120 posts were published in the last hour
- 22:32 : DEF CON 32 – Inside Dash Cam Custom Protocols And Discovered 0days
- 22:5 : What is a watering hole attack?
- 22:4 : Friday Squid Blogging: Eating Bioluminescent Squid
- 22:4 : DMARC Adoption among Europe’s Higher Education Sector
- 22:4 : Week in Review: Apple encryption, gamification for security, DISA breach
- 21:32 : Empowering Women in Cybersecurity: How Education and Training Are Key
- 21:2 : Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation
- 20:32 : Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
- 20:32 : Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
- 20:7 : Researchers uncover unknown Android flaws used to hack into a student’s phone
- 20:5 : IT Security News Hourly Summary 2025-02-28 21h : 2 posts
- 19:31 : $1.5B Bybit Hack is Linked to North Korea, FBI Says, in Potentially the Largest Crypto Heist Ever
- 19:31 : Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
- 18:32 : Over 350 High-Profile Websites Hit by 360XSS Attack
- 18:31 : Microsoft to shut down Skype, Here is the Deadline
- 18:31 : Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
- 18:4 : Cyber Security Today February 2025 Month In Review
- 17:32 : Microsoft To Retire Skype On 5 May
- 17:32 : What is multifactor authentication?
- 17:32 : Millions of stalkerware users exposed again
- 17:32 : Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone
- 17:5 : IT Security News Hourly Summary 2025-02-28 18h : 10 posts
- 17:2 : How to Avoid Costly Technical Debt and Get Your Software Project Back on Track
- 17:2 : Senator Susan Collins’ Betrayal of Maine Demands Accountability
- 17:2 : Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
- 16:32 : Openreach To Start Telephone Exchange Closure Process
- 16:32 : Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations
- 16:32 : Chinese Hackers Breach Belgium State Security Service as Investigation Continues
- 16:32 : Microsoft targets AI deepfake cybercrime network in lawsuit
- 16:31 : The biggest data breaches of 2025 — so far
- 16:9 : Belgian Intelligence Agency emails leaked by Barracuda Vulnerability
- 16:9 : Enhanced capabilities sustain the rapid growth of Vo1d botnet
- 15:32 : Chinese Hackers Exploiting Check Point’s VPN Zero-Day Flaw to Attack Orgs Worldwide
- 15:32 : Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
- 15:32 : Building Robust AI Systems with Verified Data Inputs
- 15:32 : Role of Continuous Threat Exposure Management in Business Security
- 15:31 : OT/ICS cyber threats escalate as geopolitical conflicts intensify
- 15:9 : Lightning-Fast Requests with Early Data
- 15:9 : The best VPN services for torrenting in 2025: Expert tested and reviewed
- 15:9 : What is FCAPS (fault, configuration, accounting, performance and security)?
- 15:9 : Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data
- 15:9 : MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- 15:9 : 5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs
- 15:9 : RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
- 14:31 : Top Tech Conferences & Events to Add to Your Calendar in 2025
- 14:31 : Next-Gen Phishing Techniques – How Back-End Tech Made Scams More Effective
- 14:31 : Third-Party Attacks Drive Major Financial Losses in 2024
- 14:5 : IT Security News Hourly Summary 2025-02-28 15h : 4 posts
- 14:4 : Belgium investigating alleged cyberattack on intelligence agency by China-linked hackers
- 14:4 : Nakivo Backup & Replication Tool Vulnerability Allows Attackers to Read Arbitrary Files – PoC Released
- 13:31 : Migrating from Hub and Spoke Network to Azure Virtual WAN
- 13:31 : In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
- 13:2 : Google Starts Layoffs In Cloud, HR Units
- 13:2 : DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight
- 13:2 : PingAM Java Agent Vulnerability Let Attackers Gain Unauthorized Access
- 13:2 : New Pass-the-Cookie Attack Bypass Microsoft 365 & YouTube MFA Logins
- 13:2 : Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications
- 13:2 : Poco RAT Malware Exploits PDF Files to Infiltrate Systems and Steal Data
- 13:2 : OSPS Baseline: Practical security best practices for open source software projects
