175 posts were published in the last hour
- 21:8 : IPVanish vs NordVPN: Compare Features and Price
- 20:34 : Detecting and Mitigating the Apache Camel Vulnerabilities
- 20:34 : U.S. CISA adds six Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog
- 20:34 : In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying
- 20:7 : Use Genuine Wordfence and Stay Secure, Stay Supported, and Avoid Malware, Vulnerabilities and Backdoors
- 20:7 : PostgreSQL Exploit
- 20:5 : IT Security News Hourly Summary 2025-03-12 21h : 9 posts
- 19:32 : The people in Elon Musk’s DOGE universe
- 19:32 : Microsoft Patch Tuesday security updates for March 2025 fix six actively exploited zero-days
- 19:11 : FTC Seeks Delay To Amazon Trial, Citing Staff, Cash Shortfalls
- 19:10 : Nous Research just launched an API that gives developers access to AI models that OpenAI and Anthropic won’t build
- 19:10 : Patch Tuesday: Microsoft Fixes 57 Security Flaws – Including Active Zero-Days
- 19:10 : Cyber Trust Mark explained: Everything you need to know
- 19:10 : No, Elon — X DDoS was NOT by Ukraine
- 19:10 : Polish Space Agency Faces Cyberattack, Takes IT Systems Offline
- 19:10 : North Korean Hackers Exploit ZIP Files in Sophisticated Cyber Attacks
- 18:34 : Mobile Browser Market Not Working Well – CMA
- 18:7 : Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks
- 18:7 : How to deal with unmanaged devices in the enterprise
- 18:7 : Tycoon2FA Phishkit Updates Tactics with PDF Lures & Redirects
- 18:6 : EFF Stands with Perkins Coie and the Rule of Law
- 18:6 : Security Validation Firm Pentera Banks $60M Series D
- 17:34 : SSRF Exploitation Surge Highlights Evolving Cyberthreats
- 17:34 : How to Use Signal Encrypted Messaging
- 17:34 : CISA and Partners Release Cybersecurity Advisory on Medusa Ransomware
- 17:34 : #StopRansomware: Medusa Ransomware
- 17:34 : Update your iPhone now: Apple patches vulnerability used in “extremely sophisticated attacks”
- 17:34 : ISACA London Chapter’s E-Voting System Comes Under Scrutiny
- 17:11 : The Violent Rise of ‘No Lives Matter’
- 17:11 : BSides Exeter 2024 – Purple Track – The Ransomware Negotiation Dilemma: The Pros And Cons Of Negotiation Strategies
- 17:11 : Trump Administration Shakes Up CISA with Staff and Funding Cuts
- 17:11 : iOS 18.3.2 Patches Actively Exploited WebKit Vulnerability
- 17:5 : IT Security News Hourly Summary 2025-03-12 18h : 11 posts
- 16:32 : Trump Buys A Tesla, But Not Allowed To Drive It
- 16:32 : Chinese Cyber Espionage Group UNC3886 Backdoored Juniper Routers
- 16:32 : That weird CAPTCHA could be a malware trap – here’s how to protect yourself
- 16:32 : What Is SCM (Security Configuration Management)?
