202 posts were published in the last hour
- 20:31 : Meta unleashes Llama API running 18x faster than OpenAI: Cerebras partnership delivers 2,600 tokens per second
- 20:31 : BSidesLV24 – Ground Truth – Reassessing 50k Vulnerabilities: Insights From SSVC Evaluations In Japan’s Largest Telco
- 20:5 : IT Security News Hourly Summary 2025-04-29 21h : 4 posts
- 20:2 : RSAC Conference 2025
- 20:2 : SentinelOne warns of threat actors targeting its systems and high-value clients
- 19:2 : Watch out for any Linux malware sneakily evading syscall-watching antivirus
- 18:33 : Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
- 18:33 : Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories
- 18:32 : 44% of the zero-days exploited in 2024 were in enterprise solutions
- 18:3 : Scattered Spider Suspected in Major M&S Cyberattack
- 18:2 : CISA Adds One Known Exploited Vulnerability to Catalog
- 18:2 : Proofpoint Leverages AI to Extend Scope of Cybersecurity Reach
- 18:2 : Don’t Delete Spam Emails Too Quickly — Here’s Why
- 18:2 : New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
- 18:2 : WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy
- 17:32 : 20.5 Million DDoS Barrage Shattered Records Leading Attack Fired Off 4.8 Billion Packets
- 17:32 : New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials
- 17:32 : Google Reports 75 Zero-Day Vulnerabilities Actively Exploited in the Wild
- 17:32 : Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware
- 17:32 : Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks
- 17:32 : WhatsApp Is Walking a Tightrope Between AI Features and Privacy
- 17:32 : Enterprise tech dominates zero-day exploits with no signs of slowdown
- 17:31 : Are Puppies the New Booth Babes: What Do You Think?
- 17:5 : IT Security News Hourly Summary 2025-04-29 18h : 11 posts
- 17:2 : GPUAF: Two Methods to Root Qualcomm-Based Android Phones
- 17:2 : Verizon 2025 Report Highlights Surge in Cyberattacks Through Third Parties
- 17:2 : Delta Electronics ISPSoft
- 17:2 : Rockwell Automation ThinManager
- 17:2 : CISA Releases Three Industrial Control Systems Advisories
- 16:32 : Wordfence: The World’s Leading Quality WordPress Vulnerability Intelligence Provider
- 16:32 : Google Wallet brings digital IDs to more states – how to add yours
- 16:32 : NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments
- 16:32 : How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples
- 16:32 : How do You Know if You’re Ready for a Red Team Partnership?
- 16:32 : Introducing Mend’s Integration with Microsoft Defender for Cloud
- 16:2 : Insider Threat alert as Cybersecurity firm CEO plants malware into hospital network
- 16:2 : SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI
- 16:2 : SentinelOne’s Purple AI Athena Brings Autonomous Decision-Making to the SOC
- 16:2 : Microsoft announces the 2025 Security Excellence Awards winners
- 16:2 : New WordPress Malware Masquerades as Plugin
- 15:32 : More Scans for SMS Gateways and APIs, (Tue, Apr 29th)
- 15:32 : The Transformative Power of Artificial Intelligence in Cloud Security
- 15:32 : Indian court orders blocking of Proton Mail
- 15:32 : China now America’s number one cyber threat – US must get up to speed
- 15:32 : Scientists Warn of Cybersecurity Threats in Next-Gen DNA Sequencing
- 15:31 : Google Ends Privacy Sandbox, Keeps Third-Party Cookies in Chrome
- 15:3 : Akamai Firewall for AI: Get Powerful Protection for New LLM App Threats
- 15:3 : 6 Best CMMC Consulting Services for Small Businesses
- 15:2 : AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi
- 15:2 : CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog
- 15:2 : Digital rampage saw ex-Disney employee remove nut allergy info from menus, dox co-workers, and more
- 15:2 : China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America
- 15:2 : HPE Extends Scope of Cybersecurity Reach Across Multiple Platforms
- 15:2 : SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients
- 15:2 : Phorpiex Botnet Delivers LockBit Ransomware with Automated Tactics
- 14:5 : IT Security News Hourly Summary 2025-04-29 15h : 12 posts
- 14:3 : Elevating MSSP Managed Security Services with Managed Detection and Response (MDR)
- 14:3 : The 5 Best VPNs for Amazon Fire Stick in 2025
- 14:2 : OpenBSD 7.7 Released with Significant Performance & Security Enhancements
- 14:2 : Google Warns of 75 Zero-Day Vulnerabilities Exploited in the Wild
- 14:2 : Europol Creates Operational Taskforce to Tackle Violence-as-a-Service
- 14:2 : Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox – Technical Details Disclosed
- 14:2 : Fraudulent email domain tracker: April 2025
- 14:2 : Bitwarden Access Intelligence defends against credential risks and phishing
- 14:2 : New Gremlin Infostealer Distributed on Telegram
- 13:32 : Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight
- 13:32 : What is an automation architect?
