Reading view

There are new articles available, click to refresh the page.

The new Inoreader experience is here! 🎉

After months of hard work, testing, breaking, fixing, and rebuilding, the cat is finally out of the bag. The brand-new Inoreader is here, and we couldn’t be more excited to share it with you! Our latest major update marks a significant milestone for our team, and we’ve done our best to bring you a fresh and modern interface with new and updated features to enhance your experience.

Why a redesign?

It’s been a while since our last major update, and we recognize that during this time, both the digital landscape and our users’ needs have evolved. Over the past few years, we’ve rolled out many new features that we felt needed to be organized and integrated into a cohesive experience. As we’ve grown alongside our community, we’ve listened to your feedback and observed how you interact with our platform. Our goal has always been to make content discovery, consumption, and distribution seamless and enjoyable.

With this redesign, we’ve reimagined Inoreader’s UI to provide intuitive and user-friendly solutions at every step. We’ve modernized our interface, making it sleeker and more visually appealing while ensuring it remains easy to navigate. We’ve put considerable effort into preserving the familiarity and usability of features from the previous design so you can feel right at home in this new environment. Whether you’re a long-time power user or new to Inoreader, we believe these changes will significantly improve your workflows and make managing your content a breeze. Read on to learn what’s in store with this major release!

Modern and responsive interface

The first thing you’ll probably notice is Inoreader’s sleek new look. All themes have been updated with refreshed brand colors, offering a more visually appealing and cohesive experience. Enhanced components, including dialogues, menus, and other elements, provide a more intuitive and user-friendly interface. We’ve also dedicated significant effort to developing a responsive mobile experience, allowing you to transition your entire workflow to your phone without sacrificing functionality.

New tab bar and dynamic sidebar

Navigating Inoreader has become easier than ever with the new tab bar and dynamic sidebar. These features provide quick and easy access to all key sections of your account, including dashboards, feeds, saved items, Team spaces, automations, and dedicated tabs for searching articles and adding feeds. The intuitive layout helps you find what you need at a glance, ensuring you can effortlessly switch between sections while saving valuable time and effort.

Enhanced custom dashboards

Our redesigned dashboards offer improved customization with various new and updated widgets. Choose a layout to showcase essential content at a glance, creating a personalized space that meets your preferences. Key updates include new onboarding widgets to assist users during account setup, content widgets to highlight the most relevant articles, and data widgets to track your reading habits and feed performance, enabling effective usage monitoring.

A new hub for your saved items

The new Saved section redefines how you organize your personal library in Inoreader. It’s the central hub for articles saved to read later, archived items, annotations, and tags – all in one place. Enjoy a new article view featuring estimated reading times, progress tracking, and editable metadata for easier content management. The Continue reading tab lets you pick up right where you left off. To keep your reading list clutter-free, move articles you’ve read but would like to keep to the new Archive. With the ability to cross-select tags, discovering relevant content is just a few clicks away. Additionally, saving articles and external pages from the web is extremely easy, either through the Add web page button inside Inoreader or via the browser extension, available for the web and all apps.

More control with content filters

The recent updates to content filters are designed to save you time and effort by enabling you to apply filters to entire folders. This enhancement simplifies content management while reducing filter limitations. Additionally, you can now view items removed by your filters through the new Filters dashboard in the Automate section. Simply click on the number displayed under Removed today to access a log of all removed articles, giving you greater visibility and control.

Improved article search

Finding the content you need is now more efficient with our enhanced search functionality. The new contextual search allows you to seamlessly search within feeds, folders, and other sections of your account. Additionally, the dedicated article-only search engine in the tab bar simplifies finding specific content, whether from publicly available sources or within your own account.

Convenient audio player

Our background audio player also has a sleek new design. You can now access it directly from your tab bar and enjoy listening to articles and podcasts while browsing or multitasking. Easily add items to your queue from any feed, folder, or article, and rearrange your playlist on the go for a seamless listening experience.

YouTube feed updates

We have made some significant improvements to how you interact with YouTube content on Inoreader. You can now filter out videos under 60 seconds, with Shorts easily identifiable by a distinct icon in your feeds. Additionally, you can view video durations and identify live videos, whether scheduled or ongoing, at a glance. These updates give you more control and a clearer overview of your YouTube content.

Refreshed Teams interface

The Teams section of Inoreader has undergone a complete redesign, now featuring separate tabs for essential areas such as Activity, Members, Digests, Folders, Channels, Tags, Organization, and Billing. These updates are further enhanced by new features like shared annotations to facilitate collaboration and email digest logs for easy access to past issues with detailed metadata.

Other improvements

In addition to these major updates, we’ve made some smaller changes to enhance your overall experience:

  • Preferences section: Now includes a convenient search bar, helping you quickly locate and customize settings to suit your reading habits.
  • Mark as read and hide: This optional setting lets you mark articles as read and hide them with a single (X) button. To enable it, go to Preferences > Settings > Article listing and check the box next to Mark as read and hide.
  • Show updated items only: A new button toggles between showing all or only unread sections in the sidebar, available separately for feeds and tags.
  • Resizable sidebar: Adjust the width of your sidebar to fit your browsing preferences for a more comfortable experience.
  • No more ads: The Free plan no longer contains ads, providing a cleaner view that allows you to focus on what matters most.