- 16:32 : How to Use EDR for Advanced Threat Hunting
- 16:32 : MirrorFace APT Hackers Exploited Windows Sandbox & Visual Studio Code Using Custom Malware
- 16:32 : Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers
- 16:31 : Goodbye passwords? Enterprises ramping up passkey adoption
- 16:10 : Garantex administrator arrested in India under extradition law
- 16:10 : Anchorage Police Department: AI-Generated Police Reports Don’t Save Time
- 16:10 : Tata Technologies Cyberattack: Hunters International Ransomware Gang Claims Responsibility for 1.4TB Data Theft
- 15:34 : T Mobile enforces news ‘Security’ feature for employees
- 15:34 : TSMC Discusses Intel Foundry Joint Venture With Other Firms
- 15:34 : Is your Pixel fingerprint scanner missing after the March update? Here’s the quick fix
- 15:34 : A Guide to Security Investments: The Anatomy of a Cyberattack
- 15:34 : Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits
- 15:8 : Scans for VMWare Hybrid Cloud Extension (HCX) API (Log4j – not brute forcing), (Wed, Mar 12th)
- 15:7 : Best Practices and Risks Considerations in Automation like LCNC and RPA
- 15:7 : DCRat Malware Via YouTube Attacking Users To Steal Login Credentials
- 15:7 : Zoom Patches 4 High-Severity Vulnerabilities
- 15:7 : Persistent Increase in Ransomware Attacks Raises Global Security Concerns
- 15:7 : Quantum Computers Threaten to Breach Online Security in Minutes
- 15:7 : OpenSSL 3.5 Alpha Release Announcement
- 14:32 : Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
- 14:32 : Indetectable – A Toolkit For Reverse Engineering And Malware Analysis
- 14:32 : World Backup Day: Pledge to protect your digital life
- 14:32 : The dark side of sports betting: How mirror sites help gambling scams thrive
- 14:32 : Sysdig Report Details Scope of Cybersecurity Challenges
- 14:32 : Machine Identities Outnumber Humans Increasing Risk Seven-Fold
- 14:9 : Scans for VMWare Hybrid Cloud Extension (HCX) API (Brutefording Credentials?), (Wed, Mar 12th)
- 14:9 : Most of the funds in the biggest crypto heist ever have been laundered
- 14:9 : CYREBRO’s AI-Native MDR Platform Earns Silver at the 2025 Globee Cybersecurity Awards
- 14:9 : Expired Juniper routers find new life – as Chinese spy hubs
- 14:9 : NVIDIA Riva Vulnerabilities Let Attackers Escalate Privileges
- 14:8 : PHP XXE Injection Vulnerability Let Attackers Read Config Files & Private Keys
- 14:8 : Chinese Hackers Implant Backdoor Malware on Juniper Routers
- 14:5 : IT Security News Hourly Summary 2025-03-12 15h : 18 posts
- 13:38 : 2025-03-03: Three days of scans and probes and web traffic hitting my web server
- 13:38 : The Role of WAF in Fintech & Financial Services
- 13:38 : Update your iPhone now: iOS 18.3.2 patches a serious web browser bug
- 13:38 : Critical Windows Remote Desktop Services Vulnerability Lets Attackers Execute Malicious Code
- 13:38 : CISA Warns of Windows NTFS Vulnerability Actively Exploited to Access Sensitive Data
- 13:38 : New Fully Undetected Anubis Malware Let Hackers Execute Remote Commands
- 13:9 : AI is Already Enhancing the Value of Security Validation
- 13:9 : The Intersection of Digital Credit Solutions and Cybersecurity: Protecting Consumer Data in the Automotive Finance Industry
- 13:9 : Amazon, Google, Meta Pledge Support To Triple Nuclear Capacity
- 13:9 : CISA Issues Advisory on Windows NTFS Flaw Enabling Local Code Execution
- 13:9 : MirrorFace APT Using Custom Malware To Exploited Windows Sandbox & Visual Studio Code
- 13:9 : This is the FBI, open up. China’s Volt Typhoon is on your network
- 13:9 : Pentera nabs $60M at a $1B+ valuation to build simulated network attacks to train security teams
- 13:9 : China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days
- 13:9 : Azure AI Services: Transforming Business Operations with Intelligent Solutions
- 13:9 : Maximising network penetration testing’s effectiveness
- 13:9 : Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated Risk Remediation
- 13:9 : Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
- 12:34 : Northvolt Files For Bankruptcy In Sweden
- 12:34 : CISA Issues Security Alert on Windows NTFS Exploit Risk
- 12:34 : Trump Administration Halts Funding for Two Cybersecurity Efforts, Including One for Elections
- 12:9 : CISA Warns of Exploitable Fast FAT Vulnerability in Microsoft Windows
- 12:9 : PowerSchool Portal Compromised Months Before Massive Data Breach
- 12:9 : NIST selects HQC as backup algorithm for post-quantum encryption
- 12:9 : Pentesters: Is AI Coming for Your Role?
