167 posts were published in the last hour
- 22:34 : Hackers are hijacking WordPress sites to push Windows and Mac malware
- 22:20 : Russian UAC-0063 Targets Europe and Central Asia with Advanced Malware
- 22:20 : Exposed DeepSeek Database Revealed Chat Prompts and Internal Data
- 21:20 : FBI Seizes Leading Hacking Forums Cracked.io and Nulled.to
- 21:20 : Aquabot variant v3 targets Mitel SIP phones
- 21:20 : U.S. CISA adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog
- 21:20 : Microsoft 365 Down – Widespread Outage Affects Users and Admins
- 20:34 : The OWASP NHI Top 10 and AI risk: What you need to know
- 20:34 : Introducing WAF Rule Tester: Test with Confidence, Deploy without Fear | Impart Security
- 20:20 : Why You Don’t Need That New JavaScript Library
- 20:20 : DeepSeek Chatbot Beats OpenAI on App Store Leaderboard
- 20:20 : How we kept the Google Play & Android app ecosystems safe in 2024
- 20:5 : IT Security News Hourly Summary 2025-01-29 21h : 4 posts
- 19:34 : FBI Seizes Leading Hacking Forums Cracked.to and Nulled.to
- 19:34 : OpenAI tailored ChatGPT Gov for government use – here’s what that means
- 19:34 : Streamline the connectivity between your environment and Red Hat Insights services
- 19:11 : Observo’s AI-native data pipelines cut noisy telemetry by 70%, strengthening enterprise security
- 18:32 : CISA Adds One Known Exploited Vulnerability to Catalog
- 18:32 : These are the 10 worst PIN codes
- 18:13 : What DeepSeek’s R1 Model Means For AI Innovation and Enterprise Security
- 18:13 : SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws
- 18:13 : Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
- 17:12 : Whatsup Gold, Observium and Offis vulnerabilities
- 17:12 : Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered
- 17:11 : Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors
- 17:11 : Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD
- 17:11 : New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser
- 17:11 : MGM Resorts settles lawsuits after millions of customer records stolen in data breaches
- 17:11 : Hackers Allegedly Selling Fortinet Vulnerability Exploit on Dark Web Forums
- 17:11 : Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers
- 17:11 : State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks
- 17:11 : Windows 11 24H2 Update Breaks Web camera, Audio, & USB
- 17:11 : Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior
- 17:11 : Cybercriminals Use Google Ads and URL Cloaking to Spread Malware
- 17:5 : IT Security News Hourly Summary 2025-01-29 18h : 8 posts
- 16:34 : New Zyxel Zero-Day Under Attack, No Patch Available
- 16:34 : Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
- 16:34 : AI Surge Drives Record 1205% Increase in API Vulnerabilities
- 16:15 : Mishing Cyber Attack from malicious PDF
- 16:15 : Why is my Mitel phone DDoSing strangers? Oh, it was roped into a new Mirai botnet
- 16:15 : Ongoing report: Babuk2 (Babuk-Bjorka)
- 16:15 : Flare Academy is Here!
- 16:15 : Nation-State Hackers Abuse Gemini AI Tool
- 15:32 : Oligo Raises $50M to Tackle Application Detection and Response
- 15:24 : Clutch grabs $20M to build out its non-human security ID platform
- 15:24 : Critical remote code execution bug found in Cacti framework
- 15:24 : WhatsApp’s Image “View Once” Feature Flaw Allowing Unlimited Views
- 15:24 : Google Researchers Breakdowns The Malware Obfuscator Scatterbrain
- 15:24 : The GenAI Scam Revolution
- 15:24 : Swimlane Vulnerability Response Management offers risk-based prioritization
- 15:24 : New Hellcat Ransomware Gang Employs Humiliation Tactics
- 14:9 : WhatsApp’s “View Once” Feature Flaw Let Anyone View the Image Unlimitedly
- 14:9 : Top 8 Penetration Testing Tools to Enhance Your Security
- 14:9 : IoMT Security Is Critical as Patients Take Control of Own Healthcare
- 14:9 : Hackers Using SparkRAT In Wild To Attack Windows, macOS, and Linux Systems
- 14:9 : Hellcat Ransomware Attacking Organization In Raas Model With Affiliates