We hope these updates ensure a smooth and personalized workflow for your needs.

A big thank you! 💙

To conclude this lengthy post on a warm note, we want to express our sincere gratitude to our users for your continued support, patience, and feedback throughout the redesign process. Your insights, ideas, and suggestions have played a crucial role in shaping the new Inoreader experience, and we truly hope you enjoy the enhancements we’ve made. As we move forward, we’ll be listening closely to your feedback and addressing any minor bugs that may arise in the coming weeks. If you have any thoughts or reports to share, please reach out through the feedback form in your Inoreader account. Thank you for being a part of our community!

The post The new Inoreader experience is here! 🎉 appeared first on Inoreader blog.

App update: Seamless reading with enhanced offline mode

Picture this: You’re commuting on the subway, soaring high in the clouds, or hiking in the mountains without internet coverage. You’re craving some quality reading time, and now, with Inoreader, you’ve got a better way to do just that!

Our latest update brings more freedom to your reading experience. Now, more sections of your mobile app are available for offline reading, no matter where you are. You can browse your selected feeds, folders, tags, annotations, and saved articles on the go. What’s more, you can manage your content offline by assigning tags, saving articles for later, or marking them as read. All changes will sync with your account once you’re back online.

And here’s the best part – the app continuously downloads new articles in the background (depending on your settings), ensuring you’ll always have access to the latest and freshest content, even offline!

Activating offline mode

Enabling offline mode in the Inoreader app is now more convenient than ever! Thanks to our latest update, you can open a section of your account, like a folder, and tap the new download button in the upper right corner of the screen. And just like that, the section is now available offline! If you want to configure your settings, tap the icon again.

For those who prefer the traditional method, you can still swipe right next to the desired section on iOS or long-press it on Android. Then, select “Make offline,” adjust your settings, and click “Done.” When viewing these sections in the sidebar, you’ll spot a blue arrow indicating that offline mode is up and running.

Articles available for offline reading are marked with a special icon. This ensures that when you browse through the ‘All articles’ section, you can effortlessly identify which pieces have been downloaded and are available offline. What’s more, this information gets updated in real-time. So, for example, if you’ve enabled offline mode for your ‘Read later’ section, any article you save for later will be instantly synced, and the indicator will immediately appear.

Please note that offline mode is a Pro feature that requires app version 7.7 to work. Don’t miss out – upgrade now to unlock it and take your reading experience to the next level!

Ready to enjoy seamless reading wherever life takes you? Download the Inoreader app now and embark on your next offline adventure!

With Inoreader’s offline mode, your content is always within reach, even when the internet isn’t. Happy reading!

The post App update: Seamless reading with enhanced offline mode appeared first on Inoreader blog.

New Single Sign-On (SSO) feature for Enterprise clients

In a fast-paced corporate landscape, efficiency and security are key. Managing employee accounts across various platforms can be a time-consuming task, not to mention it could open your organization up to security vulnerabilities. That’s why we’re happy to introduce our latest feature developed especially for Enterprise clients – SAML-based Single Sign-On (SSO). Keep reading to discover its full benefits!

Understanding Single Sign-On

For those new to the concept, Single Sign-On (SSO) is a centralized authentication process commonly used by larger organizations. It allows users to access multiple applications with just one set of login credentials, like a digital passport to all essential corporate tools and services.

Streamlining account management

With SSO, users can easily navigate through various platforms without the hassle of remembering multiple passwords. For larger organizations with multiple employees or contractors, this means no more juggling accounts and worrying about unauthorized access. Once an employee’s rights are revoked centrally, they lose access to all connected systems simultaneously, giving employers peace of mind.

Introducing SAML SSO

Our SAML SSO feature operates similarly to familiar login methods like Google or Apple login but is tailored for a corporate environment. The key to SAML SSO lies in the user’s email domain, which determines their identity provider (IdP) and corresponding Team in Inoreader.

Two authentication flows

We offer two primary authentication flows for SAML SSO: SP-initiated and IdP-initiated. With the SP-initiated one, users begin the login process on our website, whereas the IdP-initiated one allows them to start directly from their corporate login portal, ensuring flexibility and ease of use.

Configuring SSO

Configuring SSO for your Team is easy. Team admins can access the Single Sign-On configuration through the Team dashboard by clicking the dropdown menu under the Team’s name and selecting Manage SSO. Then, they should simply follow the prompts to complete the setup, save their settings, and start enjoying the benefits of SSO. After the initial configuration, admins can use the Inoreader Single Sign-On URL to configure their IdP-initiated flow.

Logging in with SSO

Logging in with SSO is as simple as entering your corporate email on our dedicated SSO login page. Once authenticated through your IdP, you’ll be redirected back to Inoreader, ready to dive into your Team’s content.

