169 posts were published in the last hour
- 22:31 : Elastic patches critical Kibana flaw allowing code execution
- 22:7 : Trump’s Spy Chief Urged to Declassify Details of Secret Surveillance Program
- 22:7 : Anthropic’s Claude Code tool had a bug that ‘bricked’ some systems
- 22:7 : As an SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic
- 22:7 : Why Understanding Your Secrets is the Key to Faster Remediation
- 22:6 : Votiro’s Proven Protection: Retroscan for Zero-Day Threats
- 22:6 : Women’s History Month: Why different perspectives in cybersecurity and AI matter more than ever before
- 21:32 : The Future of AI in Workplace Management
- 21:31 : Anthropic just launched a new platform that lets everyone in your company collaborate on AI — not just the tech team
- 21:31 : Uncle Sam mulls policing social media of all would-be citizens
- 21:4 : Hacked health firm HCRG demanded journalist ‘take down’ data breach reporting, citing UK court order
- 21:4 : KnowBe4 Wins Cybersecurity Company of the Year at the 2025 teissAwards
- 20:32 : Implementing Identity First Security for Zero Trust Architectures
- 20:32 : How Explainable AI Is Building Trust in Everyday Products
- 20:32 : Android’s AI is scanning your phone for scam activity now in two ways
- 20:32 : Uncle Sam mulls policing social media of would-be citizens
- 20:31 : Inside Black Basta Ransomware Group’s Chat Leak
- 20:31 : Beyond “Move Fast and Fail Fast”: Balancing Speed, Security, and … Sanity in Software Development (with Podcast)
- 20:7 : Who is Responsible and Does it Matter?
- 20:7 : Utah Passes App Store Age Verification Bill
- 20:7 : Bitcoin and Cybersecurity: Protecting Digital Assets in a Decentralized World
- 20:5 : IT Security News Hourly Summary 2025-03-06 21h : 6 posts
- 19:32 : Pentagon Cuts Threaten Programs That Secure Loose Nukes and Weapons of Mass Destruction
- 19:32 : Russian crypto exchange Garantex seized by law enforcement operation
- 19:31 : Poland’s Space Agency Investigates Cyberattack, Works On Security Measures
- 19:9 : Tata Technologies Hit by Hunters International Ransomware, 1.4TB Data at Risk
- 19:9 : What is the Twofish encryption algorithm?
- 19:8 : How to protect yourself from tax-related scams in 2025: 10 expert tips
- 18:32 : LinkedIn InMail Spoofing Malware Campaign Unleashes ConnectWise RAT
- 18:32 : Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community
- 18:32 : As a SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic
- 18:31 : Decrypting the Forest From the Trees
- 18:5 : Amazon One Medical CEO Steps Down
- 18:5 : Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis
- 18:5 : Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns
- 18:5 : Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks
- 18:5 : Detecting Malicious Activities With Traffic Distribution Systems
- 18:5 : InvokeADCheck – New Powershell Module for Active Directory Assessment
- 18:4 : This outdoor security camera I tested has useful features and no monthly subscription fees
- 18:4 : Accidentally texting with scammers? Google’s AI is here to stop the chat cold
- 18:4 : Malvertising campaign leads to info stealers hosted on GitHub
- 17:32 : Wordfence Intelligence Weekly WordPress Vulnerability Report (February 24, 2025 to March 2, 2025)
- 17:32 : Samsung To Launch Vision Pro Rival Headset In 2025
- 17:32 : DoJ Busts Alleged Global Hacking-for-Hire Network of ‘Cyber Mercenaries’
- 17:32 : CISA Releases Three Industrial Control Systems Advisories
- 17:32 : Hitachi Energy Relion 670/650/SAM600-IO
- 17:32 : Hitachi Energy PCU400
- 17:32 : Vulnerability in Chaty Pro Plugin Exposes 18,000 WordPress Sites
- 17:5 : IT Security News Hourly Summary 2025-03-06 18h : 9 posts
- 17:4 : Data Security in the Age of AI with Rob Truesdell
- 17:4 : Attackers Target Japanese Firms with Cobalt Strike
- 16:32 : Malware Infects Linux and macOS via Typosquatted Go Packages
- 16:32 : Top 7 Full Disk Encryption Software Solutions for 2025
- 16:32 : Armis buys Otorio for $120M to beef up cybersecurity in physical spaces
- 16:32 : Android botnet BadBox largely disrupted
- 16:32 : Ransomware threat mailed in letters to business owners
- 16:32 : Cybersecurity Requirements of Cloud Computing with Brooke Motta
