136 posts were published in the last hour
- 22:36 : Update Your iPhone Now to Fix Safari Security Flaw
- 22:36 : ClickFix: How to Infect Your PC in Three Easy Steps
- 21:36 : Friday Squid Blogging: SQUID Band
- 21:3 : High Stakes, Hidden Costs: Examining the Fallout of the U.S. Disbanding Its Public-Private Cyber Alliances
- 21:2 : Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations
- 21:2 : Will Cisco’s Free Tech Training for 1.5M People Help Close EU’s Skills Gap?
- 21:2 : BSides Exeter 2024 – Blue Track – DFIR – Tracking TTP Changes Of SocGhoulish
- 21:2 : Announcing the winners of the Adaptive Prompt Injection Challenge (LLMail-Inject)
- 21:2 : Week in Review: ONCD dominates cyber, undocumented Bluetooth commands, DoJ Google breakup
- 20:34 : NIST SP 800-171 Rev 2 vs Rev 3: What’s The Difference?
- 20:5 : IT Security News Hourly Summary 2025-03-14 21h : 4 posts
- 19:34 : OpenAI’s strategic gambit: The Agents SDK and why it changes everything for enterprise AI
- 19:18 : Symantec Demonstrates OpenAI’s Operator Agent in PoC Phishing Attack
- 19:18 : How to secure AI infrastructure: Best practices
- 19:17 : AT&T technician Mark Klein, who exposed secret NSA spying, dies
- 18:32 : New Context Compliance Attack Jailbreaks Most of The Major AI Models
- 18:32 : Online Fraud Emerges as a Major Global Challenge
- 18:32 : Cybercrime in 2025: AI-Powered Attacks, Identity Exploits, and the Rise of Nation-State Threats
- 18:32 : Undocumented ESP32 Commands Pose Security Risks, Researchers Warn
- 18:9 : Imperva Protects Against the Apache Camel Vulnerabilities
- 18:9 : Symantec Uses OpenAI Operator to Show Rising Threat of AI Agents
- 17:34 : Phishing Campaign Impersonates Booking.com, Plants Malware
- 17:5 : Virgin Media O2 To Invest £700m To ‘Transform’ 4G, 5G Network
- 17:5 : IT Security News Hourly Summary 2025-03-14 18h : 8 posts
- 16:36 : Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers
- 16:36 : Upcoming Speaking Engagements
- 16:36 : Key Cybersecurity Considerations for Financial Institutions
- 16:36 : Black Basta Ransomware Attack Edge Network Devices With Automated Brute Force Attacks
- 16:36 : Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges
- 16:9 : Tesla Cybertruck Deliveries On Hold Due To Faulty Side Trim
- 16:9 : 51 seconds to breach: How CISOs are countering AI-driven, lightning-fast deepfake, vishing and social engineering attacks
- 16:9 : BSides Exeter 2024 – Blue Track – DFIR – Digital Hostage: Navigating Ransomware Realities
- 15:37 : Cyber Attack News: Top Headlines Trending on Google
- 15:37 : AWS SNS Exploited for Data Exfiltration and Phishing Attacks
- 15:37 : Research on iOS apps shows widespread exposure of secrets
- 15:37 : Why Apple’s RCS encryption move is a privacy game-changer for your texts
- 15:37 : LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S.
- 15:37 : Hackers Allegedly Selling 3.17 Million Records of Honda Cars India Customers
- 15:37 : Quantifying cyber risk strategies to resonate with CFOs and boards
- 15:36 : GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging
- 15:2 : Apple Plots Live Translation Option For AirPods – Report
- 15:2 : Accused LockBit ransomware developer extradited to the US
- 15:2 : Reading the Data Breach Tea Leaves: Preventing Data Exfiltration Before it Happens
- 14:33 : Stop Wasting Time Writing Code for APIs
- 14:33 : Developer of LockBit ransomware gets extradited to the United States
- 14:32 : Strengthening Security in the Cloud Era Requires Network Visibility and Understanding
- 14:32 : FCC Takes on China Threats with New National Security Council
- 14:32 : Savings and Security: The Dual Benefits of FinOps and the Cloud
- 14:32 : Cyberattacks on Key Vendors Trigger Widespread Disruptions Across Industries
- 14:32 : Terror Ourfits Are Using Crypto Funds For Donations in India: TRM Labs
- 14:32 : LockBit Ransomware Developer Extradited to US
- 14:32 : Join Us in Forming the Technical Advisory Committees (TACs)
- 14:5 : IT Security News Hourly Summary 2025-03-14 15h : 10 posts
- 14:4 : New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
- 14:4 : Critical ruby-saml Vulnerabilities Let Attackers Bypass Authentication
- 14:4 : Cisco Warns of IOS XR Software Vulnerability That Let Attackers Trigger DoS condition
- 14:4 : Apple’s alleged UK encryption battle sparks political and privacy backlash
- 14:4 : Cybersecurity Challenges in the Telecom Sector: Protecting Data and Infrastructure
- 13:9 : Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware
- 13:9 : Beyond the Cloud | How Edge Computing is Unlocking IoT’s Full Potential
- 13:9 : ‘Untrusted device’ errors on Chromecast? Google is rolling out a fix
- 13:9 : US lawmakers urge UK spy court to hold Apple ‘backdoor’ secret hearing in public
- 13:9 : In Other News: Swiss Breach Disclosure Rules, ESP32 Chip Backdoor Disputed, MassJacker
- 12:32 : New Context Compliance Exploit Jailbreaks Major AI Models
- 12:32 : DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware
- 12:32 : Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks
- 12:32 : SuperBlack Ransomware operators exploit Fortinet Firewall flaws in recent attacks