Important considerations

While SSO offers unparalleled convenience and security, there are a few things to keep in mind:

  • Only Team owners can modify the SSO configuration.
  • Enabling SSO deactivates Inoreader authentication for all Team members except the Team admin, who retains the option to use it for emergency access.
  • Once configured, new signups from your company domain will only be permitted via SSO. Team invitations are disabled, and all pending invites are deleted.
  • If there are Team members using a different email domain, enabling SSO will lock them out of the Team. In such instances, you can contact our support to update their emails, or they can make the changes before the admin enables SSO for the entire Team.
  • Users authenticated with SSO will have their browser sessions expire after 30 minutes upon closing the Inoreader tab. This measure ensures constant re-authentication in case of revoked rights.
  • Team admins will need to manually remove users from the Team if they are no longer part of the company. Otherwise, they will still occupy a slot in your Team plan, as Inoreader cannot distinguish between temporary or permanent access disablement.
  • Disabling SSO for a Team will reactivate Inoreader authentication for all members. If they have previously signed up via SSO, they will need to use the password reset function to create new passwords and log into their accounts.

A step towards enhanced efficiency

At Inoreader, we’re committed to providing solutions that empower our clients. With SSO, we’re simplifying account management and improving how Teams work together. Say goodbye to scattered user data and hello to a secure and efficient workflow with SAML Single Sign-On!

Ready to get started?

Take advantage of SSO’s power within your organization! Visit your Team dashboard to set up SSO and experience seamless account management like never before. Still not in a Team?

Note: Please be aware that the SSO login method is currently unavailable for Inoreader’s mobile apps. We’re working diligently to bring this functionality to all platforms soon.

The post New Single Sign-On (SSO) feature for Enterprise clients appeared first on Inoreader blog.

Follow Bluesky RSS feeds in Inoreader

Bluesky, the exclusive microblogging social media platform featuring Twitter co-founder Jack Dorsey on its board of directors, has taken a big leap toward connecting its invite-only community with the broader public. Now, you can easily follow individual Bluesky users through RSS feeds in Inoreader. Here’s everything you need to know:

How to follow a Bluesky user in Inoreader?

Following a Bluesky user on Inoreader is simple – just copy and paste the link to their profile into the search bar, and Inoreader will discover the user’s personal RSS feed for you. For example, let’s try it with crypto researcher & critic Molly White’s profile URL:

The feed links are embedded in each Bluesky user’s profile, making them easily discoverable by RSS browser extensions. If you’re using Inoreader’s browser extension, it will automatically detect a user’s RSS feed, enabling you to follow it while viewing the profile in your browser.

Restrictions

It’s important to note some limitations apply to Bluesky RSS feeds. Currently, they only include posts that are public by default and do not require a login. Bluesky users can restrict post visibility, preventing these posts from appearing on their personal RSS feed.

Additionally, Bluesky RSS feeds don’t display embedded links in text posts. To access the links, you’ll need to navigate to the original post on Bluesky, which can be a little inconvenient.

With Bluesky making significant strides in accessibility, it will be interesting to observe if the platform gains popularity and eventually opens its doors to the public. Filling the void left by post-Musk Twitter is a formidable challenge, so we’ll keep a close eye on Bluesky and their next moves.

The post Follow Bluesky RSS feeds in Inoreader appeared first on Inoreader blog.

Stay in the know with monitoring feeds

Next in our list of exciting 2024 updates, we’re introducing monitoring feeds – a feature bringing new organizational capabilities to enhance your workflow! Read on to explore their benefits:

What are monitoring feeds?

Monitoring feeds are the upgraded counterpart of monitored keywords, a feature designed to help Inoreader users stay informed by keeping track of news on people, brands, companies, emerging trends, and events. Consider them as a streamlined approach to gathering and organizing relevant information on specific topics of interest. You can use monitoring feeds to:

  • Consolidate articles about a particular subject from the various feeds you already follow. For example, you can create a monitoring feed to compile all Android-related articles coming into your account, ensuring a comprehensive view of all of them in one place.
  • Keep a close eye on publications related to your brand, business, or even yourself by setting up monitoring feeds to scour the internet for incoming articles matching certain keywords and phrases. With this approach, you can get results from feeds you don’t currently follow.

Whether you’re tracking industry trends, personal interests like fandom and entertainment news (say, if George R. R. Martin ever finishes writing The Winds of Winter), or even exploring quinoa recipes, you can turn your searches into feeds and receive regular updates with monitoring feeds. Filter results by preferred language, use advanced syntax for sophisticated searches, and combine keywords and phrases in advanced queries to get a tailored and organized view of the information that matters to you!

How to create monitoring feeds?

Creating monitoring feeds is pretty straightforward. Head to the ‘Search’ section of your account, enter a keyword or phrase (don’t forget to use our advanced query builder for precision), select the type of search you want to perform, apply relevant filters, and click the button at the bottom of the screen, conveniently labeled ‘Create monitoring feed.’

Once created, your monitoring feeds will appear under ‘FEEDS’ in your sidebar, joining your other RSS and Web feeds, newsletters, and social feeds. They will regularly update and display all new articles matching the search criteria set by you. The added perk? Monitoring feeds behave just like regular feeds, meaning they are folder-friendly! Easily organize them into personal or Team folders and export them as RSS feeds or HTML clips to streamline content sharing.

How can monitoring feeds improve your workflow?

Curious about the potential this feature brings for improving efficiency? Let’s start there: Articles collected by monitoring feeds are integrated into the ‘All articles’ section, mingling with content from your other feeds for increased visibility and time saved from switching between different parts of your account.

