118 posts were published in the last hour
- 22:4 : Dutch Police shut down bulletproof hosting provider Zservers and seized 127 servers
- 21:8 : Holiverse Makes NASA’s Latest Achievements Accessible to Everyone
- 20:5 : IT Security News Hourly Summary 2025-02-17 21h : 1 posts
- 19:11 : New Golang-based backdoor relies on Telegram for C2 communication
- 18:4 : The XCSSET info-stealing malware is back, targeting macOS users and devs
- 17:32 : Creative SVG File Upload to Local File Inclusion Vulnerability Affecting 90,000 Sites Patched in Jupiter X Core WordPress Plugin
- 17:32 : Pro-Russia Hackers NoName057(16) Hit Italian Banks and Airports
- 17:7 : Shadow AI: How unapproved AI apps are compromising security, and what you can do about it
- 17:7 : Microsoft Defender vs. McAfee: Features, Pricing, Pros & Cons
- 17:7 : Atlas of Surveillance
- 17:7 : Three Ways to Safeguard Your Smart Home From Cybercriminals
- 17:6 : Ransomware Tactics Evolve as Hackers Shift Focus to Data Theft
- 17:6 : Apps Illegally Sold Location Data of US Military and Intelligence Personnel
- 17:6 : Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
- 17:5 : IT Security News Hourly Summary 2025-02-17 18h : 6 posts
- 16:32 : Romance Scams, AI Fuel Record Crypto Fraud Revenues In 2024
- 16:32 : Ransomware Gangs Encrypt Systems After 17hrs From Initial Infection
- 16:32 : DEF CON 32 – Evading Modern Defenses When Phishing With Pixels
- 16:31 : Microsoft Detects New XCSSET MacOS Malware Variant
- 16:31 : South Korea Suspends Downloads of AI Chatbot DeepSeek
- 16:8 : Unlocking OSINT: Top books to learn from
- 15:35 : Akira Ransomware is now targeting legacy servers of defunct companies
- 15:7 : Hackers Exploit Telegram API to Spread New Golang Backdoor
- 15:7 : White Paper: Advancing Cybersecurity Through Kernel Immunization
- 14:7 : 10 Key SOC Challenges and How AI Addresses Them
- 14:7 : Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
- 14:7 : Replit and Anthropic’s AI just helped Zillow build production software—without a single engineer
- 14:7 : Xerox Printers Vulnerability Let Attackers Capture Authentication Data From LDAP & SMB
- 14:7 : CISA Warns of Apple iOS Vulnerability Exploited in Wild
- 14:7 : RansomHub Evolves To Attack Windows, ESXi, Linux and FreeBSD Operating Systems
- 14:6 : XCSSET macOS malware returns with first new version since 2022
- 14:6 : New FinalDraft Malware Spotted in Espionage Campaign
- 14:6 : A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- 14:5 : IT Security News Hourly Summary 2025-02-17 15h : 13 posts
- 13:32 : Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
- 13:32 : New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
- 13:32 : Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB
- 13:32 : Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers
- 13:31 : Bridging the Gap Between Security and Risk with CRQ
- 13:12 : My Very Personal Guidance and Strategies to Protect Network Edge Devices, (Thu, Feb 6th)
- 13:12 : HashFlare Fraud: Two Estonians Admit to Running $577M Crypto Scam
- 13:12 : Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries
- 13:12 : CISA Warns of Active Exploitation of Apple iOS Security Flaw
- 13:11 : Check Point’s SASE Tops Scores for Threat Prevention
- 13:11 : The CISO’s Myopia
- 13:11 : Russian State Hackers Target Organizations With Device Code Phishing
- 13:11 : South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
- 12:32 : IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations
- 12:32 : New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects
- 12:32 : Hidden Malware in WordPress Websites Allows Attackers to Execute Malicious Code Remotely
- 12:2 : Massive Data Exposure at Mars Hydro Highlights IoT Security Risks
- 12:2 : 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police
- 12:2 : Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
- 11:32 : Nokia’s $2.3bn Infinera Deal Set For ‘Unconditional’ EU Approval
- 11:32 : Meta Looks To Develop AI-Powered Humanoid Robots
- 11:32 : TSMC In Talks To Take Over Intel Chip Factories
- 11:32 : Romance Scams, AI Fuel Record Scam Crypto Revenues In 2024
- 11:32 : How to Rebuild and Restore SQL Server Master Database
- 11:32 : eSentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms
- 11:32 : IDOR Vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
- 11:32 : Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns
- 11:32 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 11:32 : CISO’s Expert Guide To CTEM And Why It Matters
- 11:31 : Telegram Used as C2 Channel for New Golang Malware
- 11:9 : Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
- 11:9 : Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites
- 11:9 : Industry Moves for the week of February 17, 2025 – SecurityWeek
- 11:9 : Xerox Versalink Printer Vulnerabilities Enable Lateral Movement
- 11:8 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 11:5 : IT Security News Hourly Summary 2025-02-17 12h : 8 posts
- 10:32 : New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
- 10:32 : ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
- 10:31 : Estonian Duo Plead Guilty to $577m Crypto Ponzi Scheme
- 10:11 : whoAMI attack could allow remote code execution within AWS account
- 10:11 : New Android Security Feature that Blocks Changing Sensitive Setting During Calls
- 10:11 : Indian Post Office Portal Exposed Thousands of KYC Records With Username & Mobile Number
- 10:11 : Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
- 10:11 : Palo Alto Networks and SonicWall Firewalls Under Attack
- 9:32 : Baidu Shifts Ernie AI Model To Open Source
- 9:32 : US To Renegotiate Chips Act Awards
- 9:32 : #TripwireBookClub – Black Hat Bash: Creative Scripting for Hackers and Pentesters
- 9:32 : Advanced Ransomware Evasion Techniques in 2025
- 9:31 : Beware of Fake Outlook Troubleshooting Calls that Ends Up In Ransomware Deployment
- 9:2 : Indian Post Office Portal Leak Exposes Thousands of KYC Records
- 9:2 : Rowing in the Same Direction: 6 Tips for Stronger IT and Security Collaboration
- 8:32 : US Lawmakers Blast UK’s Demand For Encrypted Apple Data
- 8:32 : Threat Actors Leveraging Modified Version of SharpHide Tool To Create Hidden Registry
- 8:32 : Meta Paid Out $2.3 Million to Researchers via Bug Bounty Program
- 8:32 : PurpleLab – A Free Cybersecurity Lab for Security Teams to Detect, Analyze & Simulate Threats
- 8:32 : A week in security (February 10 – February 16)
- 8:31 : Device code attacks, phone TOAD solution, more telecoms breached
- 8:5 : IT Security News Hourly Summary 2025-02-17 09h : 5 posts
- 7:32 : Android’s New Security Feature Prevents Sensitive Setting Changes During Calls
- 7:32 : UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
- 7:7 : How to recognize tax scams and fraud?
- 7:7 : Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access
- 7:6 : Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access
- 6:32 : Can Simulated Phishing Attacks Help in Training and Creating Awareness Among Employees?
- 6:31 : How CISOs can balance security and business agility in the cloud
- 6:7 : Samsung brings in Quantum safe security to its Knox Security Ecosystem
- 6:7 : Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024
- 6:7 : Lessons Learned from Being a Single Mum that Relate to Cyber Security
- 6:6 : Orbit: Open-source Nuclei security scanning and automation platform
- 5:32 : Google Chrome Introduces AI to Block Malicious Websites and Downloads
- 5:32 : Linux Kernel 6.14 rc3 Released – What’s New!
- 5:32 : Google Chrome AI-Powered Security Now Available for All Users – Enable Now!
- 5:31 : DEF CON 32 – I Am Still The Captain Now!
- 5:31 : The hidden risks of a broken data provisioning system
- 3:32 : Cybersecurity Weekly Recap: Latest on Attacks, Vulnerabilities, & Data Breaches
- 3:31 : Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps
- 3:8 : Get the best best Wyze Cam alternative I’ve tested for only $20 through Presidents’ Day
- 2:31 : Twin Google flaws allowed attacker to get from YouTube ID to Gmail address in a few easy steps
- 2:5 : IT Security News Hourly Summary 2025-02-17 03h : 1 posts
- 1:32 : ISC Stormcast For Monday, February 17th, 2025 https://isc.sans.edu/podcastdetail/9326, (Mon, Feb 17th)
- 0:36 : PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1
- 0:9 : Fujitsu worries US tariffs will see its clients slow digital spend
- 23:5 : IT Security News Hourly Summary 2025-02-17 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 07