- 12:32 : ClickFix Widely Adopted by Cybercriminals, APT Groups
- 12:7 : Microsoft Warns of Cyber Attack Mimic Booking .com To Deliver Password Stealing Malware
- 12:7 : Lazarus Hackers Exploiting IIS Servers to Deploy ASP-based Web Shells
- 12:7 : RSA Conference Playbook: Smart Strategies from Seasoned Attendees
- 12:7 : Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right
- 12:6 : Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
- 11:34 : TP-Link Router Botnet
- 11:12 : Critical ruby-saml Vulnerabilities Allow Attackers to Bypass Authentication
- 11:12 : Lazarus Group Weaponizes IIS Servers for Deploying Malicious ASP Web Shells
- 11:11 : New kids on the ransomware block channel Lockbit to raid Fortinet firewalls
- 11:11 : UK’s secret iCloud backdoor order triggers civil rights challenge
- 11:11 : How Security Teams Should Respond to the Rise in Vulnerability Disclosures
- 11:11 : CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits
- 11:11 : United States Charges Developer of LockBit Ransomware Group
- 11:11 : Fraudsters Impersonate Clop Ransomware to Extort Businesses
- 11:5 : IT Security News Hourly Summary 2025-03-14 12h : 8 posts
- 10:33 : Off the Beaten Path: Recent Unusual Malware
- 10:33 : A New Era of Attacks on Encryption Is Starting to Heat Up
- 10:33 : 9 PDQ Deploy Alternatives for Better Patch Management
- 10:33 : Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks
- 10:33 : Cybersecurity Industry Falls Short on Collaboration, Says Former GCHQ Director
- 10:9 : Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware
- 10:9 : New Campaign Attacking PyPI Users to Steal Sensitive Data Including Cloud Tokens
- 10:8 : Microsoft365 Themed Attack Leveraging OAuth Redirection for Account Takeover
- 9:4 : Corero Network Security expands AI capabilities across its portfolio
- 8:32 : Decrypting Linux/ESXi Akira Ransomware Files Without Paying Ransomware
- 8:6 : U.S. Charges LockBit Ransomware Developer in Cybercrime Crackdown
- 8:5 : IT Security News Hourly Summary 2025-03-14 09h : 4 posts
- 7:34 : CISA Releases Security Advisory on 13 Industrial Control System Threats
- 7:34 : New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
- 7:34 : Medusa ransoms infrastructure, Google breakup sought, more Booking.com phishing
- 7:34 : Cyber Security Madness In The US Government: Cyber Security Today for March 14, 2025
- 6:37 : New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft
- 6:36 : DeepSeek Can Be Abused to Create Malware
- 6:36 : Microsoft Uncovers New XCSSET macOS Malware Variant Targeting Xcode Projects
- 6:36 : SuperBlack Actors Exploiting Two Fortinet Vulnerabilities to Deploy Ransomware
- 6:9 : FBI alerts Gmail users over Medusa Ransomware
- 6:9 : Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers
- 6:9 : Volt Typhoon Found Inside Massachusetts Electric Utility for Nearly a Year
- 6:9 : OpenAI Pushes for Federal-Only AI Regulation
- 6:9 : Top 5 threats keeping CISOs up at night in 2025
- 6:9 : OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
- 5:32 : Guardz Reveals Details of an Ongoing Phishing Campaign Exploiting Microsoft 365 Infrastructure
- 5:32 : New Cyber Attack Targets PyPI Users to Steal Cloud Tokens and Sensitive Data
- 5:32 : NHS Investigates Alleged API Flaw That May Have Exposed Patient Data
- 5:32 : Top 10 Best Cyber Attack Simulation Tools – 2025
- 5:32 : One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild
- 5:31 : New infosec products of the week: March 14, 2025
- 5:31 : 94% of Wi-Fi networks lack protection against deauthentication attacks
- 5:13 : What role do APIs play in automating NHI management?
- 5:13 : What security considerations should I keep in mind for NHI automation?
- 5:13 : How can I integrate automated NHI auditing into our pipeline?
- 5:5 : IT Security News Hourly Summary 2025-03-14 06h : 3 posts
- 4:34 : What is QR Code Phishing? (Quishing) – Attack & Prevention Guide in 2025
- 4:34 : 5 Ways to Prepare Your Data Estate for Copilot Adoption and Agentic AI
- 4:9 : Blockchain and cyber security
- 3:32 : Cybersecurity in the Age of Scarcity
- 3:6 : Accelerating Mergers and Acquisitions with Zero Trust Network Access (ZTNA)
- 3:6 : The DevOps Threats Unwrapped: over 502 incidents and 955 hours of disruptions in GitHub, GitLab, Atlassian, and Azure DevOps
- 2:9 : ISC Stormcast For Friday, March 14th, 2025 https://isc.sans.edu/podcastdetail/9364, (Fri, Mar 14th)
- 1:2 : AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware
- 0:32 : U.S. CISA adds Apple products and Juniper Junos OS flaws to its Known Exploited Vulnerabilities catalog
- 0:32 : Check Point Software Celebrates Continued Partner Success at UK Partner Awards
- 0:32 : Cold Wallets vs. Hot Wallets: Which Offers Better Security?
- 0:32 : Strengthening the Human Firewall: Prioritising Mental Health in Cybersecurity Teams
- 0:6 : Dems ask federal agencies for reassurance DOGE isn’t feeding data into AI willy-nilly
- 23:32 : EFF to NSF: AI Action Plan Must Put People First
- 23:32 : Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware
- 23:5 : IT Security News Hourly Summary 2025-03-14 00h : 2 posts