191 posts were published in the last hour
- 22:32 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 22:6 : Trump’s DoD CISO pick previously faced security clearance suspension
- 22:6 : Russia-linked APTs target Signal messenger
- 22:6 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 21:32 : Copyright and AI: the Cases and the Consequences
- 21:32 : AI and Copyright: Expanding Copyright Hurts Everyone—Here’s What to Do Instead
- 21:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 21:3 : How to Recognize AI Attacks and Strategies for Securing Your AI Applications
- 21:2 : The head of US AI safety has stepped down. What now?
- 21:2 : 9 tips for migrating between managed SOC providers
- 21:2 : Lina’s Write-up
- 21:2 : New Web Inject Attack Campaigns Targeting MacOS Users To Deploy FrigidStealer Malware
- 21:2 : Check out this free automated tool that hunts for exposed AWS secrets in public repos
- 21:2 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 20:32 : Randall Munroe’s XKCD ‘Archive Request’
- 20:31 : DEF CON 32 – Dysfunctional Unity: The Road To Nowhere
- 20:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 20:5 : IT Security News Hourly Summary 2025-02-19 21h : 16 posts
- 20:4 : Spanish spyware startup Mollitiam Industries shuts down
- 20:4 : Cybersecurity Talent Crisis: Future Defenders Rise to the Challenge in CTF Showdown
- 20:4 : RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation
- 20:4 : Hackers Inject FrigidStealer Malware on Your macOS Via Fake Browser Updates
- 20:4 : Russian CryptoBytes Hackers Exploiting Windows Machines To Deploy UxCryptor Ransomware
- 20:4 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 19:32 : MITRE ATT&CK Evaluations — Cortex XDR Among Elite in Endpoint Security
- 19:31 : Protected: zQA Content Editing Styles
- 19:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 19:9 : Most Children Bypass Social Media Age Restrictions – Australian Regulator
- 19:9 : US AI Safety Institute will be ‘gutted,’ Axios reports
- 19:9 : Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs
- 19:9 : #StopRansomware: Ghost (Cring) Ransomware
- 19:9 : CISA and Partners Release Advisory on Ghost (Cring) Ransomware
- 19:9 : Beware! New Fake Browser Updates Deploy NetSupport RAT & StealC Malware on Your Windows
- 19:8 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:32 : Mira Murati AI Startup Launches With Some Familiar Faces
- 18:31 : BlackLock Emerging As a Major Player In RaaS With Variants for Windows, VMWare ESXi, & Linux Environments
- 18:31 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:11 : Hackers Tricking Users Into Linking Devices to Steal Signal Messages
- 18:11 : A Stytch in time: Connected Apps untangles authorization tie-ups for AI agents
- 18:11 : Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything
- 18:11 : What is email spoofing?
- 18:11 : From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025
- 18:11 : Microsoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
- 18:11 : Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
- 17:32 : I tried Norton Private Browser to see how it compares to Tor – here’s what I found
- 17:32 : Device Code Phishing
- 17:31 : Your Social Security Number is on the Dark Web: What Do You Do?
- 17:31 : WordPress Plugin Vulnerability Exposes 90,000 Sites to Attack
- 17:5 : Crunchbase’s AI can predict startup success with 95% accuracy—will it change investing?
- 17:5 : The best secure browsers for privacy in 2025: Expert tested
- 17:5 : IT Security News Hourly Summary 2025-02-19 18h : 23 posts
- 17:4 : North Korean Hackers Using Dropbox & PowerShell Scripts To Infiltrate Organizations
- 17:4 : Stop Censoring Abortion: The Fight for Reproductive Rights in the Digital Age
- 17:4 : EFF and Repro Uncensored Launch #StopCensoringAbortion Campaign
- 16:32 : Elon Musk’s xAI Introduces Grok-3 AI Chatbot
- 16:32 : Google Fixes YouTube Security Flaw That Exposed User Emails
- 16:32 : Addressing the Security Risks Posed by IoT Devices
- 16:32 : Hackers Exploit ThinkPHP and ownCloud Vulnerabilities from 2022 and 2023
- 16:32 : China-backed APT40 Hacking Outfit Implicated for Samoa Cyberattacks
- 16:32 : Sandworm’s Evolving Cyber Threat: BadPilot Expands Global Reach
- 16:31 : Finastra Notifies Customers of Data Breach
- 16:10 : Zero Trust Architecture a priority to President Donald Trump
- 16:10 : Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
- 16:10 : Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign
- 16:10 : Hackers Converting Stolen Payment Card Data into Apple & Google Wallets
- 16:9 : Hackers Exploit Jarsigner Tool to Deploy XLoader Malware
- 16:9 : Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
- 16:9 : Microsoft’s Muse AI can design video game worlds after watching you play
- 16:9 : MSPs weigh in: Key SOAR benefits driving MDR success
- 16:9 : US Army soldier pleads guilty to AT&T and Verizon hacks
- 16:9 : Palo Alto Warns of Hackers Combining Vulnerabilities to Compromise Firewalls
- 16:9 : CaaS Surges in 2025, Along With RATs, Ransomware
- 16:9 : iOS 18 settings to lock down your privacy and security
- 15:32 : Google Warned Of Lawsuit Over ‘Gulf of Mexico’ Name Change
- 15:31 : 2025-02-18: SmartApeSG script for fake browser update leads to NetSupport RAT and StealC
- 15:31 : Flaws in Xerox VersaLink MFPs Spotlight Printer Security Concerns
- 15:5 : INE Security’s Cybersecurity and IT Training Enhances Career Stability in Tech
- 15:5 : What is challenge-response authentication?