- 14:9 : Malware Infections Surge from Fake VPN Downloads
- 14:8 : Threat Actors Exploit Government Websites for Phishing
- 14:5 : IT Security News Hourly Summary 2025-01-29 15h : 13 posts
- 13:34 : Panda Free Antivirus: The Free, Complete Solution to Protect Your Devices
- 13:34 : Engineering giant Smiths Group says hackers accessed its systems during cyberattack
- 13:34 : DeepSeek’s popularity exploited by malware peddlers, scammers
- 13:34 : Organizations with dark web presence face significantly higher breach likelihood
- 13:16 : A Security Loophole in WhatsApp’s “View Once” Mode
- 13:16 : The Journey to Autonomous Cyber Security
- 13:15 : Transform your approach to data security
- 13:15 : FleshStealer, A New Infostealer Attacking Chrome & Mozilla Users
- 13:15 : PoC Exploit Released for Actively Exploited Windows CLFS Buffer Overflow
- 13:15 : Navigating Advanced Threat Landscapes
- 13:15 : ‘Bro delete the chat’: Feel the panic shortly before cops bust major online fraud ring
- 13:15 : New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones
- 13:15 : Using AI To Help Keep Your Financial Data Safe
- 12:34 : The Trial at the Tip of the Terrorgram Iceberg
- 12:34 : ExxonMobil Lobbyist Caught Hacking Climate Activists
- 12:34 : Looking Back to Look Forward: 2024’s Top Email Threats
- 12:34 : Aquabot Botnet Targeting Vulnerable Mitel Phones
- 12:20 : Smiths Group Scrambling to Restore Systems Following Cyberattack
- 12:20 : DeepSeek’s Deep Risks: What You Need to Know | Grip Security
- 12:20 : New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits
- 12:20 : AI in Cybersecurity: What’s Effective and What’s Not – Insights from 200 Experts
- 12:20 : Breakout Time Accelerates 22% as Cyber-Attacks Speed Up
- 12:19 : Chinese GenAI Startup DeepSeek Sparks Global Privacy Debate
- 11:36 : Windows CLFS Buffer Overflow Vulnerability CVE-2024-49138 – PoC Released
- 11:36 : Hackers Attacking Windows, macOS, and Linux systems With SparkRAT
- 11:36 : New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability
- 11:36 : API Vulnerabilities Surge 1,025%, Threatening AI Security (PDF)
- 11:36 : New Aquabot Malware Attacking Mitel SIP To Inject Commands
- 11:36 : Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products
- 11:18 : Taking a Threat Adapted Approach to Vulnerability Management
- 11:18 : Point72 Founder Says DeepSeek Is ‘Super Bullish’ For AI Industry
- 11:18 : OpenAI’s Altman Promises ‘Much Better’ Models After DeepSeek Reveal
- 11:18 : Hellcat Ransomware Attacking Government Organizations & Educational Institutions
- 11:18 : Attackers actively exploit a critical zero-day in Zyxel CPE Series devices
- 11:17 : SimpleHelp Remote Access Software Exploited in Attacks
- 11:17 : Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution
- 11:17 : How Interlock Ransomware Infects Healthcare Organizations
- 11:5 : IT Security News Hourly Summary 2025-01-29 12h : 17 posts
- 10:41 : Researchers Jailbreaked DeepSeek R1 to Generate Malicious Scripts
- 10:41 : Threat predictions for industrial enterprises 2025
- 10:41 : How we estimate the risk from prompt injection attacks on AI systems
- 10:40 : Lynx Ransomware Infrastructure To Attack Windows, Linux, ESXi & Affiliate Panel Uncovered
- 10:40 : authID PrivacyKey protects users’ biometric identities
- 10:20 : Adversarial Misuse of Generative AI
- 10:20 : Cybersecurity in Banking: Strengthening Security Amid Rising AI Threats
- 10:20 : US Probes DeepSeek National Security Implications
- 10:20 : CIS Control 04: Secure Configuration of Enterprise Assets and Software
- 10:20 : DeepSeek R1 Jailbroken to Generate Ransomware Development Scripts
- 10:20 : Critical Cacti Vulnerability Let Attackers Code Remotely – PoC Released
- 10:20 : API Supply Chain Attack Exposes Millions of Airline Users Accounts to Hackers
- 10:20 : PoC Exploit Released for TP-Link Router Web Interface XSS Vulnerability
- 10:20 : Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands
- 10:20 : Frenos Raises $3.88M in Seed Funding for OT Security Assessment Platform