You can also take content organization to the next level by grouping monitoring feeds in folders along with other feeds. This allows you to apply rules and filters uniformly, not to mention that creating email digests becomes a breeze – just pick a folder and get all your feeds on a specific topic (including monitoring feeds) with one click!

Another game-changer is the effortless search within folders. Explore the content of multiple monitoring feeds simultaneously, streamlining your research for common topics across various feeds (e.g., searching for ‘multiverse’ in ‘science’ and ‘entertainment’ monitoring feeds).

With that in mind, you are now ready to embrace the future of monitoring with our new feeds. Elevate your workflow, boost efficiency, and organize your account better! Ready to dive in?

Upgrade to Pro and enjoy monitoring feeds along with the best perks Inoreader has to offer!

The post Stay in the know with monitoring feeds appeared first on Inoreader blog.

Manage shared feeds with new Team folders

New Year, new features! Inoreader’s Team plans now include shared folders, a flexible content management and collaboration tool. Dive in to learn more and find answers to your burning questions!

What are Team folders?

Think of them as shared assets that empower the entire Team by segregating personal feeds from organizational resources. These dynamic folders allow admins to add or remove feeds at any time, ensuring that relevant content is always displayed in all member accounts.

Who can create Team folders?

All admins can create Team folders.

How to create a Team folder?

Team admins can choose from three options when creating a shared folder:

  1. Going to the Team dashboard, the Team folders section, and clicking the Create folder button:
  1. Clicking the Add Team folder button on their sidebar, under TEAM FOLDERS:
  1. Right-clicking on a personal folder in their sidebar and selecting Create Team folder:

How to add feeds to a Team folder?

Admins can add feeds to a Team folder in several ways:

  1. By searching for a feed, clicking the chevron, and choosing an option from the list:
  1. By right-clicking on a feed in their sidebar and selecting Add to Team folder:
  1. By selecting Add to Team folder from a feed’s dropdown menu:

How to remove feeds from a Team folder?

To remove a feed, admins should go to their Team dashboard, navigate to the Team folders section, and click the More (…) menu next to the folder they want to edit. Then, after selecting Folder properties, a red X sign will appear if they hover with their mouse over a feed icon. Clicking it will remove the feed from the Team folder.

How to manage the members of a Team folder?

Admins can manage the members of a Team folder by using the More (…) menu next to a folder’s name in the Team folders section of their Team dashboard or by right-clicking a Team folder in their sidebar and selecting Manage Team members:

How to follow a Team folder?

To start following a shared folder, Team members should click the More (…) menu next to a folder’s name in the Team folders section of their Team dashboard and then select Follow:

How to unfollow a Team folder?

Stop following a Team folder with a simple click on the Unfollow button in either the Team dashboard or by right-clicking on the folder in your sidebar.

Additional tips:

  • You can follow the same feeds in your personal account and Team folders simultaneously, with synchronized unread counters.
  • If you unfollow a feed from your personal account but it’s featured in a Team folder, it will remain visible in the Team folder.
  • Rules and filters can be applied to Team folders, but the effects are personal and will not be visible to other Team members.

We’re confident this new feature will significantly boost productivity for Inoreader Team members in 2024, fostering enhanced collaboration and efficiency.

Ready to elevate teamwork within your organization? Explore our Enterprise solutions and choose the plan that best suits your needs!

The post Manage shared feeds with new Team folders appeared first on Inoreader blog.

3 ways to score the best holiday deals with Inoreader

It’s happening – Mariah Carey and Michael Bublé have woken up from their year-long slumber, marking the arrival of the holiday season. ‘Tis the time for cozy gatherings, family vacations, and elaborate plans to spend more time with those near and dear. And while some of us are caught up in the infectious holiday cheer, others find themselves grappling with the inevitable stress of picking the perfect presents that won’t empty their wallets.

If you find yourself nodding in agreement with the latter, don’t worry – we’ve got your back. Just in time for the upcoming whirlwind of Christmas sales, we bring you the ultimate guide to navigating stress-free holiday shopping with Inoreader:

1. Get exclusive email offers

When it comes to online shopping, some of the best deals are reserved for the subscribers of company newsletters. Yet, we get it – having your personal inbox flooded with branded messages might not sound ideal. That’s where Inoreader’s newsletter subscription feature comes in handy, especially during the holiday hustle.

Instead of drowning in a sea of promotional emails, keep your inbox clean while staying ahead of the hottest deals by treating newsletters as regular RSS feeds. Create unique email addresses for each subscription and have the messages come straight to Inoreader as articles. This way, you can access all the best offers without getting overwhelmed.

2. Track discounts and availability

That new phone, headset, or gaming console you’ve been considering doesn’t have to remain out of reach. Smart shopping no longer means endless hours spent scouring the internet for the best deals – with Inoreader, you can let the Track Changes feature do the heavy lifting for you. Spotting a seasonal sale on the horizon? Select the prices of your desired items and receive notifications whenever there’s a change.

What if you’ve just made up your mind, but the item you had your heart set on is suddenly out of stock? The Track Changes feature can help in this situation as well. Be among the first to know when the product is available again by setting up alerts for changes in size, color, or overall availability through custom Web feeds.

3. Follow feeds sharing the best holiday deals

Picking the perfect presents doesn’t have to be an excruciating task. Dive into Inoreader’s featured feed collections to discover gift inspiration according to your loved ones’ preferences.

