132 posts were published in the last hour
- 21:32 : Friday Squid Blogging: Live Colossal Squid Filmed
- 21:2 : How Security Analysts Detect and Prevent DNS Tunneling Attack In Enterprise Networks
- 21:2 : How To Detect Obfuscated Malware That Evades Static Analysis Tools
- 21:2 : Identity as the new perimeter: National Oilwell Varco’s approach to stopping the 79% of attacks that are malware-free
- 20:5 : IT Security News Hourly Summary 2025-04-18 21h : 5 posts
- 20:2 : BSidesLV24 – Common Ground – One Port to Serve Them All – Google GCP Cloud Shell Abuse
- 19:32 : ASUS routers with AiCloud vulnerable to auth bypass exploit
- 19:31 : Dems fret over DOGE feeding sensitive data into random AI
- 19:2 : How do cybercriminals steal credit card information?
- 19:2 : What is COMSEC? Training, Updates, Audits & More
- 18:32 : CISA Statement on CVE Program
- 18:31 : TSMC Denies Talks With Intel Over Chipmaking Joint Venture
- 18:31 : 2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
- 18:2 : BSidesLV24 – Common Ground – Beyond Whack-a-Mole: Scaling Vulnerability Management by Embracing Automation
- 18:2 : CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability
- 17:32 : Cyber Risks Associated with Adoption of Generative AI Tools
- 17:5 : IT Security News Hourly Summary 2025-04-18 18h : 7 posts
- 17:2 : EU to provide burner phones to staff to banish Security concerns
- 17:2 : That Google email look real? Don’t click – it might be scam. Here’s how to tell
- 17:2 : Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN
- 17:2 : Oracle hopes talk of cloud data theft dies off. CISA just resurrected it for Easter
- 16:32 : The Shadow AI Surge: Study Finds 50% of Workers Use Unapproved AI Tools
- 16:31 : Over 1.6 Million Affected in Planned Parenthood Lab Partner Data Breach
- 16:2 : Try these strategies to modernize Windows workloads
- 16:2 : Text scams grow to steal hundreds of millions of dollars
- 15:32 : ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform
- 15:32 : SpyNote Malware Targets Android Users with Fraudulent Google Play Pages
- 15:32 : Fourlis Group Confirms €20 Million Loss from IKEA Ransomware Attack
- 15:32 : Hackers Target WordPress Plugin Just Hours After Security Weakness Revealed
- 15:32 : Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
- 15:2 : U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents
- 15:2 : How to Conduct a Cloud Security Assessment
- 15:2 : Securing the Digital Transformation Journey – What CISOs Must Consider
- 15:2 : How Generative AI is Changing Red Team Tactics
- 14:32 : Think GeoGuessr is fun? Try using ChatGPT to guess locations in your photos
- 14:5 : IT Security News Hourly Summary 2025-04-18 15h : 14 posts
- 14:2 : Building a Security First Culture – Advice from Industry CISOs
- 14:2 : Availity eyes GitLab Duo with Amazon Q for code refactoring
- 14:2 : Fortinet Ends SSL-VPN Support From 7.6.3 Onwards!
- 14:2 : How to Build a Security Champions Program Within Your Organization
- 14:2 : The Zoom attack you didn’t see coming
- 13:32 : Data Is on the Menu ? and AI?s Market Price Is High
- 13:32 : Employee Spotlight: Getting to Know Henrique Sauer
- 13:32 : CapCut copycats are on the prowl
- 13:32 : Fortinet and the Joint Cyber Defense Collaborative: Celebrating Two Years of Progress
- 13:32 : ATLSecCon 2025: Security Readiness Means Human Readiness
- 13:32 : Krebs Steps Down from SentinelOne, Vows to Fight Trump Attack
- 13:31 : ESET Security Tool Vulnerability Facilitates TCESB Malware Deployment
- 13:3 : Apple iPhone Shipments In China Slide, As Cook Talks With Trump Official
- 13:3 : Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution
- 13:3 : State Sponsored Hackers now Widely Using ClickFix Attack Technique in Espionage Campaigns
- 13:3 : Microsoft Prevents Billions of Dollars in Fraud and Scams
- 13:2 : Zero Trust Isn’t Just for Networks: Applying Zero-Trust Principles to CI/CD Pipelines
- 13:2 : How to Use Passive DNS To Trace Hackers Command And Control Infrastructure
- 13:2 : 6,000,000+ Installed Chrome Extensions Can Execute Remote Commands on User’s Browser
- 13:2 : Beware! Android Spyware ‘SpyMax’ Gain Total Control of Your Android Phone
- 13:2 : Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry
- 13:2 : Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released
- 12:33 : Why Your Castle Isn’t Enough: Security Must Look Beyond the Perimeter
- 12:33 : Gain Legends International Suffers Security Breach – Customers Data Stolen
- 12:32 : Unlock the Power of Financial Quantification of Cyber Risk
- 12:32 : Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
- 12:2 : When Security Gets Too Complicated: A Return to Basics
- 12:2 : XorDDoS Malware Upgrade Enables Creation of Advanced DDoS Botnets
- 12:2 : Researchers Uncover Stealthy Tactics and Techniques of StrelaStealer Malware
- 12:2 : PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation
