170 posts were published in the last hour
- 22:32 : All your 8Base are belong to us: Ransomware crew busted in global sting
- 22:16 : France, EU Promise Simplified Regulation For AI Growth
- 22:15 : HPE is notifying individuals affected by a December 2023 attack
- 22:15 : Apple 0-Day Vulnerability Exploited in “Extremely Sophisticated” Attacks in the Wild
- 21:7 : Who’s using AI the most? The Anthropic Economic Index breaks down the data
- 21:7 : Announcing ASCP integration with Pod Identity: Enhanced security for secrets management in Amazon EKS
- 20:32 : 6 Best Identity & Access Management (IAM) Software Solutions in 2025
- 20:32 : Gmail Under Siege: FBI Warns of Unusual AI-Driven Phishing Attacks
- 20:32 : DEF CON 32 – Eradicating Hepatitis C with BioTerrorism
- 20:7 : Apple fixes iPhone and iPad bug used in an ‘extremely sophisticated attack’
- 20:7 : Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack
- 20:5 : IT Security News Hourly Summary 2025-02-10 21h : 5 posts
- 19:33 : Why Modern Businesses Need Supply Chain Security Software to Mitigate Risks
- 19:33 : 4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites
- 19:33 : Apple fixes iPhone and iPad bug used in an “extremely sophisticated attack”
- 19:33 : Most Inspiring Women in Cyber Awards 2025: Q&A with Lorilee Ressler, Senior Cybersecurity Solutions Architect at Certes
- 19:33 : Why the so-called AI Action Summit falls short
- 19:2 : Securing Kubernetes in Production With Wiz
- 19:2 : Trimble Cityworks zero-day flaw under attack, patch now
- 19:2 : Build a stronger security strategy with proactive and reactive incident response: Cyberattack Series
- 18:32 : 8Base Ransomware Dark Web Site Seized, Four Operators Arrested
- 18:32 : Why the so-called AI Action summit falls short
- 18:32 : Phishing Season 2025: The Latest Predictions Unveiled
- 18:32 : Chinese DeepSeek AI App: FULL of Security Holes Say Researchers
- 18:32 : DeepSeek-R1 AI Under Fire for Severe Security Risks
- 18:5 : New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2
- 18:5 : SHA256 Hash Calculation from Data Chunks
- 18:4 : Australians Hit With One Cyber Attack Every Second in 2024
- 18:4 : US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking
- 17:32 : Macron Shares Deepfakes As AI Summit Begins
- 17:32 : Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution
- 17:32 : Serious about online privacy? This ‘live’ Linux OS is for you
- 17:32 : What Is Malware? Definition, Examples, and More
- 17:32 : 12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit
- 17:32 : Leveraging Microsoft Text Services Framework (TSF) for Red Team Operations
- 17:32 : Attackers Use 2.8 Million Devices in Major Brute Force Attack
- 17:32 : BadIIS Malware Exploits IIS Servers for SEO Fraud
- 17:13 : Security Controls in the Android Operating System (OS)
- 17:13 : A suicide reveals the lonely side of AI chatbots, with Courtney Brown (Lock and Code S06E03)
- 17:5 : IT Security News Hourly Summary 2025-02-10 18h : 12 posts
- 16:32 : Handala Hackers Claim Massive Data Breach on Israeli Police, Leak 350,000 Files
- 16:32 : Protect those you love from internet scams this Valentine’s Day
- 16:32 : Global police operation seizes 8base ransomware gang leak site
- 16:32 : Cloud-native certificate lifecycle management: exploring the benefits & capabilities
- 16:32 : Vulnerability Summary for the Week of February 3, 2025
- 16:32 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 16:32 : Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
- 16:32 : US: Man Gets 20 Years for $37m Crypto Heist
- 16:32 : Georgia Hospital Alerts 120,000 Individuals of Data Breach
- 16:7 : Kraken Ransomware strikes Cisco servers to steal data
- 16:7 : 7 Best Vulnerability Scanning Tools & Software for 2025
- 16:7 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 15:32 : UK’s secret Apple iCloud backdoor order is a global emergency, say critics
- 15:32 : Microsoft SharePoint Connector Vulnerability Let Attackers Steal User’s Credentials
- 15:32 : NetSupport RAT Grant Attackers Full Access To Victims Systems
- 15:32 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 15:7 : Is Platform Engineering a Step Towards Better Governed DevOps?