For tech enthusiasts, turn to feeds like Engadget, Mashable, and WIRED for in-depth product reviews that can help you make an informed decision. The bookworms in your inner circle are covered by Goodreads, where gift guides, award-winning titles, and reader recommendations take center stage. Food52 has some lists of ideas for the foodies in your life, suggesting an array of gifts for aspiring home chefs. For more versatile gifts for all interests and ages, turn to Wirecutter and their ‘reviews for the real world.’

Don’t limit yourself – explore the entire Product Reviews collection for a comprehensive look at recommended products across different categories. And here’s a pro tip: supercharge your followed feeds by boosting them, ensuring you get more frequent updates to stay in the loop when it comes to the latest holiday offerings.

Bonus tip: Combine with rules

Upgrade your shopping strategy by incorporating rules into your arsenal. Get notified whenever an important update is published to one of your newly followed newsletters, Web feeds, and RSS feeds, even while you’re not browsing Inoreader.

You can set up rules to send instant push notifications to your phone, keeping you updated on the go. To stay informed throughout your workday, you can configure rules to automatically send certain articles to your email. Desktop alerts are another efficient way to stay informed.

And there you go – you are now ready to crush this year’s holiday frenzy with Inoreader by your side! Discover stress-free shopping with our Pro plan, unlocking advanced features designed to make your time online more meaningful and enjoyable. Upgrade today and try it for yourself!

The post 3 ways to score the best holiday deals with Inoreader appeared first on Inoreader blog.

On battling misinformation

Everyone would agree that media literacy and critical thinking are essential in a world where information flows freely. But why does distinguishing fact from fiction these days feel more challenging than ever? The answer lies in the sheer volume of content and the ease with which malicious claims can be spread online. While fact-checking is crucial, it is virtually impossible to verify every point made in the articles we read single-handedly. Thus, we are left with a somewhat abstract solution – learning to navigate the complexity of media coverage and training our minds to detect deluding claims based on context and experience.

Acknowledging these challenges is the first step toward staying well-informed. Read on to discover some tips on battling misinformation and learn how Inoreader can be your ally in the battle against fake news!

Comparing information from multiple sources

One of the most effective ways to counter misinformation is to cross-reference news from multiple sources. An example of this would be following media outlets from different sides of the political spectrum in your country or region to gain a well-rounded view of current events.

Explore our feed collections featuring some of the top news sources by country for easy access to a diverse range of outlets.

If you’re trying to make sense of international news, checking media coverage from different countries can help you compare global perspectives. Use our article search and monitoring feeds to get updates on breaking news and developing stories that come straight to you.

Don’t speak the language? No problem! Inoreader’s translation feature works with over 30 languages, helping you break down barriers in international news consumption.

Getting real-time updates from trusted sources

Staying informed while events unfold can be crucial, but ensuring your news comes from reliable sources is equally important. Luckily, Inoreader makes it easy to subscribe to official RSS feeds and Facebook pages of public institutions or trusted media outlets.

If you can’t find an RSS feed for a source you’d like to follow, don’t worry – our Web feeds feature allows you to create your own.

Citizen journalism for unfiltered live news

While professional journalism bases its credibility on adhering to agreed-upon ethical standards, citizen journalism can offer a valuable, unfiltered perspective in cases of emergency and limited media coverage. With just a smartphone in their hand, individuals who may not be trained journalists have the power to provide direct news reports from the scene of an event, and such coverage plays an increasingly important role in today’s fast-paced media landscape. Still, we advise that you always remember that citizen journalism can lack the editorial checks of traditional news outlets, making reader discretion extremely important.

Follow Telegram channels in Inoreader for immediate coverage of breaking news.

Knowledge beyond surface-level reporting

Once you’ve covered the basics, you can dive deeper into the realms of public knowledge. To gain a deeper understanding of complex issues that interest you, seek out experts who provide background research and analysis. Their insights can help you see beyond surface-level reporting and develop a more nuanced understanding of world events.

Subscribe to specialized newsletters and podcasts in Inoreader.

All of this and more in one place

In times when misinformation lurks behind every digital corner, being a discerning news consumer is more important than ever. Inoreader empowers you to collect and compare information from multiple sources, get real-time updates, explore unfiltered reporting, and access in-depth knowledge from experts, all in the same convenient platform.

Elevate your news consumption and unlock a world of reliable, diverse, and timely information at your fingertips. Join the battle against misinformation and take control of your news intake with Inoreader as your trusted ally!

The post On battling misinformation appeared first on Inoreader blog.

Navigating the AI craze

Amidst the Information Age, where social media, algorithmic feeds, politicized content, advertorials, and deepfakes have become an increasing part of our lives, the significance of staying well-informed has never been greater. The digital realm offers a vast sea of knowledge mixed with misinformation and skewed narratives. In this landscape, curating the news you consume can feel daunting, demanding your time and effort. It’s easy to see why the promise of AI-generated newsfeeds designed to simplify our information intake can seem alluring to many.

As we delve into the depths of AI-driven news personalization, we must recognize the issues beneath the surface. While AI has its merits, it also raises serious concerns. In this exploration, we’ll uncover some of these challenges and compare them to the alternative: harnessing the power of RSS technology and platforms like Inoreader to regain control over our information choices and deepen our understanding of the world.