- 16:31 : Attackers Targeting Japanese Firms with Cobalt Strike
- 16:3 : NHS Faces Cybersecurity Challenges Amid Windows 11 Upgrade Dilemma
- 16:3 : Treasury Department hacked: Explaining how it happened
- 16:3 : Qilin Ransomware Outfit Claims Credit for Lee Enterprises Breach
- 16:3 : Hackers Can Attack Your Rooftop Solar Panels, With Ease
- 16:2 : Microsoft MUSE AI: Revolutionizing Game Development with WHAM and Ethical Challenges
- 16:2 : Cybersecurity jobs available right now in the USA: March 6, 2025
- 15:33 : US DoJ Charges Chinese Contract Hackers, Plus Police Officers
- 15:33 : Crogl, armed with $30M, says it’s built an AI ‘Iron Man suit’ for security analysts
- 15:33 : Socure launches Identity Manipulation Risk Score
- 15:33 : Misconfigured Apache Airflow Servers Exposes Login Credentials to Hackers
- 15:33 : Sitecore 0-Day Vulnerability Let Attackers Execute Remote Code
- 15:32 : Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications
- 15:32 : Up to $75M needed to address rural hospital cybersecurity
- 15:32 : Toronto Zoo ransomware crooks snatch decades of visitor data
- 15:32 : House Passes Bill Requiring Federal Contractors to Implement Vulnerability Disclosure Policies
- 15:32 : Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets
- 15:32 : The cybersecurity ‘fog of war’: How to apply data science to cut through
- 15:32 : The Fallacy of Arbitrary Severity Scales
- 15:6 : Persona combats fraud during business onboarding
- 14:5 : IT Security News Hourly Summary 2025-03-06 15h : 9 posts
- 14:3 : US Charges 12 in Chinese Hacker Network, Offers $10M Reward
- 14:3 : Check Point Software Partners with Variscite: Embedding Security at the Core, Securing IoT Devices from Day One
- 14:3 : Did you get an E-ZPass text demanding payment? Don’t click – it’s a scam
- 14:2 : Save 70% on a Course Showing You How to Invest in Crypto
- 14:2 : The US Army Is Using ‘CamoGPT’ to Purge DEI From Training Materials
- 14:2 : Crogl, armed with $30M, takes the wraps off a new AI ‘Iron Man suit’ for security analysts
- 14:2 : Federal Contractor Cybersecurity Bill Passes House
- 14:2 : SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension – Password Managers, Wallets at Risk
- 13:31 : Two Hackers Arrested For ATM Jackpotting by Deploying Malware
- 13:3 : ZITADEL IDOR Vulnerabilities Let Attackers Modify Sensitive Settings
- 13:2 : Google Announces AI-Powered Scam Detector For Android Users
- 13:2 : Nigerian Accused of Hacking Tax Preparation Firms Extradited to US
- 13:2 : Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust
- 13:2 : OpenText Adds AI Threat Detection Module to Platform
- 13:2 : EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing
- 13:2 : Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution
- 12:32 : CMA Drops Microsoft’s OpenAI Probe Amid Government Growth Focus
- 12:32 : Hackers Deploy AI Deepfake of YouTube CEO in Credential Theft Scam
- 12:32 : Sitecore Zero-Day Flaw Allows Remote Code Execution
- 12:31 : The U.S. DoJ charges 12 Chinese nationals for state-linked cyber operations
- 12:31 : The Combined Cipher Machine
- 12:31 : BadBox Botnet Powered by 1 Million Android Devices Disrupted
- 12:2 : LibreOffice Vulnerability Let Attackers Execute Arbitrary Script Using Macro URL
- 12:2 : Critical Kibana Vulnerability Let Attackers Execute Arbitrary Code
- 12:2 : Outsmarting Cyber Threats with Attack Graphs
- 12:2 : Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
- 11:32 : The Next Level: Typo DGAs Used in Malicious Redirection Chains
- 11:32 : Intel Defeats Shareholder Lawsuit Over Share Price Plunge
- 11:32 : Apache Airflow Misconfigurations Leak Login Credentials to Hackers
- 11:32 : AIceberg Gets $10 Million in Seed Funding for AI Security Platform
- 11:5 : IT Security News Hourly Summary 2025-03-06 12h : 8 posts
- 11:4 : Unmasking the new persistent attacks on Japan
- 11:4 : UK quietly scrubs encryption advice from government websites
- 11:4 : U.S. Soldier Who Hacked AT&T and Verizon Sought to Sell Stolen Data to Foreign Intelligence, Prosecutors Say
- 11:4 : Six Critical Infrastructure Sectors Failing on NIS2 Compliance