- 15:5 : Venture capital firm Insight Partners discloses security breach
- 15:5 : Threat Actors Using $10 Infostealer Malware To Breach Critical US Security
- 15:4 : Hackers Turning Stolen Payment Card Data into Apple & Google Wallets
- 15:4 : Lee Enterprises Ransomware Attack Compromises ‘Critical’ Systems
- 15:4 : How Hackers Manipulate Agentic AI with Prompt Engineering
- 15:4 : CardinalOps expands Threat Exposure Management platform
- 15:4 : Fortinet enhances FortiAnalyzer to deliver accelerated threat hunting and incident response
- 14:32 : Multiple Vulnerabilities Discovered in NVIDIA CUDA Toolkit
- 14:32 : Australian IVF giant Genea confirms hackers ‘accessed data’ during cyberattack
- 14:32 : Malwarebytes introduces native ARM support for Windows devices
- 14:32 : CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at AuditBoard
- 14:32 : Fortinet Extends Scope and Reach of SOC Platform
- 14:32 : Australian IVF Clinic Suffers Data Breach Following Cyber Incident
- 14:7 : Russian Hackers Attacking Signal Messenger Users To Gain Access To Sensitive Data
- 14:6 : Raymond IT Systems Hit by Cyber Attack – Investigation In progress
- 14:6 : South Korea Confirm DeepSeek Sending Data Chinese ByteDance Servers
- 14:6 : Google now allows digital fingerprinting of its users
- 14:6 : Blockaid Raises $50 Million to Secure Blockchain Applications
- 14:6 : Echoworx launches Manage Your Own Keys feature powered by AWS
- 14:5 : IT Security News Hourly Summary 2025-02-19 15h : 13 posts
- 13:32 : How Blockchain Games Ensure Transparency and Fairness
- 13:31 : Duo vs Microsoft Authenticator: Which Tool Is Better?
- 13:31 : VC Company Insight Partners Hacked
- 13:31 : Spies Eye AUKUS Nuclear Submarine Secrets, Australia’s Intelligence Chief Warns
- 13:11 : Google To Pay $340m To Settle Tax Probe In Italy
- 13:11 : 10 Best LMS SaaS Platforms for Scalable Online Learning
- 13:11 : Celebrating Excellence: Check Point’s Americas 2024 Partner Award of the Year Winners
- 13:11 : Hundreds of Dutch medical records bought for pocket change at flea market
- 13:11 : Palo Alto Networks warns of another firewall vulnerability under attack by hackers
- 13:11 : OpenSSH bugs allows Man-in-the-Middle and DoS Attacks
- 13:11 : Macs targeted by info stealers in new era of cyberthreats
- 13:11 : Chrome 133, Firefox 135 Updates Patch High-Severity Vulnerabilities
- 13:11 : New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
- 12:32 : UK Rejects Chinese Plea Over Divest Order For Scottish Chip Firm
- 12:32 : New IRS and Tax-Themed Cyber Attacks Fueled With New Domain Registrations
- 12:32 : Saving the Internet in Europe: Defending Privacy and Fighting Surveillance
- 12:31 : New FrigidStealer macOS Malware Distributed as Fake Browser Update
- 12:31 : The Ultimate MSP Guide to Structuring and Selling vCISO Services
- 12:9 : Mozilla Addresses High-Severity Memory Safety Vulnerabilities in Firefox 135.0.1
- 12:9 : Raymond IT Systems Hit by Cyber Attack, Authorities Investigating
- 12:9 : Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions
- 12:8 : Cyber Investor Insight Partners Suffers Security Breach
- 11:32 : Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
- 11:32 : Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials
- 11:32 : A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
- 11:32 : New Wave of ‘Scam-Yourself’ Attacks Utilizing AI-Generated Videos With DeepFake
- 11:32 : Most Popular Passwords Cracked Within a Second
- 11:31 : 90,000 WordPress Sites Vulnerable to Local File Inclusion Attacks
- 11:31 : Firefox 135.0.1 Released with Fix for High-Severity Memory Safety Vulnerabilities
- 11:31 : Lee Enterprises Newspaper Disruptions Caused by Ransomware
- 11:9 : 90,000 WordPress Sites Exposed to Local File Inclusion Attacks
- 11:9 : How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying
- 11:9 : Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
- 11:8 : Russian State Hackers Target Signal to Spy on Ukrainians
- 11:5 : IT Security News Hourly Summary 2025-02-19 12h : 8 posts
- 10:33 : What is Data Marketing?
