164 posts were published in the last hour
- 22:4 : Support Canada’s CCCS PBHVA overlay compliance with the Landing Zone Accelerator on AWS
- 21:2 : Unfurl v2025.02 released, (Mon, Feb 24th)
- 21:2 : DOGE’s HR email is getting the ‘Bee Movie’ spam treatment
- 21:2 : A large botnet targets M365 accounts with password spraying attacks
- 20:32 : US Dept of Housing screens sabotaged to show deepfake of Trump sucking Elon’s toes
- 20:31 : Four ways to grant cross-account access in AWS
- 20:5 : IT Security News Hourly Summary 2025-02-24 21h : 4 posts
- 19:32 : Botnet of 130K Devices Targets Microsoft 365 in Password-Spraying Attack
- 19:31 : What Microsoft’s Majorana 1 Chip Means for Quantum Decryption
- 19:6 : Inside the Telegram Groups Doxing Women for Their Facebook Posts
- 19:6 : Threat Actors Stealing Users Browser Fingerprints To Bypass Security Measures & Impersonate Users
- 18:31 : Anthropic’s Claude 3.7 Sonnet takes aim at OpenAI and DeepSeek in AI’s next big battle
- 18:5 : 100,000 WordPress Sites Affected by Arbitrary File Upload, Read and Deletion Vulnerability in Everest Forms WordPress Plugin
- 18:5 : TSforge New Tool Bypasses Windows Activation on All Versions
- 18:5 : Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception
- 18:5 : Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users
- 18:5 : UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure
- 18:5 : GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users
- 18:5 : Leaked Black Basta Chats Expose Ransomware Secrets & Infighting
- 18:5 : TVs at HUD Played an AI-Generated Video of Donald Trump Kissing Elon Musk’s Feet
- 18:5 : Rad Security Raises $14 Million for AI, Cloud Security Platform
- 18:5 : The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation
- 18:4 : Fintech Giant Finastra Breach Exposed Private Data, Company Notifies Victims
- 18:4 : South Korea Blocks DeepSeek AI App Downloads Amid Data Security Investigation
- 18:4 : Pro-Russia Hackers Target Italian Banks and Airports Amid Rising Tensions
- 18:4 : How AI Agents Are Transforming Cryptocurrency
- 17:32 : Industrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware
- 17:32 : Android App on Google Play Targets Indian Users to Steal Login Credentials
- 17:32 : Three years on, Europe looks to Ukraine for the future of defense tech
- 17:32 : OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools
- 17:32 : Enhanced In-Call Security in Android 16 Aims to Tackle Scammers
- 17:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 17:31 : New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
- 17:5 : Virgin Media O2 Users Affected By Broadband Outage
- 17:5 : TVs at HUD Played an AI-Generated Video of Donald Trump Kissing Elon Musk’s Feet
- 17:5 : Researchers accuse North Korea of $1.4 billion Bybit crypto heist
- 17:5 : Australia bans government use of Kaspersky software due to ‘unacceptable security risk’
- 17:5 : Australia Prohibits Kaspersky Software in Government Networks Over Major Security Concerns
- 17:5 : IT Security News Hourly Summary 2025-02-24 18h : 13 posts
- 17:5 : Integration with Gloo Gateway | Impart Security
- 17:4 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 17:4 : Essential Addons for Elementor XSS Vulnerability Discovered
- 16:32 : Hackers Use Google Docs and Steam to Spread ACRStealer Infostealer
- 16:32 : Surveillance pricing is “evil and sinister,” explains Justin Kloczko (Lock and Code S06E04)
- 16:32 : Vulnerability Summary for the Week of February 17, 2025
- 16:32 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 16:32 : Connect your on-premises Kubernetes cluster to AWS APIs using IAM Roles Anywhere
- 16:5 : Kaspersky ban across Australia government agencies
- 16:5 : Why Gmail is replacing SMS codes with QR codes – and what it means for you
- 16:5 : The best password generator of 2025: Expert tested
- 16:5 : Android App on Google Play Attacking Indian Users To Steal Login Credentials
- 16:5 : SafeLine WAF vs CloudFlare: Which One Should You Choose?
