210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-02-16
- 20:5 : IT Security News Hourly Summary 2025-02-16 21h : 1 posts
- 19:9 : This open text-to-speech model needs just seconds of audio to clone your voice
- 18:31 : AI Self-Replication: Scientists Warn of Critical “Red Line”
- 18:7 : Two Russian Hackers Arrested for Large-Scale Ransomware Attacks
- 18:7 : XE Group Rebrands Its Cybercrime Strategy by Targeting Supply Chains
- 18:7 : RBI Launches “bank.in” Domain to Combat Digital Banking Scam
- 15:6 : The Multi-Layer Complexity of Cybersecurity for The Automotive Supply Chain
- 15:6 : Storm-2372 used the device code phishing technique since August 2024
- 14:31 : Keeping Your Cloud Data Safe: What You Need to Know
- 14:13 : The Role of AI in DFIR
- 14:5 : IT Security News Hourly Summary 2025-02-16 15h : 1 posts
- 13:7 : How Amazon Prime Day Scams Are Getting Smarter and How Can You Protect Yourself
- 11:6 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 33
- 9:31 : Storenvy – 11,052,071 breached accounts
- 9:31 : Week in review: Microsoft fixes two actively exploited 0-days, PAN-OS auth bypass hole plugged
- 6:31 : SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild Following PoC Release
- 2:31 : A Deadly Unserious 419?
- 2:13 : Security Affairs newsletter Round 511 by Pierluigi Paganini – INTERNATIONAL EDITION
- 23:5 : IT Security News Hourly Summary 2025-02-16 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-02-15
- 20:5 : IT Security News Hourly Summary 2025-02-15 21h : 1 posts
- 20:4 : DEF CON 32 – Fitness of Physical Red Teamers
- 18:31 : Cybercriminals Intensify Attacks on Password Managers
- 18:11 : U.S. CISA adds Apple iOS and iPadOS and Mitel SIP Phones flaws to its Known Exploited Vulnerabilities catalog
- 18:11 : Rising Robocall Cyber Threat and Essential Protection Strategies
- 18:11 : Apple Patches Zero-Day Flaw allowing Third-Party Access to Locked Devices
- 18:11 : SMS Toll Scam Tricks Victims Into Activating Phishing Links
- 17:31 : Losing in Love: The $1 billion Romance Scam Industry
- 17:5 : IT Security News Hourly Summary 2025-02-15 18h : 2 posts
- 16:15 : Attackers exploit recently disclosed Palo Alto Networks PAN-OS firewalls bug
- 16:15 : Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed
- 15:11 : What is an encryption backdoor?
- 15:11 : Complexity: The Silent Killer of Cybersecurity
- 14:6 : Apple and Google Remove 20 Apps Infected with Data-Stealing Malware
- 14:6 : Understanding the Importance of 5G Edge Security
- 14:5 : IT Security News Hourly Summary 2025-02-15 15h : 1 posts
- 13:13 : Confronting the Ransomware Menace: A Critical Look at Payment Practices and Emerging Strategies
- 12:32 : New Go-Based Malware Exploits Telegram and Use It as C2 Channel
- 12:4 : The Official DOGE Website Launch Was a Security Mess
- 11:31 : Beware of Fake BSOD Delivered by Malicious Python Script
- 11:6 : Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls
- 9:31 : The Hidden Cybersecurity Crisis: How GenAI is Fueling the Growth of Unchecked Non-Human Identities
- 9:6 : Elon Musk’s DOGE Website Database Vulnerability Let Anyone Make Entries Directly
- 8:32 : Swipe Left on Scams: Cyber Experts Expose Valentine’s Day Fraudsters
- 8:32 : Law Enforcement Can’t Save You From Romance Scams
- 8:31 : Questions Executives Should Ask About AI
- 8:5 : IT Security News Hourly Summary 2025-02-15 09h : 1 posts
- 7:31 : The Danger of IP Volatility, (Sat, Feb 15th)
- 3:31 : Top US Election Security Watchdog Forced to Stop Election Security Work
- 2:6 : DOGE.gov Debacle: How a Government Website Went to the Dogs and What It Means for Cybersecurity
- 0:32 : Achieving Independent Control Over Cloud Data
- 0:32 : Adaptable Security Measures for Dynamic Clouds
- 0:6 : If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish
- 23:6 : SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN
- 22:55 : IT Security News Daily Summary 2025-02-14
- 22:7 : RansomHub: The New King of Ransomware? Targeted 600 Firms in 2024
- 22:6 : U.S. CISA adds SimpleHelp flaw to its Known Exploited Vulnerabilities catalog
- 22:6 : Week in Review: CISA officials furloughed, DeepSeek’s weak security, Cairncross as cyberdirector