- 10:33 : Malaysia’s Data Sharing Bill 2024: Pioneering Secure and Efficient Government Collaboration
- 10:32 : CIS Control 01: Inventory and Control of Enterprise Assets
- 10:32 : Spam and phishing in 2024
- 10:32 : Yahoo Data Leak – Hackers Allegedly Advertised 602,000 Email Accounts
- 10:11 : London celebrity talent agency reports itself to ICO following Rhysida attack claims
- 10:11 : Edge Delta Security Data Pipelines mitigates security threats
- 10:10 : Hundreds of US Military and Defense Credentials Compromised
- 9:31 : Critical Apache Ignite Vulnerability Let Attackers Execute Remote Code
- 9:31 : Pangea introduces AI guardrails to secure AI applications
- 9:11 : Attackers are chaining flaws to breach Palo Alto Networks firewalls
- 8:32 : CISA Warns of Active Exploitation of SonicWall SonicOS RCE Vulnerability
- 8:31 : Veeam brings recovery orchestrator to Microsoft Hyper-V customers
- 8:31 : OpenSSH flaws enable new attacks, Microsoft prepares for deprecation, Zwipe files for bankruptcy
- 8:18 : XWorm Cocktail: A Mix of PE data with PowerShell Code, (Wed, Feb 19th)
- 8:17 : CISA Issues Warning on Palo Alto PAN-OS Security Flaw Under Attack
- 8:17 : CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities
- 8:17 : Weaponized Signal, Line, and Gmail Apps Delivers Malware That Changes System Defenses
- 8:17 : GPT-4o Copilot Trained in Over 30 Popular Programming Languages
- 8:17 : Russian Government Proposed New Penalties to Combat Cybercrime
- 8:5 : IT Security News Hourly Summary 2025-02-19 09h : 4 posts
- 7:32 : Surge in IRS and Tax-Themed Cyber Attacks Driven by Fresh Domain Registrations
- 7:13 : Russian Government Proposes Stricter Penalties to Tackle Cybercrime
- 7:13 : Critical Flaw in Apache Ignite (CVE-2024-52577) Allows Attackers to Execute Code Remotely
- 7:13 : U.S. CISA adds SonicWall SonicOS and Palo Alto PAN-OS flaws to its Known Exploited Vulnerabilities catalog
- 6:32 : Ransomware attacks on Food and Agriculture sector could intensify
- 6:32 : How to thwart cyber attacks on connected cars
- 6:32 : GPT-4o Copilot Covers More Than 30 Popular Programming Languages
- 6:32 : Does AI Detection Remover Really Work? How to Fix Text Like a Pro!
- 6:31 : Hidden Dangers of Security Threats in the Tide of DeepSeek
- 6:31 : Kunai: Open-source threat hunting tool for Linux
- 6:9 : Is quishing the new phishing? Protecting your business against the next threat vector
- 6:9 : CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities
- 6:8 : VC-backed cybersecurity startups and the exit crunch
- 6:8 : CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
- 5:31 : Cyber hygiene habits that many still ignore
- 5:11 : Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access
- 5:11 : How to take your firm from risk to resilience in 8 DORA-compliant steps
- 5:5 : IT Security News Hourly Summary 2025-02-19 06h : 3 posts
- 4:31 : Mustang Panda APT Exploits Windows Utilities to Slip Through Security Nets
- 4:31 : CISA Warns of Palo Alto PAN-OS Vulnerability Actively Exploited in the Wild
- 4:6 : Qualys Identifies Critical Vulnerabilities that Enable DDoS, MITM Attacks
- 3:4 : Chrome Buffer Overflow Vulnerabilities Allow Arbitrary Code Execution & Gain System Access
- 2:5 : IT Security News Hourly Summary 2025-02-19 03h : 4 posts
- 2:4 : Katharine Hayhoe: The most important climate equation | Starmus highlights
- 1:31 : Curb Healthcare Costs — Can Cybersecurity Platformization Help?
- 1:31 : Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11 million
- 1:6 : ISC Stormcast For Wednesday, February 19th, 2025 https://isc.sans.edu/podcastdetail/9330, (Wed, Feb 19th)
- 0:31 : Crimson Memo: Analyzing the Privacy Impact of Xianghongshu AKA Red Note
- 0:31 : Palo Alto firewalls under attack as miscreants chain flaws for root access
- 0:4 : KnowBe4’s Explosive Inside Man Series Back For Season 6
- 0:4 : Keeper Security Launches Upgraded KeeperPAM
- 23:31 : Get a Lifetime of 1TB Cloud Storage for Only $60 With FolderFort
- 23:6 : $10 Infostealers Are Breaching Critical US Security: Military and Even the FBI Hit
- 23:6 : Data Privacy and Governance in Real-Time Data Streaming
- 23:6 : Juniper Networks fixed a critical flaw in Session Smart Routers
- 23:5 : IT Security News Hourly Summary 2025-02-19 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-02-18