The appeal of personalization

In a rapidly evolving digital landscape where convenience and personalization reign supreme, AI-powered news reading has emerged as an attractive proposition. Yet, while the idea of AI crafting tailored briefs that align with our individual interests and reading habits sounds appealing, there are long-term issues related that deserve our attention.

One of the potential pitfalls of AI-driven news personalization lies in its ability to inadvertently foster information bubbles and echo chambers. Designed to filter out content users have previously disliked or failed to engage with, such algorithmic systems often trap readers in a self-perpetuating news cycle, reinforcing preconceived biases and misconceptions. Without exposure to different perspectives, we are often deprived of the context required to grasp complex events, operating with a limited glimpse of the world.

While offering a sense of instant gratification, AI-driven news personalization threatens to minimize our capacity to engage critically with new ideas and perspectives challenging our own.

The dangers of absolute objectivity

Fed up with deceptive news headlines designed to boost engagement, some readers suggest employing AI to transform sensational titles into more neutral, fact-focused summaries. Others even go as far as suggesting that AI could be used to assess articles’ quality to help readers decide whether consuming them is worth their time.

At first glance, this approach seems promising in its ambition to eliminate bias. However, the pursuit of absolute objectivity could strip journalism and news reporting of their human touch, desensitizing us to the interplay of emotions that go hand-in-hand with public information. In an AI-dominated news landscape, we risk losing our ability to discern the delicate balance between facts, interpretation, and human narratives that enrich our understanding of the world.

The promise of saved time

Many power users see AI as a valuable tool for condensing lengthy articles into brief summaries, offering a way to save precious time in a busy media environment. Although reading a quick overview can be a practical decision when your time is limited, turning this into a regular habit might hide some risks. Quite tempting and convenient, mainly relying on summarized content can condition us to prefer oversimplified narratives over time. The frequent consumption of bite-sized information may create the illusion of knowledge, while in reality, it only scratches the surface, lacking the depth needed for a genuine understanding of the rationale, nuances, and essence of a news story, analysis, or opinion piece.

Is RSS old news?

Not at all, especially if you value control and depth in your news consumption. With the use of RSS technology, you have the power to curate your news experience in a way that AI algorithms can’t replicate. Of course, you can handpick the sources and creators you wish to follow, ensuring you’ll always get content that aligns with your interests and values. But here’s where it gets interesting – you can also expand your horizons by monitoring the broader coverage of trending topics and events, ensuring you get the whole picture.

Tip: Use Inoreader’s monitoring feeds to stay informed about developments beyond your regular feeds.

Unlike AI algorithms that filter your content and choose what you see, RSS presents you with all posts from the feeds you follow the minute they’re published online. This means you’ll never miss out on important updates or be subjected to personalized bubbles that limit your perspective if you pick your sources carefully.

Tip: To broaden your horizons even more, use the advanced search, discovery, and translation features in Inoreader to compare news coverage in different countries and languages.

Moreover, RSS readers like Inoreader enable you to build a personal content repository over time. You can apply tags, annotate articles, and save them for later reading or reference, creating a valuable resource that grows with your interests.

Ultimately, the key advantage of RSS lies in the human touch. It puts you in the driver’s seat, allowing you to decide whether you want to explore different opinions or maintain a specific perspective. You have the flexibility to set up your news aggregation systems to suit your preferences and habits. In a world increasingly driven by AI, RSS technology reminds us that human intent remains paramount in shaping our news experiences.

Ready to take control and build your own newsfeed?

The post Navigating the AI craze appeared first on Inoreader blog.

Help your team stay in the loop with our updated email digests

We’re excited to announce the latest update to our email digests – a complete redesign of the creation process that makes it more intuitive and user-friendly, giving you full control over the desired outcome. Let’s take a closer look and go through the steps that make setting up your digests easier than ever!

Step 1: Settings

To get started, add a name and description for your new digest. Then select a start date, time, and repeat option. Picking a start date will allow you to schedule the first issue of your digest independently of your repeat schedule. Whether you prefer our predefined schedules or want to create a custom one throughout multiple days of the week, the choice is up to you.

What’s new: We’ve introduced the ability to select a start date and added new biweekly and monthly options to give you more flexibility in scheduling your digests.

Step 2: Content

In this step, you get to choose the content you want to feature in your regular digests. Simply pick a source and provide a name for the section it will be featured in (this part is optional).

What’s new: You can now select content from multiple sources such as folders, tags, team channels, monitoring feeds, and saved articles to be displayed in different sections of your digest. Use the Add new section button to separate the content visually and delete sections by clicking the bin icon if you no longer need them.

Step 3: Recipients

Adding recipients is pretty straightforward – just type their email addresses and hit Enter. If you make a mistake, deleting a recipient is as easy as clicking the bin icon on the right. The invitations asking team members to subscribe to your new digest won’t be sent until you finalize your settings, giving you an opportunity to review everything in the final step.

Step 4: Review

The final step of the creation process enables you to review the details of your newly composed digest, including its title, description, schedule, and recipients. Additionally, you’ll get a preview of what your emails will look like. Please note that the preview displays sample articles from the selected sources, while the actual articles sent may differ. If you need to make any changes, you can easily go back before saving your new digest.

