153 posts were published in the last hour
- 22:13 : Elon Musk’s DOGE Is Being Sued Under the Privacy Act: What to Know
- 22:13 : CISA Warns of SonicWall SonicOS RCE Vulnerability Actively Exploited in the Wild
- 22:13 : Threat Actors Trojanize Popular Versions of Games To Infect Systems Bypassing Evasion Techniques
- 21:31 : New Research Proposed To Enhance MITRE ATT&CK In Dynamic Cybersecurity Environments
- 21:31 : Hard drives containing sensitive medical data found in flea market
- 21:7 : Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload
- 20:5 : IT Security News Hourly Summary 2025-02-18 21h : 8 posts
- 20:4 : Elon Musk just released an AI that’s smarter than ChatGPT — here’s why that matters
- 20:4 : How Cyber Threat Intelligence Helps with Alert Triage
- 20:4 : US Military, Defense Contractors Infected with Infostealers: Hudson Rock
- 19:32 : https://SecTemplates.com – simplified, free open-source templates to enable engineering and smaller security teams to bootstrap security capabilities for their organizations, (Tue, Feb 18th)
- 19:32 : How to turn on Private DNS Mode on Android – and why it matters for privacy
- 19:31 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 19:31 : Randall Munroe’s XKCD ‘Hardwood’
- 19:31 : Join us for the end-to-end Microsoft RSAC 2025 Conference experience
- 19:4 : How Phished Data Turns into Apple & Google Wallets
- 18:32 : Protect Your Critical Assets with Akamai Guardicore DNS Firewall
- 18:32 : Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks
- 18:32 : What is defense in depth?
- 18:31 : VC giant Insight Partners confirms January cyberattack
- 18:31 : Pangea Launches AI Guard and Prompt Guard to Combat Gen-AI Security Risks
- 18:31 : Data Reveals Identity-Based Attacks Now Dominate Cybercrime
- 18:4 : SecTemplates.com – simplified, free open-source templates to enable engineering and smaller security teams to bootstrap security capabilities for their organizations, (Tue, Feb 18th)
- 18:4 : These nations are banning DeepSeek AI – here’s why
- 18:4 : Why rebooting your phone daily is your best defense against zero-click attacks
- 17:32 : AI Cybersecurity Firm Raises $100 Million to Strengthen National Security
- 17:32 : CISA Releases Two Industrial Control Systems Advisories
- 17:32 : Hackers planted a Steam game with malware to steal gamers’ passwords
- 17:32 : OpenSSH Client & Server Vulnerabilities Enables MiTM & DoS Attacks
- 17:32 : Weaponized PDF Documents Deliver Lumma InfoStealer Attacking Educational Institutions
- 17:32 : 4 Million Stolen Credit Cards to Be Released for Free by B1ack’s Stash Marketplace
- 17:32 : New LLM Vulnerability Let Attackers Exploit The ChatGPT Like AI Models
- 17:32 : DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught
- 17:32 : New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
- 17:12 : Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension
- 17:12 : US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware
- 17:11 : Kai Cenat Swatted on Live Twitch Stream
- 17:11 : China-linked APT group Winnti targets Japanese organizations since March 2024
- 17:11 : MirrorTab Raises $8.5M Seed Round to Take on Browser-Based Attacks
- 17:11 : Threat Analysts Warn of the ‘Largest Data Breach’ After Elon Musk’s DOGE Controversy
- 17:11 : National Security Faces Risks from Cybercrime Expansion
- 17:11 : DeepSeek AI Raises Data Security Concerns Amid Ties to China
- 17:11 : 6 considerations for 2025 cybersecurity investment decisions
- 17:5 : IT Security News Hourly Summary 2025-02-18 18h : 16 posts
- 16:32 : Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots
- 16:32 : Cybercriminals Embedded Credit Card Stealer Script Within
Tag
- 16:32 : Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
- 16:32 : New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation
- 16:32 : New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats
- 16:32 : Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
- 16:32 : Learn & Avoid Social Engineering Scams in 2025
- 16:32 : Cybercriminals shift focus to social media as attacks reach historic highs
- 16:31 : BlackLock ransomware onslaught: What to expect and how to fight it
- 16:31 : OpenSSH Flaws Expose Systems to Critical Attacks
- 16:9 : The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)
- 16:9 : EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack
- 16:9 : Check Point Software Securing the Hyper-Connected World in a New Era of AI with AI-Driven Innovation and Real Security Platform
- 16:9 : Check Point Software Announces Plans to Expand Global R&D Footprint with First Asia-Pacific Research & Development Centre in Bengaluru
- 16:8 : What are social engineering attacks?