- 10:32 : Broadcom issues VMware patch alert and Microsoft Silk Typhoon Cyber Threat
- 10:32 : Two Cybercriminals Arrested for ATM Jackpotting Scheme
- 10:32 : Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access
- 10:31 : US Charges Members of Chinese Hacker-for-Hire Group i-Soon
- 10:4 : Chinese Lotus Blossom APT targets multiple sectors with Sagerunex backdoor
- 10:4 : Trojans disguised as AI: Cybercriminals exploit DeepSeek’s popularity
- 10:4 : Google Silently Tracks Android Device Even No Apps Opened by User
- 10:4 : Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks
- 9:31 : Riskified Adaptive Checkout mitigates fraud for ecommerce merchants
- 9:5 : Case Study: Gaining Internal Network Access Through Physical Penetration Testing
- 9:5 : Cybercriminals Exploit YouTubers to Spread SilentCryptoMiner on Windows Systems
- 9:5 : 7 Malicious Go Packages Target Linux & macOS to Deploy Stealthy Malware Loader
- 9:5 : Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel
- 9:4 : Android App With 220,000+ Downloads From Google Play Installs Banking Trojan
- 9:4 : SecP0 Ransomware Group Threatens Organizations to Leak Vulnerability Details
- 9:4 : Two Hackers Arrested for Stealing Taylor Swift Era Concert Tickets Worth $600k
- 9:4 : AI, Web Scraping and the Transformation of Data Privacy: What the EDPB’s Rulings Mean for Businesses
- 8:32 : New Malware ‘Desert Dexter’ Hits Over 900 Victims Worldwide
- 8:31 : Probationary firing protest, hacker names frustration, conversational scam detector
- 8:12 : SecP0 Ransomware Gang Threatens to Expose Critical Vulnerabilities
- 8:12 : LibreOffice Flaw Allows Attackers to Run Arbitrary Scripts via Macro URL
- 8:12 : Critical IDOR Vulnerabilities in ZITADEL Let Hackers Modify Key Settings
- 8:12 : Google Announces GoStringUngarbler Tool to Decrypt Go Based Malware
- 8:12 : 15 Best Patch Management Tools In 2025
- 8:11 : 50 World’s Best Cyber Security Companies – 2025
- 8:11 : BreachRx Brings Generative AI to Security Incident Management
- 7:2 : Malicious Android App on Google Play Compromises 220,000+ Devices
- 7:2 : 12 Chinese Hackers Charged For Cyber Attacks on U.S Treasury
- 7:2 : Bybit Hot Wallet Exploit for Malicious Transaction – Technical Analysis Released
- 7:2 : U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations
- 6:31 : Technical Analysis Released on Bybit Hot Wallet Exploit
- 6:31 : How to prevent data leakage in collaboration tools like Slack and Teams
- 6:7 : Silk Typhoon Targets IT Supply Chain in Evolving Cyber Campaign
- 6:6 : Typosquatted Go Packages Distribute Malware Loader Targeting Linux and macOS
- 6:6 : 41,500+ VMware ESXi Instances Vulnerable to Code Execution Attacks
- 6:6 : The CISO’s bookshelf: 10 must-reads for security leaders
- 5:32 : Google Unveils GoStringUngarbler to Crack Go-Based Malware Encryption
- 5:31 : Mad, Bad, and Dangerous to Know: Cybercriminals are More Sophisticated than Ever
- 5:31 : 89% of enterprise AI usage is invisible to the organization
- 5:9 : Cybereason CEO leaves after months of boardroom blowups
- 5:5 : IT Security News Hourly Summary 2025-03-06 06h : 5 posts
- 4:34 : Expert Q&A: How To Safely Turn AI Into Your Security Ally
- 4:34 : What are the latest trends in NHI protection for CIOs?
- 4:34 : What are the risks of unmanaged NHIs in enterprise environments?
- 4:33 : How can executive teams ensure NHI compliance with industry standards?
- 4:33 : How Unified SSO reduces complexity and enhances security
- 4:2 : BadBox Malware from Google Play Hacked 50,000+ Android Devices Using 24 Apps
- 3:31 : Simple Phish Bait: EFF Is Not Investigating Your Albion Online Forum Account
- 3:8 : ISC Stormcast For Thursday, March 6th, 2025 https://isc.sans.edu/podcastdetail/9352, (Thu, Mar 6th)
- 2:31 : The best VPN routers of 2025
- 2:5 : IT Security News Hourly Summary 2025-03-06 03h : 2 posts
- 1:9 : DShield Traffic Analysis using ELK, (Thu, Mar 6th)
- 1:8 : Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks
- 0:31 : Trump Calls On Congress To Pass The “Take It Down” Act—So He Can Censor His Critics
- 23:5 : IT Security News Hourly Summary 2025-03-06 00h : 3 posts
- 23:2 : Ex-NSA grandee says Trump’s staff cuts will ‘devastate’ America’s national security