- 16:5 : GhostSocks Malware Exploiting SOCKS5 Proxy to Bypass Detection Systems
- 16:4 : LogonBox SSPR 2.4.11 – Now Available
- 16:4 : LogonBox VPN 2.4.11 – Now Available
- 16:4 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:32 : Phishing Campaigns Targeting Higher Education Institutions
- 15:32 : Women in Cybersecurity Leadership: Inspiring Role Models at the Top
- 15:32 : NinjaOne Scores $500M in Series C Extensions at $5 Billion Valuation
- 15:31 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:31 : Michigan Man Indicted for Dark Web Credential Fraud
- 15:7 : What is red teaming?
- 15:7 : Palo Alto Networks Recognized as a Leader in Omdia Market Radar
- 15:7 : Apple has Discontinued its Advanced Data Protection (ADP) Feature for UK Users
- 15:7 : Vulnerability in Internet-Connected Smart Beds Let Attackers Access Other Devices in Network
- 15:7 : BIG SHARK Android RAT Cracked & Leaked from Chinese Market
- 15:7 : Shifting the cybersecurity odds
- 15:7 : BigID Next provides organizations with visibility and control over their data
- 15:6 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 15:6 : Google Cloud Shields Data With Quantum-Resistant Digital Signatures
- 14:32 : A single default password exposes access to dozens of apartment buildings
- 14:31 : PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- 14:31 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 14:10 : How Payment Orchestration Enhances Business Efficiency
- 14:10 : Smart Bed Security Flaw Lets Hackers Access Other Network Devices
- 14:10 : Dive Deeper into Network Mysteries: Wireshark 4.4.0 is Here!
- 14:10 : How hunting for vulnerable drivers unraveled a widespread attack
- 14:10 : LogRhythm vs Splunk (2025): SIEM Tool Comparison
- 14:10 : A data leak exposes the operations of the Chinese private firm TopSec, which provides Censorship-as-a-Service
- 14:10 : Australia bans Kaspersky over national security concerns
- 14:10 : Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT
- 14:10 : The software UK techies need to protect themselves now Apple’s ADP won’t
- 14:10 : Massive botnet hits Microsoft 365 accounts
- 14:10 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 14:9 : IT/OT Convergence Fuels Manufacturing Cyber Incidents
- 13:5 : Hardware Crypto Wallets vs. Mobile vs. Desktop: Which Should You Choose?
- 13:4 : How to utilize VPN for safe work and remote work environments
- 13:4 : New ChatGPT’s Premium Features Subscription Phishing Attack Steal Logins
- 13:4 : Stablecoin Bank Hacked – Hackers Stolen $49.5M in Attack
- 13:4 : Kaspersky Banned on Australian Government Systems
- 13:4 : Account takeover detection: There’s no single tell
- 13:4 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 12:32 : The Agile Advantage: Doubling Down on the Biggest Business Challenges
- 12:31 : More Research Showing AI Breaking the Rules
- 12:31 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 12:2 : PirateFi Game Infected Steam Users’ Devices With Malware
- 12:2 : Cutting edge, Composable and Connected: The Next-Gen ERP Solutions Powering Business in 2025
- 12:2 : Hackers Hijack YouTube Channels to Target CS2 Fans with Fake Giveaways
- 12:2 : US Charges Genesis Market User
- 12:2 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 11:32 : X Wins Motion To Dismiss German Judge
- 11:32 : The Mobile Catalyst: Shaping Digital Innovation in Business
- 11:32 : Google’s Waze Qualifies For More Stringent EU Rules
- 11:32 : Head-to-Head: The Mobile Catalyst
- 11:32 : Alibaba Shares Surge On AI Plans
- 11:32 : Apple Removes Advanced Data Protection (ADP) for UK Users
- 11:32 : Conducting Security Audits in Supply Chain Management
- 11:32 : Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
- 11:32 : Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
- 11:31 : ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- 11:31 : Experts Slam Government After “Disastrous” Apple Encryption Move
- 11:5 : IT Security News Hourly Summary 2025-02-24 12h : 6 posts
- 11:2 : Wireshark 4.4.4 Released – Explore the Latest Features!