- 15:7 : Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in Paris
- 15:7 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 14:32 : Ransomware Payments Plunge 35% as More Victims Refuse to Pay
- 14:32 : XE Group shifts from credit card skimming to exploiting zero-days
- 14:32 : Quishing via QR Codes Emerging As a Top Attack Vector Used by Hackers
- 14:32 : LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release
- 14:32 : 1M+ Malware Samples Analysis Reveal Application Layer Abused for Stealthy C2
- 14:32 : GitHub Copilot’s New Agent Mode Let Developers Autonomously Complete Coding Tasks
- 14:32 : 19 US States Sue to Prevent DOGE From Accessing Americans’ Private Data
- 14:32 : North Yorkshire Hospital Adopts AI for Faster Lung Cancer Detection
- 14:32 : Malicious ML models found on Hugging Face Hub
- 14:32 : Veridas helps companies combat AI-driven injection attacks
- 14:31 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 14:5 : IT Security News Hourly Summary 2025-02-10 15h : 11 posts
- 13:32 : Small praise for modern compilers – A case of Ubuntu printing vulnerability that wasn’t
- 13:32 : How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry
- 13:32 : Quishing via QR Codes Emerging as a Top Attack Vector Used by Hackers
- 13:32 : NetSupport RAT Grant Attackers Full Access to Victims Systems
- 13:32 : How Electric AI Strengthened Its Cloud Security with AI-Powered Solutions
- 13:32 : US news org still struggling to print papers a week after ‘cybersecurity event’
- 13:32 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 13:7 : 5 Best NIS2 Compliance Software and Solution Providers
- 13:6 : Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure
- 13:6 : Orthanc Server Vulnerability Poses Risk to Medical Data, Healthcare Operations
- 13:6 : ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- 12:32 : LLM Hijackers Exploit DeepSeek-V3 Model Just One Day After Launch
- 12:32 : Media giant Lee Enterprises confirms cyberattack as news outlets report ongoing disruption
- 12:32 : Pairwise Authentication of Humans
- 12:32 : Cisco Hacked – Ransomware Group Allegedly Breach Internal Network & Gained AD Access
- 12:32 : Seven Years Old Linux Kernel Vulnerability Let Attackers Execute Remote Code
- 12:32 : Penetration Testers Arrested by Police During Authorized Physical Penetration Testing
- 12:32 : Ransomware Payments Dropped By 35%, As Victims Refusing To Pay
- 12:32 : Could you Spot a Digital Twin at Work? Get Ready for Hyper-Personalized Attacks
- 12:7 : HPE Says Personal Information Stolen in 2023 Russian Hack
- 12:6 : Don’t Overlook These 6 Critical Okta Security Configurations
- 11:32 : OpenAI Takes First Steps For ‘Stargate’ Data Centres
- 11:32 : France Opens Probe Into X Over Algorithmic Bias
- 11:32 : Scammers Use Fake Facebook Copyright Notices to Hijack Accounts
- 11:32 : GitHub Copilot’s New Agent Mode Enables Autonomous Code Completion
- 11:32 : How to Remove Your Saved Passwords in Chrome
- 11:32 : Information of 120,000 Stolen in Ransomware Attack on Georgia Hospital
- 11:32 : API Gateway Security Needs a Stronger Zero-Trust Strategy
- 11:32 : UK Military Fast-Tracks Cybersecurity Recruitment
- 11:31 : Popular AI App DeepSeek Sends Unencrypted Data to ByteDance Servers
- 11:9 : Marvel Game Vulnerability Exposes PCs & PS5s to Remote Takeover Attacks
- 11:9 : The Rise of the Drone Boats
- 11:9 : Malware from fake recruiters
- 11:9 : World’s Longest and Strongest WiFi Passwords From 31m Passwords List
- 11:9 : New ‘BYOTB’ Attack Exploits Trusted Binaries to Evade Detection, Researchers Reveal
- 11:9 : GhidrAssist Brings AI Features to Ghidra in Reverse Engineering
- 11:9 : Can AI Early Warning Systems Reboot the Threat Intel Industry?