- 12:2 : SpyMax Android Spyware: Full Remote Access to Monitor Any Activity
- 12:2 : KeyPlug Malware Server Leak Exposes Fortinet Firewall and VPN Exploitation Tools
- 12:2 : Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- 11:32 : Cybersecurity Talent Gap
- 11:32 : U.S. CISA adds Apple products and Microsoft Windows NTLM flaws to its Known Exploited Vulnerabilities catalog
- 11:32 : How Security Analyst Using Memory Forensics Tools To Enhance Advanced Incident Response
- 11:32 : How To Use YARA Rules To Identify Financial Sector Targeted Attacks
- 11:31 : Web Server Hardening Best Practices For Organizations Across Industries
- 11:31 : In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged
- 11:5 : IT Security News Hourly Summary 2025-04-18 12h : 7 posts
- 11:2 : AMD Warns Of $800m Charge From US Chip Restrictions On China
- 11:2 : Defending Against Web API Exploitation With Modern Detection Strategies
- 11:2 : 16-31 December 2024 Cyber Attacks Timeline
- 11:2 : Cy4Data Labs Raises $10 Million to Secure Data in Use
- 10:31 : How To Integrate MITRE ATT&CK Into Your SOC For Better Threat Visibility
- 10:31 : Ahold Delhaize Confirms Data Stolen in Ransomware Attack
- 10:3 : U.S DOGE Allegedly Hacked – Fed Whistleblower Leaked Most Disturbing Documents
- 10:3 : New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network
- 10:2 : CVE fallout: The splintering of the standard vulnerability tracking system has begun
- 10:2 : [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
- 9:32 : Over 6 Million Chrome Extensions Found Executing Remote Commands
- 9:32 : Global Zoom Outage Linked to Server Block by GoDaddy Registry
- 9:32 : Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch
- 9:2 : Breaking the Cycle: Prioritizing Recovery Over Ransom Payments
- 9:2 : PoC Released for Critical Erlang/OTP SSH RCE Vulnerability
- 9:2 : Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit
- 9:2 : CISA Issues Alert on Actively Exploited Apple 0-Day Vulnerabilities
- 9:2 : CISA Warns of Active Exploitation of Windows NTLM Vulnerability
- 8:32 : Fresh Windows NTLM Vulnerability Exploited in Attacks
- 8:31 : Understanding Credential Stuffing: A Growing Cybersecurity Threat
- 8:31 : Midnight Blizzard Targets European Diplomats with Wine Tasting Phishing Lure
- 8:5 : IT Security News Hourly Summary 2025-04-18 09h : 6 posts
- 8:2 : Entertainment venue management firm Legends International disclosed a data breach
- 8:2 : PKWARE Quantum Readiness Assessment secures data from quantum computing threats
- 8:2 : Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
- 7:33 : Security Gaps Widen: A Perfect Storm for Insider Threats
- 7:33 : Cyberthreat sharing law renewal, APTs love ClickFix, GoDaddy mutes Zoom
- 6:32 : United Health offers Ransomware Loans
- 6:32 : Gaps In Encryption Create Exploitable Vulnerabilities
- 6:32 : CISA Warns of Multiple Apple 0-day Vulnerabilities Actively Exploited in Attacks
- 6:32 : Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats
- 6:31 : The UK’s phone theft crisis is a wake-up call for digital security
- 6:31 : The Secret CISO: Insights and Reflections from Cybersecurity Leaders
- 6:2 : Unlocking Near-Zero Downtime Patch Management With High Availability Clustering
- 5:32 : The Urgent Need for Tokenizing Personally Identifiable Information
- 5:31 : When ransomware strikes, what’s your move?
- 5:31 : Securing digital products under the Cyber Resilience Act
- 5:5 : IT Security News Hourly Summary 2025-04-18 06h : 1 posts
- 5:2 : Man Helped Individuals in China Get Jobs Involving Sensitive US Government Projects
- 5:2 : CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
- 4:32 : PoC Exploit Released for Erlang/OTP SSH Remote Code Execution Vulnerability
- 4:31 : 17,000+ Fortinet Devices Compromised in Massive Hack via Symbolic Link Exploit
- 4:31 : Widely available AI tools signal new era of malicious bot activity
- 4:2 : New infosec products of the week: April 18, 2025
- 2:5 : IT Security News Hourly Summary 2025-04-18 03h : 3 posts
- 2:2 : ISC Stormcast For Friday, April 18th, 2025 https://isc.sans.edu/podcastdetail/9414, (Fri, Apr 18th)
- 0:32 : The Future of SSL Certificate Management: Adapting to Shortened Renewal Periods
- 0:31 : Securing Cloud Data: A Relief for CFOs
- 0:31 : How to Ensure Security in Cloud Compliance
- 23:31 : Google’s Gemini 2.5 Flash introduces ‘thinking budgets’ that cut AI costs by 600% when turned down
- 23:5 : IT Security News Hourly Summary 2025-04-18 00h : 4 posts
- 23:2 : ISACA and Chartered IIA pen open letter to UK Government urging swift audit reform to build digital resilience
- 23:2 : Entrust Announces all-in-one Cryptographic Security Platform
- 23:2 : Cut CAPTCHA Fatigue & Boost Conversions with Device Check
- 22:55 : IT Security News Daily Summary 2025-04-17
- 22:31 : BSidesLV24 – Common Ground – Security for AI Basics – Not by ChatGPT