- 11:34 : The Rising Threat of API Attacks: How to Secure Your APIs in 2025
- 11:34 : CISA Warns of Microsoft Windows Win32 Kernel Subsystem Vulnerability
- 11:34 : China, Russia, Iran, and North Korea Intelligence Sharing
- 11:34 : Webinar Today: Protecting Executives and Enterprises from Digital, Narrative and Physical Attacks
- 11:12 : March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days
- 11:12 : Microsoft Patch Tuesday March 2025 – 6 Actively Exploited Zero-Days & 57 Vulnerabilities Are Fixed
- 11:11 : Java Axios Package Vulnerability Threatens Millions of Servers with SSRF Exploit
- 11:11 : DCRat Malware Spreading via YouTube to Steal Login Credentials
- 11:11 : Fully Undetected Anubis Malware Enables Hackers to Execute Remote Commands
- 11:11 : Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account
- 11:11 : Android devices track you before you even sign in
- 11:11 : US Hasn’t Determined Who Was Behind Cyberattack That Caused Outage on Musk’s X
- 11:5 : IT Security News Hourly Summary 2025-03-12 12h : 5 posts
- 10:34 : PHP XXE Injection Vulnerability Allows Attackers to Access Config Files & Private Keys
- 10:34 : New Ballista Botnet spreads using TP-Link flaw. Is it an Italian job?
- 10:34 : UK must pay cyber pros more than its Prime Minister, top civil servant says
- 10:34 : URGENT: Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days
- 10:34 : Microsoft Patches a Whopping Seven Zero-Days in March
- 10:3 : Over 400 IPs Actively Exploiting Multiple SSRF Vulnerabilities in the Wild
- 10:3 : Hackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts
- 10:3 : Cybersecurity Can’t Wait: Modern Enterprises Must Adapt
- 10:2 : North Korean government hackers snuck spyware on Android app store
- 10:2 : ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens
- 10:2 : Top 6 DMARC Analyzers in 2025
- 10:2 : UK Cybersecurity Sector Revenue Grows 12% to Top £13bn
- 9:36 : Enhanced XCSSET Malware Targets macOS Users with Advanced Obfuscation
- 9:36 : Chinese Hackers Deploy New ‘Squidoor’ Malware to Target Global Organizations
- 9:7 : From Labels to Context: The Evolution of Data Classification with Semantic Intelligence and Why Terminology Matters
- 9:6 : New XCSSET Malware Attacking macOS Users With Enhanced Obfuscation
- 9:6 : Jaguar Land Rover Allegedly Hacked – Threat Actor Leaked 700 Internal Documents
- 8:34 : The Future of Access Control: Why It’s Time to Ditch the Patchwork Approach
- 8:34 : Incident response analyst report 2024
- 8:34 : Top Kubernetes Threats in 2024 And How Amazon EKS Mitigates Them
- 8:34 : Navigating Cyber Security Implementation Challenges in SMBs
- 8:34 : The Rise Of AI-Powered Cyber Threats: How Adversaries Are Using “Good Enough” Tactics to Outsmart Defenders
- 8:34 : 2025 Cybersecurity Trends and Predictions: Adapting To An Era Of Evolving Threads And Technology
- 8:15 : From a Checked Box to Competitive Edge: The Evolution of Data Privacy
- 8:15 : M2M Security Market: Endless Opportunities to Ensure a Secured Future
- 8:15 : Jaguar Land Rover Allegedly Hacked – 700 Internal Documents Including Source Code Leaked
