec list on Twitter

  • Trending
  • Latest
  • Profile

  • The Postal Service is running a running a 'covert operations program' that monitors Americans' social media posts

    news.yahoo.com | 10 hours ago | Article Details | Related Articles | Share
    • Derek Chauvin
    • George Floyd
    • Operations
    • Social media
    • The Postal Service
    • 1915 Tags
    • 441 Tweets
    • 412 Twitter Lists
    • 34 Linking Sites
  • Signal CEO Hacks Cellebrite iPhone Hacking Device Used By Cops

    vice.com | 10 hours ago | Article Details | Related Articles | Share
    • Cellebrite
    • CEO
    • Hacking
    • Hacks
    • iPhone
    • 182 Tags
    • 77 Tweets
    • 184 Twitter Lists
    • 3 Linking Sites
  • In epic hack, Signal developer turns the tables on forensics firm Cellebrite

    arstechnica.com | 7 hours ago | Article Details | Related Articles | Share
    • Cellebrite
    • Developer
    • Forensic science
    • Hack!
    • Tables
    • 236 Tags
    • 60 Tweets
    • 242 Twitter Lists
    • 3 Linking Sites
  • DHS 'unprepared' for Portland response during summer unrest, watchdog finds

    cnn.com | 15 hours ago | Article Details | Related Articles | Share
    • DHS
    • Phone surveillance
    • Portland
    • Unrest
    • Watchdog
    • 194 Tags
    • 7 Tweets
    • 36 Twitter Lists
  • Linux bans University of Minnesota for committing malicious code

    bleepingcomputer.com | 10 hours ago | Article Details | Related Articles | Share
    • Ban
    • Code
    • Malicious
    • Malware
    • University of Minnesota
    • 200 Tags
    • 49 Tweets
    • 134 Twitter Lists
  • User ability to opt-out key in Google FLoC debacle | ZDNet

    zdnet.com | 8 hours ago | Article Details | Related Articles | Share
    • DuckDuckGo
    • Federated Learning of Cohorts
    • Google
    • Opt out
    • ZDNet
    • 240 Tags
    • 7 Tweets
    • 78 Twitter Lists
  • Remote code execution vulnerabilities uncovered in smart air fryer | ZDNet

    zdnet.com | 1 day ago | Article Details | Related Articles | Share
    • Air fryer
    • Arbitrary code execution
    • Remote
    • Vulnerability
    • ZDNet
    • 139 Tags
    • 46 Tweets
    • 270 Twitter Lists
    • 3 Linking Sites
  • Hatching Triage | Malware sandboxing report by Hatching Triage

    tria.ge | 18 hours ago | Article Details | Related Articles | Share
    • Sandboxing
    • Triage
    • 5 Tags
    • 14 Tweets
    • 143 Twitter Lists
  • 21 best free security tools

    csoonline.com | 1 day ago | Article Details | Related Articles | Share
    • 5 Tags
    • 29 Tweets
    • 240 Twitter Lists
    • 1 Feed
  • Boris Johnson told Sir James Dyson by text he would 'fix' tax issue

    bbc.co.uk | 22 hours ago | Article Details | Related Articles | Share
    • Boris Johnson
    • James Dyson
    • Sir
    • 11 Tags
    • 449 Tweets
    • 472 Twitter Lists
    • 13 Linking Sites
  • When cryptography attacks – how TLS helps malware hide in plain sight

    nakedsecurity.sophos.com | 14 hours ago | Article Details | Related Articles | Share
    • Cryptography
    • Helps
    • In Plain Sight
    • Malware
    • TLS
    • 308 Tags
    • 16 Tweets
    • 84 Twitter Lists
    • 1 Feed
  • Novel Email-Based Campaign Targets Bloomberg Clients with RATs

    threatpost.com | 15 hours ago | Article Details | Related Articles | Share
    • Campaign
    • Clients
    • Targets
    • 6 Tags
    • 20 Tweets
    • 99 Twitter Lists
    • 1 Feed
  • Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn't paid

    thehackernews.com | 14 hours ago | Article Details | Related Articles | Share
    • Apple
    • Blueprint
    • Hackers
    • Leak
    • Ransom Demand
    • 155 Tags
    • 17 Tweets
    • 59 Twitter Lists
    • 2 Linking Sites
  • UK Government Pressing Ahead with New IoT Law Amid Pandemic Smart Device Surge