- 11:2 : Making Sense of Australia’s New Cybersecurity Legislation
- 11:2 : Protecting the Manufacturing Sector from Ransomware
- 10:32 : Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers
- 10:31 : Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack
- 10:31 : Australia Bans Kaspersky Software Over National Security and Espionage Concerns
- 10:2 : Industry Moves for the week of February 24, 2025 – SecurityWeek
- 10:2 : $1.5 Billion Bybit Heist Linked to North Korean Hackers
- 10:2 : Bybit Offers $140m Bounty to Recover Funds After Mega Crypto-Heist
- 9:31 : The GitVenom campaign: cryptocurrency theft using GitHub
- 9:5 : LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability
- 9:5 : GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
- 9:5 : Leaked Black Basta chat logs reveal the gang’s operations
- 9:5 :
- 9:5 : SpyLend Android malware found on Google Play enabled financial cyber crime and extortion
- 9:5 : DeepSeek Unveils FlashMLA, A Decoding Kernel That’s Make Things Blazingly Fast
- 9:4 : Parallels Desktop 0-Day Vulnerability Gain Root Privileges – PoC Released
- 9:4 : Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware
- 9:4 : A week in security (February 17 – February 23)
- 9:4 : The Essential Guide to Horizon Scanning in Compliance and Regulatory Frameworks
- 8:32 : North Koreans Steal $1.5bn From Crypto Exchange Bybit
- 8:32 : $1.5B Bybit hack, UK E2E pulled, PayPal phishing emails
- 8:31 : Inside a Cyber Crime Group: Cyber Security Today for Monday, Feb 24, 2025
- 8:5 : IT Security News Hourly Summary 2025-02-24 09h : 4 posts
- 8:4 : Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials
- 8:4 : Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries
- 7:32 : 10 Best DevOps Tools in 2025
- 7:32 : UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks
- 7:2 : Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released
- 7:2 : Cisco Confirms Salt Typhoon Exploitation in Telecom Hits
- 6:32 : Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
- 6:31 : Cybercrooks Exploit URL Manipulation in Sophisticated Phishing Scam
- 6:31 : Man vs. machine: Striking the perfect balance in threat intelligence
- 6:8 : US Satellites enabled with AI Tech to make them immune to Cyber Attacks
- 6:8 : How Password Managers Enhance Security in Corporate Networks
- 6:7 : Biggest Crypto Hack in History – Hackers Stolen $1.46 Billion Worth Crypto From Bybit
- 5:32 : PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability
- 5:32 : Why AI deployment requires a new level of governance
- 5:31 : Misconfig Mapper: Open-source tool to uncover security misconfigurations
- 5:7 : Google Introduces Quantum-Safe Digital Signatures in Cloud KMS
- 5:7 : Cutting Through the Noise: Smart Deduplication for Stronger Cybersecurity
- 5:7 : Bybit Confirms Record-Breaking $1.5 Billion Crypto Heist in Sophisticated Cold Wallet Attack
- 4:2 : Rather than add a backdoor, Apple decides to kill iCloud E2EE for UK peeps
- 3:31 : Record Breaking Crypto Hack – Attackers Stolen $1.46 Billion From Bybit Exchange
- 2:5 : IT Security News Hourly Summary 2025-02-24 03h : 2 posts
- 2:4 : ISC Stormcast For Monday, February 24th, 2025 https://isc.sans.edu/podcastdetail/9336, (Mon, Feb 24th)
- 1:31 : The best travel VPNs of 2025: Expert tested and reviewed
- 0:32 : Confluence Exploit Leads to LockBit Ransomware
- 23:32 : Trump 2.0 Brings Cuts to Cyber, Consumer Protections
- 23:32 : DEF CON 32 – Efficient Bug Bounty Automation Techniques
- 23:5 : IT Security News Hourly Summary 2025-02-24 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 08