What’s new: We’ve added a comprehensive review section and a preview option to ensure you have a final look at your digest before saving it. Additionally, you can now see which invitations will be sent out once you save the digest. This feature proves particularly handy when editing older digests with numerous subscribers, as it ensures you can easily distinguish between previously sent invitations and new ones.

Once you’re finished, you can find your newly created digest in the Team digests section of your Team dashboard. From there, you can make edits or delete it at any time. Keep in mind that modifications to the digest may impact its next distribution.

By following these simple steps, you will unlock a new level of efficiency in curating and distributing valuable insights. Your team can now enjoy a seamless flow of information and embrace Inoreader’s updated features to stay ahead with the knowledge that truly matters!

Email digests are available in our Team plans. Find out more about them here:

The post Help your team stay in the loop with our updated email digests appeared first on Inoreader blog.

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations

Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands. Cybersecurity company Check Point has codenamed the malware WezRat, stating it has been detected in the wild since at least September 1, 2023, based on artifacts uploaded to the

Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform

Cybersecurity researchers have disclosed two security flaws in Google's Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate privileges and exfiltrate models from the cloud. "By exploiting custom job permissions, we were able to escalate our privileges and gain unauthorized access to all data services in the project," Palo Alto Networks

Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices

In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and business continuity. Are you prepared to act swiftly when the unexpected happens? Join DigiCert’s exclusive webinar, "When Shift Happens: Are You Ready for Rapid

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia

A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer. The malware "targets victims' sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software,"

How AI Is Transforming IAM and Identity Security

In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into its analytical capabilities to monitor access patterns and identify anomalies that could signal a potential security breach. The focus has expanded beyond merely managing human

High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables

Cybersecurity researchers have disclosed a high-severity security flaw in the PostgreSQL open-source database system that could allow unprivileged users to alter environment variables, and potentially lead to code execution or information disclosure. The vulnerability, tracked as CVE-2024-10979, carries a CVSS score of 8.8. Environment variables are user-defined values that can allow a program

Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin

Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday. Lichtenstein was charged for his involvement in a money laundering scheme that led to the theft of nearly 120,000 bitcoins (valued at over $10.5 billion at current prices) from the crypto exchange.

CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition software have come under active exploitation in the wild. To that end, it has added the vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates

Experts Uncover 70,000 Hijacked Domains in Widespread 'Sitting Ducks' Attack Scheme

Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks to hijack legitimate domains for using them in phishing attacks and investment fraud schemes for years. The findings come from Infoblox, which said it identified nearly 800,000 vulnerable registered domains over the past three months, of which approximately 9% (70,000) have been subsequently

Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes

Google has revealed that bad actors are leveraging techniques like landing page cloaking to conduct scams by impersonating legitimate sites. "Cloaking is specifically designed to prevent moderation systems and teams from reviewing policy-violating content which enables them to deploy the scam directly to users," Laurie Richardson, VP and Head of Trust and Safety at Google, said. "The landing

5 BCDR Oversights That Leave You Exposed to Ransomware

Ransomware isn’t just a buzzword; it’s one of the most dreaded challenges businesses face in this increasingly digitized world. Ransomware attacks are not only increasing in frequency but also in sophistication, with new ransomware groups constantly emerging. Their attack methods are evolving rapidly, becoming more dangerous and damaging than ever. Almost all respondents (99.8%) in a recent

TikTok Pixel Privacy Nightmare: A New Case Study

Advertising on TikTok is the obvious choice for any company trying to reach a young market, and especially so if it happens to be a travel company, with 44% of American Gen Zs saying they use the platform to plan their vacations. But one online travel marketplace targeting young holidaymakers with ads on the popular video-sharing platform broke GDPR rules when a third-party partner misconfigured

New RustyAttr Malware Targets macOS Through Extended Attribute Abuse

Threat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr. The Singaporean cybersecurity company has attributed the novel activity with moderate confidence to the infamous North Korea-linked Lazarus Group, citing infrastructure and tactical overlaps observed in connection with prior campaigns, including

Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails

A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day by a suspected Russia-linked actor as part of cyber attacks targeting Ukraine. The vulnerability in question, CVE-2024-43451 (CVSS score: 6.5), refers to an NTLM hash disclosure spoofing vulnerability that could be exploited to steal a user's NTLMv2 hash. It was patched by Microsoft earlier this

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel

A threat actor affiliated with Hamas has expanded its malicious cyber operations beyond espionage to carry out disruptive attacks that exclusively target Israeli entities. The activity, linked to a group called WIRTE, has also targeted the Palestinian Authority, Jordan, Iraq, Saudi Arabia, and Egypt, Check Point said in an analysis. "The [Israel-Hamas] conflict has not disrupted the WIRTE's

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

Romanian cybersecurity company Bitdefender has released a free decryptor to help victims recover data encrypted using the ShrinkLocker ransomware. The decryptor is the result of a comprehensive analysis of ShrinkLocker's inner workings, allowing the researchers to discover a "specific window of opportunity for data recovery immediately after the removal of protectors from BitLocker-encrypted