- 11:9 : DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects
- 11:5 : IT Security News Hourly Summary 2025-02-10 12h : 14 posts
- 10:32 : US China Restrictions Creating ‘Incentive To Innovate’
- 10:32 : US Proposes DeepSeek Ban For Federal Devices
- 10:32 : Penetration Testers Arrested During Approved Physical Penetration Testing
- 10:32 : Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN & Firewall Logins
- 10:32 : Key Takeaways from the NCSC Annual Review 2024
- 10:32 : “Quishing” – The Emerging Threat of Fake QR Codes
- 10:32 : UK Gov demands backdoor to access Apple iCloud backups worldwide
- 10:32 : SAML Bypass Authentication on GitHub Enterprise Servers To Login as Other User Account
- 10:32 : UK armed forces fast-tracking cyber warriors to defend digital front lines
- 10:31 : Experts Dismayed at UK’s Apple Decryption Demands
- 10:16 : Industry Moves for the week of February 10, 2025 – SecurityWeek
- 10:16 : SolarWinds Taken Private in $4.4 Billion Turn/River Capital Acquisition
- 10:15 : Hey, UK, Get Off of My Cloud
- 10:15 : Europol Warns Financial Sector of “Imminent” Quantum Threat
- 9:32 : DeepSeek Shows China Containment Is ‘Illusion’, Says Deutsche Bank
- 9:32 : Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities
- 9:13 : AI For Your Business Podcast: Is DeepSeek a Wake Up Call for AI Development?
- 9:13 : DeepSeek Warns Of Scam Websites, Social Media Accounts
- 9:13 : Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network
- 8:32 : Google Revises Superbowl AI Ad Over Gouda Controversy
- 8:32 : Silicon UK AI For Your Business Podcast: Is DeepSeek a Wake Up Call for AI Development?
- 8:32 : A week in security (February 3 – February 9)
- 8:32 : DOGE outrage and lawsuit, CISA KEV additions, DeepSeek encryption lapses
- 8:11 : Bad Actors Target DeepSeek in LLMJacking Attacks
- 8:11 : PoC Exploit Released for AnyDesk Vulnerability Exploited to Gain Admin Access Via Wallpapers
- 8:5 : IT Security News Hourly Summary 2025-02-10 09h : 6 posts
- 7:32 : Reminder: 7-Zip & MoW, (Mon, Feb 10th)
- 7:32 : Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data
- 7:32 : Linux Kernel 6.14-rc2 Released – What’s Newly Added !
- 7:32 : Black Duck Report: Inventory, Automation, and Endorsement
- 7:32 : Careers in Cybersecurity: Myths and Realities with Kathleen Smith
- 7:32 : Ransomware Payments Drop:Cyber Security Today for Monday, February 10, 2025
- 7:4 : What is a Seed Phrase Cyber Attack?
- 7:4 : Hackers Exploiting Google Tag Manager To Steal Credit Card From eCommerce Sites
- 7:4 : Judge says US Treasury ‘more vulnerable to hacking’ since Trump let the DOGE out
- 6:34 : Details on Home Office Apple iCloud access and FBI message scam alert
- 6:34 : February 2025 Patch Tuesday forecast: New directions for AI development
- 6:34 : XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
- 6:7 : Tor Browser 14.0.6 Released, What’s New!
- 6:6 : Linux Kernel 6.14 Released – What’s New With rc2!
- 6:6 : Security validation: The new standard for cyber resilience
- 5:32 : India’s banking on the bank.in domain cleaning up its financial services sector
- 5:31 : Political campaigns struggle to balance AI personalization and voter privacy
- 5:9 : Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released
- 5:9 : India wants all banking to happen at dedicated bank.in domain
- 5:5 : IT Security News Hourly Summary 2025-02-10 06h : 3 posts
- 4:32 : Adopt Me Trading Values – 86,136 breached accounts
- 4:32 : Evolving uses of tokenization to protect data
- 4:31 : Beelzebub: Open-source honeypot framework
- 4:2 : Unpatched Marvel Game RCE Exploit Could Let Hackers Take Over PCs & PS5s
- 4:2 : Massive Brute Force Attack Targets VPN & Firewall Logins Using 2.8 Million IPs
- 3:9 : DeepSeek’s iOS app is a security nightmare, and that’s before you consider its TikTok links
- 2:11 : ISC Stormcast For Monday, February 10th, 2025 https://isc.sans.edu/podcastdetail/9316, (Mon, Feb 10th)
- 2:5 : IT Security News Hourly Summary 2025-02-10 03h : 3 posts
- 1:32 : Building an Impenetrable Framework for Data Security
- 1:32 : Ensuring Satisfaction with Seamless Secrets Sprawl Management
- 1:31 : Stay Relaxed with Top-Notch API Security
- 0:6 : Huawei revenue growing fast, suggesting China’s scoffing at sanctions
- 23:5 : IT Security News Hourly Summary 2025-02-10 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 06