- 12:31 : Cisco fixed command injection and DoS flaws in Nexus switches
- 12:6 : Ransomware Group Takes Credit for Lee Enterprises Attack
- 12:6 : Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
- 12:6 : Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn
- 11:32 : JavaGhost’s Persistent Phishing Attacks From the Cloud
- 11:32 : Man Jailed 24 Years for Running Dark Web CSAM Sites from Coffee Shop
- 11:32 : New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access
- 11:32 : Telegram as #1 Messenger Used by Cybercriminals for Communications
- 11:32 : Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
- 11:32 : Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face
- 11:6 : Microsoft Names Suspects in Lawsuit Against AI Hackers
- 11:6 : Old Vulnerabilities Among the Most Widely Exploited
- 11:5 : IT Security News Hourly Summary 2025-02-28 12h : 4 posts
- 10:32 : How to Protect Your Digital Identity While Gaming Online
- 10:31 : Lynx Ransomware Attacking Organizations to Exfiltrate Sensitive Data
- 10:31 : Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
- 10:31 : 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
- 10:4 : New GitHub Scam With Thousand of “mods” & “cracks” Steal Your Data
- 10:4 : 1.6 Million Android TVs Worldwide Hacked by Vo1d Botnet
- 9:32 : Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally
- 9:32 : Prolific Data Extortion Actor Arrested in Thailand
- 9:4 : PingAM Java Agent Vulnerability Allows Attackers to Bypass Security
- 8:32 : China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails
- 8:32 : 18 Best Web Filtering Solutions – 2025
- 8:32 : Wallbleed Exposes Memory Vulnerability in China’s Great Firewall DNS System
- 8:32 : 260 Domains Hosting 5,000 Weaponized PDF Files Attacking Users to Steal Credit Card Data
- 8:31 : Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
- 8:31 : Cyber espionage increase, Nakasone cyber warning, PolarEdge exploits Cisco
- 8:6 : New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data
- 7:2 : IRS contractor leaked the tax returns of over 400k Americans and businesses
- 7:2 : 5 Best Practices for Bolstering Physical Access Security in Data Centers in 2025
- 6:32 : Cyber Attack news headlines trending on Google
- 6:32 : 260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data
- 6:32 : The SOC files: Chasing the web shell
- 6:32 : Massive Cyberattack Exploits Legacy Windows Driver to Evade Detection
- 6:31 : Understanding the AI Act and its compliance challenges
- 6:4 : The First International AI Safety Report: A Call to Action
- 6:4 : Windows CE and ICS Security: A Ticking Time Bomb?
- 5:32 : DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
- 5:32 : Winos4.0 Malware Targets Windows Users Through Malicious PDF Files
- 5:31 : The art of balancing data security with business goals
- 5:5 : IT Security News Hourly Summary 2025-02-28 06h : 4 posts
- 5:4 : Infosec products of the month: February 2025
- 4:32 : Microsoft names alleged credential-snatching ‘Azure Abuse Enterprise’ operators
- 4:31 : Beyond SMS: HYPR’s Perspective on Gmail’s Shift to QR Code Authentication
- 4:31 : University of Notre Dame Hit by Cyberattack— Hackers Say They Stole Everything
- 4:4 : DeepSeek Data Leak – 12,000 Hardcoded Live API keys and Passwords Exposed
- 4:4 : Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
- 3:3 : PayPal’s “no-code checkout” abused by scammers
- 2:32 : How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales
- 2:5 : IT Security News Hourly Summary 2025-02-28 03h : 2 posts
- 2:2 : ISC Stormcast For Friday, February 28th, 2025 https://isc.sans.edu/podcastdetail/9344, (Fri, Feb 28th)
- 1:31 : Spyzie – 518,643 breached accounts
- 1:4 : Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI
- 0:2 : Do Powerful Tools Enhance Your Data Security?
- 0:2 : Is Your NHI Lifecycle Management Capable?
- 0:2 : Optimistic About Future Cybersecurity Trends?
- 23:31 : GHOSTR Hacker Linked to 90+ Data Breaches Arrested
- 23:5 : IT Security News Hourly Summary 2025-02-28 00h : 5 posts
- 23:2 : Psychological Safety as a Competitive Edge
- 23:2 : Feds: Army soldier accused of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’