Comprehensive Guide to Building a Strong Browser Security Program

The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape. With more than 90% of organizational network traffic flowing through browsers and web applications, companies are facing new and serious cybersecurity threats. These include phishing attacks, data leakage, and malicious extensions. As a result, the browser also becomes a vulnerability that

OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution

A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that could be chained to allow potential attackers to execute code remotely on connected devices. "Attackers successfully exploiting these vulnerabilities can access, control, and disrupt devices supported by OvrC; some of those include smart electrical power supplies, cameras, routers, home automation systems, and

Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group's playbook to orchestrate its own version of the Dream Job campaign targeting the aerospace industry by offering fake jobs since at least September 2023. "The campaign distributed the SnailResin malware, which activates the SlugResin backdoor," Israeli cybersecurity company ClearSky said

Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024. Of the 90 flaws, four are rated Critical, 85 are rated Important, and one is rated Moderate in

New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration

Cybersecurity researchers have disclosed new security flaws impacting Citrix Virtual Apps and Desktop that could be exploited to achieve unauthenticated remote code execution (RCE) The issue, per findings from watchTowr, is rooted in the Session Recording component that allows system administrators to capture user activity, and record keyboard and mouse input, along with a video stream of the

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

Cybersecurity researchers are calling attention to a new sophisticated tool called GoIssue that can be used to send phishing messages at scale targeting GitHub users. The program, first marketed by a threat actor named cyberdluffy (aka Cyber D' Luffy) on the Runion forum earlier this August, is advertised as a tool that allows criminal actors to extract email addresses from public GitHub

North Korean Hackers Target macOS Using Flutter-Embedded Malware

Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been found embedding malware within Flutter applications, marking the first time this tactic has been adopted by the adversary to infect Apple macOS devices. Jamf Threat Labs, which made the discovery based on artifacts uploaded to the VirusTotal platform earlier this month, said the Flutter-built

5 Ways Behavioral Analytics is Revolutionizing Incident Response

Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more

New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness," Russian cybersecurity vendor Kaspersky said. "Threat actors leveraged an unconventional blend

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,

New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia

In an unusually specific campaign, users searching about the legality of Bengal Cats in Australia are being targeted with the GootLoader malware. "In this case, we found the GootLoader actors using search results for information about a particular cat and a particular geography being used to deliver the payload: 'Are Bengal Cats legal in Australia?,'" Sophos researchers Trang Tang, Hikaru Koike,

The ROI of Security Investments: How Cybersecurity Leaders Prove It

Cyber threats are intensifying, and cybersecurity has become critical to business operations. As security budgets grow, CEOs and boardrooms are demanding concrete evidence that cybersecurity initiatives deliver value beyond regulation compliance. Just like you wouldn’t buy a car without knowing it was first put through a crash test, security systems must also be validated to confirm their value.

Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects. These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week. The server-side weaknesses "allow attackers to hijack important servers in the

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

Hewlett Packard Enterprise (HPE) has released security updates to address multiple vulnerabilities impacting Aruba Networking Access Point products, including two critical bugs that could result in unauthenticated command execution. The flaws affect Access Points running Instant AOS-8 and AOS-10 - AOS-10.4.x.x: 10.4.1.4 and below Instant AOS-8.12.x.x: 8.12.0.2 and below Instant AOS-8.10.x.x:

Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week. "However, threat actors have

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)

Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

Let’s face it—traditional security training can feel as thrilling as reading the fine print on a software update. It’s routine, predictable, and, let’s be honest, often forgotten the moment it's over. Now, imagine cybersecurity training that’s as unforgettable as your favorite show. Remember how "Hamilton" made history come alive, or how "The Office" taught us CPR (Staying Alive beat, anyone?)?

AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various internet-facing applications, while also deploying the Mozi botnet malware. "This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures," CloudSEK said in a

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

High-profile entities in India have become the target of malicious campaigns orchestrated by the Pakistan-based Transparent Tribe threat actor and a previously unknown China-nexus cyber espionage group dubbed IcePeony. The intrusions linked to Transparent Tribe involve the use of a malware called ElizaRAT and a new stealer payload dubbed ApoloStealer on specific victims of interest, Check Point

The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses

We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable. Globally small and medium-sized businesses (SMBs) are increasingly targeted by cyberattacks but often lack the resources for full-time Chief Information Security Officers (CISOs). This gap is driving the rise of the virtual CISO (vCISO) model, offering a cost-effective

Malicious NPM Packages Target Roblox Users with Data-Stealing Malware

A new campaign has targeted the npm package repository with malicious JavaScript libraries that are designed to infect Roblox users with open-source stealer malware such as Skuld and Blank-Grabber. "This incident highlights the alarming ease with which threat actors can launch supply chain attacks by exploiting trust and human error within the open source ecosystem, and using readily available

New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor capable of establishing remote access to the compromised hosts. The "intriguing" campaign, codenamed CRON#TRAP, starts with a malicious Windows shortcut (LNK) file likely distributed in the form of a ZIP archive via a phishing email. "What makes the CRON#

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that

North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as

A Hacker's Guide to Password Cracking

Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense, you must think like a hacker and anticipate their moves. Read on to learn more about hackers'

5 Most Common Malware Techniques in 2024

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN's Q3 2024 report on malware trends, complete with real-world examples. Disabling of Windows Event Logging

❌