- 10:20 : AuthID PrivacyKey protects users’ biometric identities
- 10:19 : Scores of Critical UK Government IT Systems Have Major Security Holes
- 9:39 : DeepSeek Goes Quiet For Lunar New Year After AI Shock
- 9:39 : X Works With Visa To Offer Real-Time Payments
- 9:39 : Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware
- 9:39 : Zyxel CPE Zero-Day (CVE-2024-40891) Exploited in the Wild
- 9:38 : Cyberhaven for AI provides visibility into AI tool usage
- 9:38 : How Lazarus Group built a cyber espionage empire
- 9:38 : Absolute Resilience Platform updates improve resilience across endpoints
- 9:38 : Bitwarden centralizes cryptographic key management
- 9:9 : From PowerShell to a Python Obfuscation Race!, (Wed, Jan 29th)
- 9:9 : FleshStealer: A new Infostealer Attacking Chrome & Mozilla Users
- 9:9 : Cyberhaven for AI secures enterprise AI usage
- 9:9 : DeepSeek – New AI Disruptor Gets Hit With Cyber Attack: Cyber Security Today for Wednesday, January 29, 2025
- 8:31 : Tech Tycoons Lose $94bn In DeepSeek AI Sell-Off
- 8:31 : Ransomware shutdowns, GRU sanctions, Lynx ransomware details
- 8:8 : Windows 11 24H2 Update Bug: Users Report Disruptions in Web Camera and USB Devices
- 8:5 : IT Security News Hourly Summary 2025-01-29 09h : 3 posts
- 7:36 : Fake DeepSeek Campaign Attacking macOS Users to Deliver Poseidon Malware
- 7:36 : Spending watchdog blasts UK govt over sloth-like cyber resilience progress
- 7:19 : Attackers exploit SimpleHelp RMM Software flaws for initial access
- 6:34 : Data Engineers Should Be Aware of These Cloud Security Challenges
- 6:34 : Azure Key Vault Vulnerabilities Could Leak Sensitive Data After Entra ID Breach
- 6:34 : How Compliance Automation Enhances Data Security
- 6:24 : Whitehall vulnerable to Cyber Attacks and malware threats
- 6:24 : Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts
- 6:24 : TP-Link Router Web Interface XSS Vulnerability – PoC Exploit Released
- 6:24 : Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability
- 6:24 : Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer
- 6:24 : UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents
- 5:31 : Building Resilience Against Zero-Day Threats in Third-Party Risk Management
- 5:31 : Preparing financial institutions for the next generation of cyber threats
- 5:18 : PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely
- 5:18 : Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities
- 5:18 : 2025-01-28: Malwre infection from web inject activity
- 5:18 : API Supply Chain Attacks Surge, Exposing Critical Security Gaps
- 5:18 : Cyberattack Crashes the Party Amid DeepSeek’s Meteoric Rise
- 5:18 : Cloudflare’s Data Pipeline Powered to Handle 700 Million Events Per Second
- 5:17 : SEC and FCA fines: Issues jump
- 5:17 : Cybersecurity crisis in numbers
- 5:5 : IT Security News Hourly Summary 2025-01-29 06h : 2 posts
- 4:36 : Only 13% of organizations fully recover data after a ransomware attack
- 4:8 : PowerSchool Starts Notifying Students Following Massive Breach
- 3:13 : The curious story of Uncle Sam’s HR dept, a hastily set up email server, and fears of another cyber disaster
- 2:36 : VMware Avi Load Balancer Vulnerability Let Attackers Gain Database Access
- 2:17 : ISC Stormcast For Wednesday, January 29th, 2025 https://isc.sans.edu/podcastdetail/9300, (Wed, Jan 29th)
- 2:17 : What is the role of data synthesis in my CI/CD pipeline, anyway?
- 2:17 : Reverse engineering your test data: It’s not as safe as you think it is
- 2:5 : IT Security News Hourly Summary 2025-01-29 03h : 1 posts
- 1:9 : SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac, iPad Silicon
- 0:32 : SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac Silicon
- 0:32 : DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare
- 0:15 : VMware fixed a flaw in Avi Load Balancer
- 0:15 : EFF to State AGs: Time to Investigate Crisis Pregnancy Centers
- 23:5 : IT Security News Hourly Summary 2025-01-29 00h : 6 posts