- 8:15 : Apache Camel Vulnerability Let Attackers Inject Arbitrary Headers – PoC Exploit Released
- 8:15 : Google Warned Chromecast Owners Not to Hit Factory Reset
- 8:15 : Beware! AI-Assisted Fake GitHub Repositories Steal Sensitive Data Including Login Credentials
- 8:5 : IT Security News Hourly Summary 2025-03-12 09h : 6 posts
- 7:34 : CISA Warns of Windows NTFS Vulnerability Exploited for Data Theft
- 7:34 : Jaguar Land Rover Allegedly Hit by Cyberattack, Hacker Claims
- 7:34 : New CISA head, Ballista botnet, PowerSchool breach report
- 7:6 : No, there isn’t a world ending Apache Camel vulnerability
- 7:6 : X Under Siege: Massive Cyberattack Sparks Widespread Outages as Experts Call Musk’s Ukraine Claims ‘Garbage’
- 7:6 : Gone in 120 Seconds: TRUMP Coin Phishing Lure Delivers RAT
- 6:31 : NetBird: Open-source network security
- 6:31 : The X Attack – More Information Surfaces: Cyber Security Today for Wednesday, March 12, 2024
- 6:6 : Ransomware gangs infiltrating through vulnerable Perimeter Security Appliances
- 6:6 : How Generative AI Can Strengthen Corporate Cybersecurity
- 6:6 : Zoom Client Security Flaws Could Lead to Data Breaches
- 5:32 : The Intersection of Cybersecurity and Regulatory Compliance – Preparing for Global Standards
- 5:32 : CISA Alerts on Active Exploitation of Microsoft Windows MMC Vulnerability
- 5:32 : Microsoft Copilot Spoofing: A New Phishing Vector
- 5:32 : Defending against EDR bypass attacks
- 5:32 : Burnout in cybersecurity: How CISOs can protect their teams (and themselves)
- 5:7 : Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks
- 5:5 : IT Security News Hourly Summary 2025-03-12 06h : 2 posts
- 4:36 : Tata Technologies’ data leaked by ransomware gang
- 4:6 : Deepfake CEO Video Rocks YouTube
- 3:31 : Choose your own Patch Tuesday adventure: Start with six zero-day fixes, or six critical flaws
- 3:31 : CISA worker says 100-strong red team fired after DOGE cancelled contract
- 2:36 : Are Threat Groups Belsen and ZeroSevenGroup Related?
- 2:7 : ISC Stormcast For Wednesday, March 12th, 2025 https://isc.sans.edu/podcastdetail/9360, (Wed, Mar 12th)
- 2:7 : Telecom Giant NTT Admits Hackers Accessed 18,000 Corporate Customers Data
- 2:7 : Apache Pinot Vulnerability Let Attackers Bypass Authentication
- 2:7 : New Botnet Dubbed “Eleven11bot” Hacked 30,000 Webcams
- 2:7 : SolarWinds Web Help Desk Vulnerability Let Hackers Access Stored Passwords – PoC Released
- 2:6 : Microsoft March 2025 Patch Tuesday: Fixes for 57 Vulnerabilities & 6 Actively Exploited Zero-Days
- 2:6 : CISA worker says 100-strong Red Team fired after DOGE cancelled contract
- 2:5 : IT Security News Hourly Summary 2025-03-12 03h : 1 posts
- 1:33 : Choose your own Patch Tuesday adventure: Start with six zero day fixes, or six critical flaws
- 0:31 : Lazarus Group Hid Backdoor in Fake npm Packages in Latest Attack
- 0:10 : Microsoft: 6 Zero-Days in March 2025 Patch Tuesday
- 23:36 : Apple fixed the third actively exploited zero-day of 2025
- 23:36 : Unlock the Power of ServiceNow CMDB with Grip Security
- 23:5 : IT Security News Hourly Summary 2025-03-12 00h : 5 posts