- 13:32 : Infosec pros tell Trump to quit bullying Chris Krebs – it’s undermining security
- 13:32 : Investigating the Role of DarkStorm Team in the Recent X Outage
- 13:31 : ExtraHop strenghtens network detection and response
- 13:3 : Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds
- 13:3 : Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed
- 13:3 : Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi
- 13:3 : Google Threat Intelligence Group (GTIG) tracked 75 actively exploited zero-day flaws in 2024
- 13:3 : Hackers Actively Attacking Git Configuration Files From 4,800+ IP’s
- 13:3 : 20.5 Million DDoS Attacks, With One Exceeding 4.8 Billion Packets
- 13:3 : Tsunami Malware Actively Attacking Users Incorporates With Miners & Credential Stealers
- 13:3 : JokerOTP Platform With 28,000+ Phishing Attacks Dismantled
- 13:2 : Windows Server 2025 Hotpatching Service to be Rolled Out From July 1st, 2025
- 13:2 : Pistachio Raises $7 Million for Cybersecurity Training Platform
- 13:2 : CISA warns about actively exploited Broadcom, Commvault vulnerabilities
- 12:31 : LayerX Raises $11 Million for Browser Security Solution
- 12:2 : China is using AI to sharpen every link in its attack chain, FBI warns
- 12:2 : Cybersecurity Firms Raise Over $1.7 Billion Ahead of RSA Conference 2025
- 12:2 : Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
- 12:2 : Product Walkthrough: Securing Microsoft Copilot with Reco
- 11:32 : Europol Launches Taskforce to Combat Violence-as-a-Service Networks
- 11:32 : ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks
- 11:32 : Applying Security Engineering to Prompt Injection Security
- 11:32 : What privacy? Perplexity wants your data, builds browser to track you and serve ads
- 11:31 : Google Tracked 75 Zero-Days in 2024
- 11:31 : Marks & Spencer cyber incident linked to ransomware group
- 11:31 : Infostealers Harvest Over 30,000 Australian Banking Credentials
- 11:5 : IT Security News Hourly Summary 2025-04-29 12h : 6 posts
- 11:2 : How safe and secure is your iPhone really?
- 11:2 : VeriSource data breach impacted 4M individuals
- 11:2 : NIS2 Compliance | Challenges, Pain Points and Solutions
- 11:2 : When Satellites Go Dark – Persistent Cyber Assaults and The Growing Blind Spot
- 11:2 : RSA Conference 2025 – Announcements Summary (Day 1)
- 11:2 : Phishing 3.0: Trust, Deepfakes, and Why Your Inbox Might Betray You
- 11:2 : Dummy Title
- 10:32 : Gremlin Stealer: New Stealer on Sale in Underground Forum
- 10:32 : Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
- 10:32 : Outlaw cybergang attacking targets worldwide
- 10:32 : Exploited Vulnerability Exposes Over 400 SAP NetWeaver Servers to Attacks
- 10:2 : Year in Review: AI based threats
- 10:2 : Government hackers are leading the use of attributed zero-days, Google says
- 10:2 : Zero-Day Exploitation Figure Surges 19% in Two Years
- 9:32 : Private Equity Firms ‘Circle’ NCC Group’s Escode
- 9:31 : Amazon Sellers ‘Pull Back’ From Prime Day Over Tariffs
- 9:31 : The one interview question that will protect you from North Korean fake workers
- 9:3 : JokerOTP Platform Linked to 28,000+ Phishing Attacks Dismantled
- 9:2 : Critical Linux Kernel Vulnerability Exposes Systems to Privilege Escalation Attacks
- 9:2 : ResolverRAT Attacking Healthcare and Pharmaceutical Via Sophisticated Phishing Attacks
- 9:2 : CISA Warns of Exploited Broadcom, Commvault Vulnerabilities
- 9:2 : Huntress upgrades Managed ITDR to disrupt hacker tradecraft
- 9:2 : Varonis AI Shield helps employees use AI without putting data at risk
- 9:2 : Aqua Security unveils Secure AI for protecting workloads from code to cloud
- 9:2 : Europol Creates “Violence-as-a-Service” Taskforce
- 8:32 : Huawei ‘To Begin Testing’ Next-Gen AI Chip Ascend 910D
- 8:32 : Pegatron ‘Continuing’ Manufacturing Plans Despite Tariffs
- 8:31 : Windows Server 2025 Gets Hotpatching Support Beginning July 1, 2025
- 8:31 : Bugcrowd enables organizations to test their security environments
- 8:7 : The Growing Threat of Ransomware to the Manufacturing Sector
- 8:7 : Ransomware Attacks on Critical Infrastructure Surge, Reports FBI
- 8:6 : U.S. CISA adds Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities catalog
- 8:6 : Researchers Uncovered SuperShell Payloads & Multiple Tools From Hacker’s Open Directories
- 8:6 : Netwrix boosts identity and data security for Microsoft environments
- 8:6 : Arctic Wolf launches Cipher to enhance security investigations with AI insights
- 8:5 : IT Security News Hourly Summary 2025-04-29 09h : 9 posts
- 7:32 : DeepMind UK Staff ‘Seek Unionisation’ To Challenge Military Deals
- 7:32 : Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation
- 7:32 : Lumu SecOps Platform allows teams to unify their entire security stack
- 7:32 : Oasis NHI Provisioning automates the provisioning of NHIs and their credentials
- 7:32 : Uyghur software malware, DDoS jumps, 4chan back
- 7:2 : Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition
- 7:2 : Swiss boffins admit to secretly posting AI-penned posts to Reddit in the name of science
- 7:2 : Desired Effect Marketplace: Researchers Get Their Due, Defenders Get Realtime Info on Zero Days
- 7:2 : Eyes, ears, and now arms: IoT is alive
- 6:33 : Behavioural economics of enterprise password management
- 6:33 : Futureproofing Enterprise Cloud Security: Navigating Cloud Key Management Complexity
- 6:33 : What’s worth automating in cyber hygiene, and what’s not
- 6:33 : Sumo Logic unveils innovations across AI, automation, and threat intelligence
- 6:32 : Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
- 6:2 : Akira Ransomware attack on Hitachi Vantara Servers
- 6:2 : What is Slopsquatting and is it a New Emerging Cyber Threat?