- 21:32 : How to restrict Amazon S3 bucket access to a specific IAM role
- 21:4 : Why EPSS is a Game-Changer for Cybersecurity Risk Management
- 20:32 : SailPoint IPO Signals Bright Spot for Cybersecurity
- 20:32 : Delinea Extends Scope of Identity Management Platform
- 20:31 : New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
- 20:15 : Perplexity just made AI research crazy cheap—what that means for the industry
- 20:15 : 9 Best Next-Generation Firewall (NGFW) Solutions for 2025
- 20:15 : China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws
- 20:15 : Lazarus Group Infostealer Malwares Attacking Developers In New Campaign
- 20:5 : IT Security News Hourly Summary 2025-02-14 21h : 6 posts
- 19:31 : Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle
- 19:7 : N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea
- 19:7 : XELERA Ransomware Attacking Job Seekers With Weaponized Word Documents
- 19:7 : 12 Million Zacks accounts leaked by cybercriminal
- 19:7 : Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum
- 19:7 : Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
- 18:32 : Meta confirms ‘Project Waterworth,’ a global subsea cable project spanning 50,000 kilometers
- 18:32 : Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems
- 18:31 : Azul Achieves DORA Compliance
- 18:13 : Meta confirms ‘Project Waterworth,’ a global subsea cable project spanning 50,000km
- 18:13 : Introducing the AWS Trust Center
- 17:32 : Upcoming Speaking Engagements
- 17:32 : Friday Squid Blogging: Squid the Care Dog
- 17:32 : Global Crackdown on Phobos Ransomware, Two Arrested
- 17:32 : vCISOs are in high demand
- 17:16 : ClearML and Nvidia vulns
- 17:16 : QuSecure Secures Additional Series A Funding to Advance Post-Quantum Cryptography Solutions
- 17:16 : Scammers Exploit JFK Files Release with Malware and Phishing
- 17:16 : Lazarus Group Using New Malware Tactic To Attack Developers Globally
- 17:16 : EarthKapre APT Drops Weaponized PDF to Compromise Windows Systems
- 17:5 : IT Security News Hourly Summary 2025-02-14 18h : 6 posts
- 16:18 : Mobile security alert as Google App Store apps start scanning for screenshot Seed Phrases
- 16:18 : Chinese Threat Group conducting espionage found moonlighting with ransomware
- 16:18 : ARM Shares Rise Amid Report Meta Will Purchase Its First Chip
- 16:18 : UK Government Partners Anthropic AI To Improve Public Services
- 16:17 : North Korean IT Workers Infiltrate International Companies To Plant Backdoors on Systems
- 16:17 : New GRC and cyber risk strategies emphasize risk adaptability
- 15:32 : FBI Alerts Users of Surge in Gmail AI Phishing Attacks
- 15:31 : Virtual Credit Cards: How They Work, Benefits, and Security Features
- 15:31 : 2FA Under Attack as Astaroth Phishing Kit Spreads
- 15:11 : Securing the Modern Workplace: Balancing Safety, Trust, and Productivity
- 15:11 : Project management with Scrum (with Podcast)
- 15:11 : Maximizing Security Through Hardware
- 15:11 : Sean Cairncross is Trump Nominee for National Cyber Director
- 14:32 : Ransomware Roundup – Lynx
- 14:32 : Critical PostgreSQL bug tied to zero-day attack on US Treasury
- 14:32 : Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat
- 14:32 : Threat actors are using legitimate Microsoft feature to compromise M365 accounts
- 14:32 : Russian Hackers Target Microsoft 365 Accounts with Device Code Phishing
- 14:5 : IT Security News Hourly Summary 2025-02-14 15h : 20 posts
- 14:2 : Netwrix Privilege Secure Enhances Remote Access Security by Eliminating VPN Dependencies
- 14:2 : Apache Fineract SQL Injection Vulnerability Let Inject Malicious Data
- 14:2 : NVIDIA Container Toolkit Vulnerability Let Attackers Execute Code
- 14:2 : CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits
- 14:2 : Beware of Malicious Browser Updates That Installs SocGholish Malware
- 14:2 : Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition
- 13:32 : Lazarus Group Targets Developers Worldwide with New Malware Tactic
- 13:32 : SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files
- 13:32 : Fake BSOD Attack Launched via Malicious Python Script
- 13:32 : Gaming or gambling? Lifting the lid on in-game loot boxes