    infosecurity-magazine.com | 16 hours ago | Article Details | Related Articles | Share
    • Pandemic
    • Pressing
    • Smart device
    • Surge
    • U.K.
    • 148 Tags
    • 6 Tweets
    • 142 Twitter Lists
    • 1 Feed
  • Remote code execution in Homebrew by compromising the official Cask repository

    blog.ryotak.me | 12 hours ago | Article Details | Related Articles | Share
    • Arbitrary code execution
    • CASK
    • Homebrew
    • ITerm2
    • Repository
    • 259 Tags
    • 33 Tweets
    • 160 Twitter Lists
  • 120 Compromised Ad Servers Target Millions of Internet Users

    thehackernews.com | 1 day ago | Article Details | Related Articles | Share
    • Ad
    • Compromised
    • Malvertising
    • Server
    • Target
    • 132 Tags
    • 123 Tweets
    • 266 Twitter Lists
    • 1 Linking Site
  • China-linked hackers used Pulse Secure flaw to target U.S. defense industry - researchers | Reuters

    reuters.com | 1 day ago | Article Details | Related Articles | Share
    • Arms industry
    • Flaw
    • Research
    • Target
    • United States Department of Defense
    • 204 Tags
    • 33 Tweets
    • 165 Twitter Lists
    • 8 Linking Sites
  • Derek Chauvin Verdict Live: Jury Reaches Verdict - WSJ.com

    wsj.com | 1 day ago | Article Details | Related Articles | Share
    • COVID-19
    • Derek Chauvin
    • Eric Nelson
    • Floyd Square
    • Verdict
    • 513 Tags
    • 35 Tweets
    • 102 Twitter Lists
    • 2 Linking Sites
  • darkreading.com/perimeter/attackers

    darkreading.com | 13 hours ago | Article Details | Related Articles | Share
    • 10 Tweets
    • 65 Twitter Lists
  • Apple introduces AirTag

    apple.com | 1 day ago | Article Details | Related Articles | Share
    • Airtag
    • 3 Tags
    • 119 Tweets
    • 259 Twitter Lists
    • 82 Linking Sites
    • 1 Feed
  • Case launched against TikTok over collection of children’s data

    theguardian.com | 1 day ago | Article Details | Related Articles | Share
    • ByteDance
    • Collection
    • Data
    • Platform
    • TikTok
    • 212 Tags
    • 28 Tweets
    • 128 Twitter Lists
    • 4 Linking Sites
  • Backdoor Found in Codecov Bash Uploader - Schneier on Security

    schneier.com | 11 hours ago | Article Details | Related Articles | Share
    • Backdoor
    • Bash!
    • Bruce Schneier
    • Security
    • Upload
    • 80 Tags
    • 9 Tweets
    • 48 Twitter Lists
    • 1 Feed
  • Rapid7 acquires open-source project Velociraptor | ZDNet

    zdnet.com | 9 hours ago | Article Details | Related Articles | Share
    • DivvyCloud
    • Metasploit Project
    • Open-source model
    • Risk and compliance
    • ZDNet
    • 94 Tags
    • 4 Tweets
    • 46 Twitter Lists
  • Hackers are exploiting a Pulse Secure 0day to breach orgs around the world

    arstechnica.com | 1 day ago | Article Details | Related Articles | Share
    • Breach
    • Exploitation
    • Hackers
    • Secure
    • Zero-day
    • 349 Tags
    • 24 Tweets
    • 193 Twitter Lists
    • 3 Linking Sites
  • Multiple APT Groups Exploit Critical Pulse Secure Zero-Day

    infosecurity-magazine.com | 17 hours ago | Article Details | Related Articles | Share
    • Apt
    • Critical
    • Exploit
    • Pulse Connect
    • Zero-day
    • 129 Tags
    • 6 Tweets
    • 41 Twitter Lists
    • 1 Linking Site
    • 1 Feed
  • Russia's Putin warns West against any provocations in annual address