- 6:2 : Massive Attack: 4,800+ IPs Used to Target Git Configuration Files
- 6:2 : Why B2B Leaders Must Rethink Cybersecurity Strategies With AI at the Core
- 5:32 : CISA Issues Warning on Commvault Web Server Flaw Exploited in the Wild
- 5:32 : CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List
- 5:32 : DDoS attacks jump 358% compared to last year
- 5:32 : Want faster products and stronger trust? Build security in, not bolt it on
- 5:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 5:31 : CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
- 5:5 : IT Security News Hourly Summary 2025-04-29 06h : 4 posts
- 5:2 : Compliance Challenges in Cloud Data Governance
- 5:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 4:32 : Cybersecurity jobs available right now: April 29, 2025
- 4:31 : Hopper Security emerges from stealth to fix open-source security problems
- 4:31 : Investing in security? It’s not helping you fix what matters faster
- 4:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 4:2 : RSA Conference Dispatch: Mr. NHI – Leading the Movement to Expose Cybersecurity’s Biggest Blind Spot!
- 4:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 3:31 : Open source text editor poisoned with malware to target Uyghur users
- 3:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 3:2 : MIWIC25: Caroline Kamper, Strategic Cyber Threat Intelligence Analyst, SecAlliance
- 3:2 : CIOs Say Security Systems Not Delivering Value For Money, Too Complex To Manage
- 3:2 : Organisations Unprepared For Age of Quantum Computing
- 3:2 : Huntress Unveils Enhanced Identity Threat Detection & Response Solution as New Research Warns of Rising Identity-Based Attacks
- 3:2 : Kali Linux Warns that Update Process is Going to Fail for All Users
- 3:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 2:32 : IBM’s $150 Billion US Investment to Boost Quantum Innovation and National Security
- 2:31 : Announcing New Legit ASPM AI Capabilities
- 2:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 2:5 : IT Security News Hourly Summary 2025-04-29 03h : 5 posts
- 2:2 : ISC Stormcast For Tuesday, April 29th, 2025 https://isc.sans.edu/podcastdetail/9428, (Tue, Apr 29th)
- 2:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 1:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 1:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 0:32 : Congress Passes TAKE IT DOWN Act Despite Major Flaws
- 0:31 : Ex-Disney employee gets 3 years in the clink for goofy attacks on mousey menus
- 0:31 : News alert: Case dismissed against VPN executive, affirms no-logs policy as a valid legal defense
- 0:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 0:2 : How Postal Code Data Impacts Cybersecurity, Privacy and Fraud Prevention
- 0:2 : Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn
- 0:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 23:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 23:5 : IT Security News Hourly Summary 2025-04-29 00h : 9 posts
- 23:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 22:55 : IT Security News Daily Summary 2025-04-28
- 22:32 : Cookie-Bite Attack Demoes Extension Exploit To Steal Browser Cookies
- 22:31 : SuperCard X Malware Attacks Android With NFC Relay Attacks
- 22:31 : Glassdoor: 13 Tech Companies With the Best Internships in 2025
- 22:31 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
- 22:2 : Why I Started Using Dependency Injection in Python
- 22:2 : How to survive as a CISO aka ‘chief scapegoat officer’
- 22:2 : The Turmoil Following BreachForums Shutdown: Confusion, Risks, and a New Beginning
- 22:2 : Admission impossible: NSA, CISA brass absent from RSA Conf
- 22:2 : Certain Your Data Is Safe in the Cloud?
- 22:2 : Harnessing Powerful Tools for Secrets Scanning
- 22:2 : Your NHIDR Is Getting Better—How?
- 22:2 : ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More