NordPass vs Bitwarden: Which Is Safer and Easier to Use in 2025?

Which is better, NordPass or Bitwarden? This guide provides a detailed comparison of their features, security and pricing to help you choose your best fit.

Security | TechRepublic – ​Read More

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive. 

The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek.

SecurityWeek – ​Read More

AI-Powered DEI Web Accessibility Hackathon 2025: Technical Innovations and Real-World Impact

Following the success of the Neuro Nostalgia Hackathon that closed out in 2024, Hackathon Raptors has completed its…

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source

The Hacker News – ​Read More

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised to leak secrets from repositories using the continuous integration and continuous delivery (CI/CD) workflow.
The incident involved the tj-actions/changed-files GitHub Action, which is used in over 23,000 repositories. It’s used to track and retrieve all

The Hacker News – ​Read More

UK’s internet watchdog puts storage and file-sharing services on watch over CSAM

As duties under the U.K.’s Online Safety Act (OSA) related to tackling illegal content came into force Monday, the internet watchdog, Ofcom, said it has launched a new enforcement program focused on online storage and file-sharing services. The regulator said its evidence shows that file-sharing and file-storage services are “particularly susceptible” to being used for […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Popular GitHub Action Targeted in Supply Chain Attack

The tj-actions/changed-files GitHub Action, which is used in 23,000 repositories, has been targeted in a supply chain attack.

The post Popular GitHub Action Targeted in Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

European Cyber Report 2025: 137% more DDoS attacks than last year – what companies need to know

Frankfurt am Main, Germany, 17th March 2025, CyberNewsWire

Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – ​Read More

European tech industry coalition calls for ‘radical action’ on digital sovereignty — starting with buying local

A broad coalition drawn from across the ranks of Europe’s tech industry is calling for “radical action” from European Union lawmakers to shrink reliance on foreign-owned digital infrastructure and services to bolster the bloc’s economic prospects, resilience, and security in increasingly fraught geopolitical times. In an open letter to European Commission president, Ursula von der […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

SecjuiceCON 2025

SecjuiceCON 2025

After a decade of publishing your favorite infosec articles, we are very proud to announce SecjuiceCON 2025, our very first virtual conference. The first Secjuice conference is an online event for infosec and osint industry insiders, and we’d love for you to talk to our audience about your wisdom and learnings.

You might already know about our work, but Secjuice is the only non-profit, independent, and volunteer-led publication in the information security space. We are a private members’ writing club focused on cybersecurity, information security, hacking, and open-source intelligence gathering.

We believe that our value as professionals lies in our ability to share our research and knowledge with others through the written word. We mentor hackers and help them prepare their research for publication. Our members feel a strong sense of civic duty; it’s what drives us to spread our knowledge and experiences with our community. Defending the interests of those who hack is within our remit.

Conference Date

Mark it on your calendar!

Sunday, March 30, 2025

12 PM Eastern Daylight Savings Time (EDT)

4 PM Coordinated Universal Time (UTC)

Venue

YouTube Premier Video

https://www.youtube.com/@secjuice

Schedule and Presenters

The schedule uses the America/New_York or Eastern Daylight Savings time zone.

  • 12 PM: Openining ceremonies
  • 12:05 PM: Keynote presentation by Jamie Collier, Lead Advisor (Europe) at Google Threat Intelligence Group
  • 1:00 PM: Lightning Talks
    • “Containers Breakouts: From Zero to Host Computers” by Chaitanya Rahalkar
    • “Zero Trust Architecture in Cloud and DevOps Environments” by Sai Sandeep Ogety
    • “Deep Fake: Cybersecurity’s New Villian” by Sankalp Kumar
    • “Maltego + Telegram = Magic: Stickers as a de-anonymization tool in Telegram” by Maksim Rogov
  • 1:20 PM: “Disinformation in OSINT” by William Ruzich
  • 1:40 PM: “Best Practices for Cybersecurity Project Management” by Tiffany Portis
  • 2:00 PM: “Security Considerations for MLOps Infrastructure on AWS” by David Akuma
  • 2:20 PM: “Attacking LLM Detectors with Homoglyph-Based Attacks” by Aldan Creo
  • 2:40 PM: “Redefining Cloud Security with the Power of Blockchain and AI” by Sayali Paseband
  • 3:00 PM: “Securing AI Workloads on Amazon Bedrock using GuardRails” by Lahiru Hewawasam
  • 3:20 PM: “Hack a CEO” by Viktor Arato
  • 3:40 PM: TBD
  • 4:00 PM: “Embracing AI Red Teaming” by David Campbell
  • 4:20 PM: Closing ceremonies

The schedule is tentative and subject to change.

Code Of Conduct

No drama, no hostility, maintain civility, or else.

Our Sponsors

We thank the following sponsors.

Gold Sponsors

Bronze Sponsors

Want to sponsor SecjuiceCon?

We are still accepting sponsorships.

Please email conference at secjuice dot com to get more details!!

Secjuice – ​Read More