    nbcnews.com | 15 hours ago | Article Details | Related Articles | Share
    • COVID-19
    • Jake Sullivan
    • Leonid Volkov
    • Provocation
    • Warn
    • 261 Tags
    • 13 Tweets
    • 46 Twitter Lists
  • Over 750,000 Users Downloaded New Billing Fraud Apps From Google Play Store

    thehackernews.com | 1 day ago | Article Details | Related Articles | Share
    • Apps
    • Billing
    • Downloaded
    • Google Play
    • Store
    • 148 Tags
    • 34 Tweets
    • 236 Twitter Lists
    • 1 Linking Site
  • Firefox 88 patches bugs and kills off a sneaky JavaScript tracking trick

    nakedsecurity.sophos.com | 1 day ago | Article Details | Related Articles | Share
    • Firefox
    • JavaScript
    • Kills
    • Patches Bugs
    • Sneak
    • 336 Tags
    • 18 Tweets
    • 173 Twitter Lists
    • 1 Feed
  • Securing vehicles from potential cybersecurity threats - Help Net Security

    helpnetsecurity.com | 22 hours ago | Article Details | Related Articles | Share
    • Computer security
    • G. M. Ford
    • Net
    • United Nations Economic Commission for Europe
    • Vehicles
    • 320 Tags
    • 13 Tweets
    • 70 Twitter Lists
    • 2 Feeds
  • SonicWall warns customers to patch 3 zero-days exploited in the wild

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Customer
    • Exploit
    • In the Wild
    • SonicWall
    • Warn
    • 120 Tags
    • 37 Tweets
    • 177 Twitter Lists
    • 1 Linking Site
  • I Now Own the Coinhive Domain. Here's How I'm Fighting Cryptojacking and Doing Good Things with Content Security Policies.

    troyhunt.com | 15 hours ago | Article Details | Related Articles | Share
    • Content security
    • Domain
    • Good Things
    • Here's How
    • Security policy
    • 394 Tags
    • 4 Tweets
    • 23 Twitter Lists
  • Vulnerability in CocoaPod Dependency Manager Exposed Millions of Apps | SecurityWeek.Com

    securityweek.com | 13 hours ago | Article Details | Related Articles | Share
    • Apps
    • Dependency
    • Exposed
    • Manager
    • Vulnerability
    • 147 Tags
    • 8 Tweets
    • 54 Twitter Lists
    • 1 Linking Site
  • Hundreds of networks reportedly hacked in Codecov supply-chain attack

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Attack
    • Continuous integration
    • Hacked
    • Network
    • Supply chain
    • 215 Tags
    • 21 Tweets
    • 162 Twitter Lists
    • 1 Linking Site
  • How Secure Are Healthcare IT Systems? New Research Provides a Glimpse

    infosecurity-magazine.com | 18 hours ago | Article Details | Related Articles | Share
    • Health care
    • Information Technology
    • Research
    • Secure
    • Systems
    • 251 Tags
    • 3 Tweets
    • 32 Twitter Lists
  • Lazarus hacking group now hides payloads in BMP image files | ZDNet

    zdnet.com | 1 day ago | Article Details | Related Articles | Share
    • BMP file format
    • Image file formats
    • Lazarus Hacking
    • Payload
    • ZDNet
    • 183 Tags
    • 17 Tweets
    • 100 Twitter Lists
    • 2 Linking Sites
  • Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day

    fireeye.com | 1 day ago | Article Details | Related Articles | Share
    • Actors
    • Apt
    • Authentication
    • Secure
    • Zero-day
    • 335 Tags
    • 49 Tweets
    • 109 Twitter Lists
    • 46 Linking Sites
  • GDPR Guidance and Models

    pearltrees.com | 1 day ago | Article Details | Related Articles | Share
    • General Data Protection Regulation
    • Guidance
    • Models
    • Morning Ireland
    • Responsibility
    • 427 Tags
    • 1 Tweet
    • 23 Twitter Lists
  • New cyber security laws to protect smart devices amid pandemic sales surge

    gov.uk | 1 day ago | Article Details | Related Articles | Share
    • Computer security
    • Pandemic
    • Sales
    • Smart device
    • Surge
    • 459 Tags
    • 11 Tweets
    • 39 Twitter Lists
    • 3 Feeds
  • Over 580 WordPress Vulnerabilities Disclosed in 2020: Report | SecurityWeek.Com