- 16:8 : FreSSH bugs undiscovered for years threaten OpenSSH security
- 15:32 : What is a botnet?
- 15:32 : Intruder Added Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
- 15:31 : Vulnerability Summary for the Week of February 10, 2025
- 15:31 : Unit21 empowers financial institutions to detect and stop scams
- 15:31 : Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
- 15:15 : New XCSSET Malware Variant Targeting macOS Notes App and Wallets
- 15:15 : Mustang Panda Leverages Microsoft Tools to Bypass Anti-Virus Solutions
- 14:32 : Intruder Expands ‘Intel’ Vulnerability Intelligence Platform with AI-Generated CVE Descriptions
- 14:32 : FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant
- 14:32 : Hackers Hiding Credit Card Stealer Script Within
Tag
- 14:31 : Time to make C the COBOL of this century
- 14:31 : Boomi API Management helps enterprises tackle API sprawl
- 14:5 : IT Security News Hourly Summary 2025-02-18 15h : 14 posts
- 14:2 : Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
- 14:2 : Aomni just raised $4M to prove AI can boost sales without replacing humans
- 14:2 : How to Fix the Four Biggest Problems with Failed VPN Connections
- 14:2 : Finastra Starts Notifying People Impacted by Recent Data Breach
- 14:2 : New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
- 14:2 : Evolving Snake Keylogger Variant Targets Windows Users
- 13:31 : Critical Vulnerability Patched in Juniper Session Smart Router
- 13:15 : Strengthening Authentication in the AI Era: How Harmony SASE Aligns with CISA’s Secure by Design Pledge
- 13:15 : As US newspaper outages drag on, Lee Enterprises blames cyberattack for encrypting critical systems
- 13:15 : EagerBee Malware Attacking Government Entities & ISPs To Deploy Backdoor
- 13:15 : Earth Preta Abuse Microsoft Application Virtualization Injector To Inject Malicious Payloads
- 13:15 : Singulr Launches With $10M in Funding for AI Security and Governance Platform
- 13:15 : Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
- 13:15 : BlackLock On Track to Be 2025’s Most Prolific Ransomware Group
- 12:31 : Story About Medical Device Security
- 12:31 : ProcessUnity accelerates third-party assessments
- 12:11 : Free Security Incident Response Toolkit Released to Detect Cyber Intrusions
- 12:11 : Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products
- 12:11 : Indian Authorities Seize Loot From Collapsed BitConnect Crypto Scam
- 12:11 : DarkMind A Novel Backdoor Attack Exploits Reasoning Capabilities of Customized LLMs
- 12:11 : Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
- 12:11 : Debunking the AI Hype: Inside Real Hacker Tactics
- 12:11 : Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer
- 11:32 : China President Xi Meets With Top Tech Leaders
- 11:31 : Amazon Workers In North Carolina Reject Unionisation
- 11:31 : Microsoft Warns of Improved XCSSET macOS Malware
- 11:31 : Facts, Schmacts – Meta Joins X in Ceasing Content Moderation
- 11:13 : Zacks Investment Data Breach Exposes 12 Million Emails and Phone Numbers
- 11:13 : Got a Microsoft Teams invite? Storm-2372 Gang Exploit Device Codes in Global Phishing Attacks
- 11:13 : Ransomware: The $270 Billion Beast Shaping Cybersecurity—Insights from Cyentia’s Latest Report
- 11:13 : Monitoring Applications vs. Operating Systems: Why It Matters
- 11:5 : IT Security News Hourly Summary 2025-02-18 12h : 6 posts
- 10:32 : BYD, Geely, Great Wall Add DeepSeek AI To EVs
- 10:32 : South Korea To Buy 10,000 GPUs For National AI Hub