    securityweek.com | 14 hours ago | Article Details | Related Articles | Share
    • Bug bounty program
    • Disclosed
    • Vulnerability database
    • WordPress
    • XSS
    • 109 Tags
    • 10 Tweets
    • 43 Twitter Lists
    • 1 Linking Site
  • Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise

    fireeye.com | 1 day ago | Article Details | Related Articles | Share
    • Compromise
    • Enterprise
    • Exploits
    • SonicWall
    • Zero-day
    • 374 Tags
    • 38 Tweets
    • 117 Twitter Lists
    • 19 Linking Sites
    • 1 Feed
  • Eversource Energy data breach caused by unsecured cloud storage

    bleepingcomputer.com | 1 day ago | Article Details | Related Articles | Share
    • Cloud storage
    • Data breach
    • Eversource Energy
    • Oldsmar, Florida
    • Security breach notification laws
    • 154 Tags
    • 27 Tweets
    • 137 Twitter Lists
    • 3 Linking Sites
  • Massive Android Botnet Hits Smart TV Ad Ecosystem | SecurityWeek.Com

    securityweek.com | 3 hours ago | Article Details | Related Articles | Share
    • Android
    • Botnet
    • Ecosystem
    • Smart TV
    • Television advertisement
    • 125 Tags
    • 4 Tweets
    • 13 Twitter Lists
    • 1 Linking Site
  • Google Play apps steal texts and pepper you with unauthorized purchases

    arstechnica.com | 1 day ago | Article Details | Related Articles | Share
    • Apps
    • Authorization
    • Google Play
    • Purchasing
    • Text
    • 216 Tags
    • 19 Tweets
    • 118 Twitter Lists
    • 1 Linking Site
  • Three Zero-Day Flaws in SonicWall Email Security Product Exploited in Attacks | SecurityWeek.Com

    securityweek.com | 18 hours ago | Article Details | Related Articles | Share
    • Exploit
    • Flaws
    • Security
    • SonicWall
    • Zero-day
    • 194 Tags
    • 9 Tweets
    • 38 Twitter Lists
    • 1 Linking Site
  • Codecov Supply Chain Attack May Hit Thousands: Report

    infosecurity-magazine.com | 17 hours ago | Article Details | Related Articles | Share
    • Alterations
    • Hit
    • Information sensitivity
    • Supply chain attack
    • Threat actor
    • 191 Tags
    • 4 Tweets
    • 38 Twitter Lists
    • 1 Feed
  • Pulse Secure Zero-Day Flaw Actively Exploited in Attacks | SecurityWeek.Com

    securityweek.com | 1 day ago | Article Details | Related Articles | Share
    • Attack
    • Dirk Schrader
    • Flaw
    • Secure
    • Zero-day
    • 209 Tags
    • 18 Tweets
    • 40 Twitter Lists
    • 2 Linking Sites
  • Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

    mcafee.com | 10 hours ago | Article Details | Related Articles | Share
    • Automattic
    • COVID-19
    • McAfee
    • Trust Nobody
    • Zero
    • 484 Tags
    • 3 Tweets
    • 28 Twitter Lists
  • SaaS Application Security Firm AppOmni Raises $40 Million | SecurityWeek.Com

    securityweek.com | 13 hours ago | Article Details | Related Articles | Share
    • Application security
    • Data access
    • SaaS
    • Scale Venture Partners
    • Security management
    • 128 Tags
    • 4 Tweets
    • 20 Twitter Lists
    • 2 Linking Sites
  • MI5 warns of spies using LinkedIn to trick staff into spilling secrets

    bbc.co.uk | 1 day ago | Article Details | Related Articles | Share
    • 7 Tags
    • 51 Tweets
    • 169 Twitter Lists
    • 2 Linking Sites
  • The Next Phase of Velociraptor

    velociraptor.velocidex.com | 13 hours ago | Article Details | Related Articles | Share
    • Attackers
    • Australian Signals Directorate
    • Event Viewer
    • Platform
    • The Next Phase
    • 350 Tags
    • 4 Tweets
    • 32 Twitter Lists
    • 1 Linking Site
  • About
  • How Serendeputy Works
  • Privacy Policy
  • Terms of Service

  • Serendeputy Blog
  • Customer Forum
  • @Serendeputy