- 10:32 : StaryDobry ruins New Year’s Eve, delivering miner instead of presents
- 10:31 : Unauthorized Access to Grok-3 AI Achieved via Client-Side Code Exploitation – Researcher Claim
- 10:6 : Ex-NSO Group CEO’s Security Firm Dream Raises $100M at $1.1B Valuation
- 10:6 : Zacks Investment Research Breach Hits 12 Million
- 9:32 : Google Puts ‘Profits Over Privacy’ With Tracking Change
- 9:31 : South Korea Suspends DeepSeek From App Stores
- 9:6 : Xerox VersaLink C7025 Multifunction printer flaws may expose Windows Active Directory credentials to attackers
- 8:32 : Meta To Build World’s Longest Subsea Fibre Cable
- 8:32 : BitConnect Scam Exposed as Indian Authorities Seize Illicit Gains
- 8:31 : Vgod RANSOMWARE Encrypt Your Entire System and Set A Ransom Notes As Wallpaper
- 8:31 : LibreOffice Vulnerabilities Let Attackers Write to Arbitrary File & Extract Values
- 8:31 : WinRAR 7.10 Latest Version Released For 500 Million Users – What’s New
- 8:31 : Zservers takedown, Zelle payment blocks, Finastra data breach
- 8:7 : Black-Hat SEO Poisioning Attacks Exploit Indian Government and Financial Websites
- 8:7 : New XCSSET macOS malware variant used in limited attacks
- 8:6 : New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials
- 8:6 : Final Draft Malware Attacks Using Outlook: Cyber Security Today for Tuesday, February 18th, 2025
- 8:5 : IT Security News Hourly Summary 2025-02-18 09h : 3 posts
- 7:31 : Beware of Fake Timesheet Report Email Leading to the Tycoon 2FA Phishing Kit
- 7:31 : ChatGPT Operator Prompt Injection Exploit Leaking Private Data
- 7:15 : WinRAR 7.10 Latest Version Released – What’s New!
- 6:32 : 2025 ZeroFox Forecast: Dark Web, Ransomware, Gen AI & Beyond
- 6:32 : South Korea Temporarily Suspends DeepSeek Over Data Privacy Worries
- 6:31 : The Biggest Cybersecurity Threats to Watch Out For in 2025
- 6:31 : The risks of autonomous AI in machine-to-machine interactions
- 6:13 : AI Data Breach will surge by 2027 because of misuse of GenAI
- 6:13 : Cybersecurity Jobs in Most Demand in 2025
- 6:13 : Microsoft Text Services Framework Exploited for Stealthy Persistence
- 6:13 : Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit
- 6:13 : Juniper Issues Warning About Critical Authentication Bypass Vulnerability
- 6:13 : Microsoft Uncovers Enhanced macOS Malware Targeting Xcode Projects
- 6:13 : Indian authorities seize loot from collapsed BitConnect crypto scam
- 6:13 : Balancing cloud security with performance and availability
- 6:13 : Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
- 5:32 : ChatGPT Operator Prompt Injection Exploit Leaks Private Data
- 5:32 : Earth Preta APT Exploit Microsoft Utility Tool & Bypass AV Detection to Control Windows
- 5:31 : LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data
- 5:31 : Eight Cloud Security Best Practice Fundamentals for Microsoft Azure
- 5:31 : Cybersecurity jobs available right now: February 18, 2025
- 2:15 : ISC Stormcast For Tuesday, February 18th, 2025 https://isc.sans.edu/podcastdetail/9328, (Tue, Feb 18th)
- 2:5 : IT Security News Hourly Summary 2025-02-18 03h : 1 posts
- 1:31 : Cybersecurity as a Business Imperative: Embracing a Risk Management Approach
- 1:4 : ModelScan – Protection Against Model Serialization Attacks, (Mon, Feb 17th)
- 1:4 : Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection
- 23:31 : Duo Wins $50K Bug Bounty for Supply Chain Flaw in Newly Acquired Firm
- 23:5 : IT Security News Hourly Summary 2025-02-18 00h : 1 posts