- 13:32 : AI and Civil Service Purges
- 13:32 : Meta Paid Out Over $2.3 Million in Bug Bounties in 2024
- 13:32 : Lexmark issues warning about critical security vulnerabilities in printer software
- 13:9 : It’s Time to Move Beyond Awareness Training: Why Readiness Is the New Standard for Cybersecurity
- 13:9 : TikTok Returns To Apple, Google Stores In US
- 13:9 : REF7707 Hackers Target Windows & Linux Systems with FINALDRAFT Malware
- 13:9 : North Korean IT Workers Penetrate Global Firms to Install System Backdoors
- 13:9 : Protecting Hospitals from IoT Threats with Check Point
- 13:9 : New Astaroth 2FA Phishing Kit Targeting Gmail, Yahoo, Office 365, and 3rd-Party Logins
- 13:9 : Have the Last Word Against Ransomware with Immutable Backup
- 12:32 : Fake BSOD Delivered by Malicious Python Script, (Fri, Feb 14th)
- 12:32 : REF7707 Hackers Attacking Windows & Linux Machines Using FINALDRAFT Malware
- 12:32 : 2 charged over alleged New IRA terrorism activity linked to cops’ spilled data
- 12:32 : SonicWall Firewall Vulnerability Exploited After PoC Publication
- 12:32 : Microsoft Security Update Notification in February of High-Risk Vulnerabilities in Multiple Products
- 12:31 : Palo Alto Networks PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)
- 12:9 : NVIDIA Container Toolkit Vulnerable to Code Execution Attacks
- 12:9 : Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks
- 12:9 : UK’s AI Safety Institute Rebrands Amid Government Strategy Shift
- 11:32 : SGNL Raises $30 Million for Identity Management Solution
- 11:32 : RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally
- 11:32 : Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
- 11:32 : AI-Powered Social Engineering: Ancillary Tools and Techniques
- 11:13 : Alaa Abd El Fattah’s Mother, Laila Soueif, Calls on UK Government to Help as She Continues Hunger Strike
- 11:13 : Hackers Exploit Palo Alto Firewall Vulnerability Day After Disclosure
- 11:5 : IT Security News Hourly Summary 2025-02-14 12h : 4 posts
- 10:7 : Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks
- 10:7 : New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens
- 10:6 : Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself
- 10:6 : China-Linked Espionage Tools Used in Recent Ransomware Attack
- 9:31 : RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access
- 9:9 : Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens
- 9:9 : CISA Publishes 20 Advisories on ICS Security Flaws and Exploits
- 9:9 : Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins
- 9:9 : Grip Security unveils SSPM solution to strengthen SaaS security posture
- 8:32 : Project management with Scrum
- 8:32 : PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution
- 8:31 : AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code
- 8:31 : Apple backdoor spat, Sarcoma hits Unimicron, Sault Tribe attacked
- 8:7 : Dutch Authorities Dismantle Network of 127 Command-and-Control Servers
- 8:7 : Beware Fake Captchas – New Malicious Campaign Exploits WebFlow Users
- 8:7 : Valve removed the game PirateFi from the Steam video game platform because contained a malware
- 8:7 : Operational Efficiency and Cost Reduction: The Unsung Benefits of B2B IAM
- 8:7 : FBI Saves Millions and Lives in Cyber Hacking Take Down: Cyber Security Today for February 15, 2025
- 8:5 : IT Security News Hourly Summary 2025-02-14 09h : 5 posts
- 7:32 : Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection
- 7:32 : Espionage Tools Associated with China Used in Ransomware Attacks
- 7:9 : What is digital inclusion?
- 7:9 : AMD Ryzen Flaw Enables Code Execution Through DLL Hijacking
- 7:9 : The Inside Man: Security Training on a Grand Scale
- 6:31 : From Sweethearts to Swindlers: Valentine’s Day Fraud Surges
- 6:4 : Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability
- 5:32 : WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code
- 5:32 : 2025-02-13: Quick post: ClickFix style infection for Lumma Stealer
- 5:32 : The Art of Teaching Cybersecurity Through Storytelling
- 5:32 : Pig butchering scams are exploding
- 5:32 : PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
- 5:6 : Inconsistent security strategies fuel third-party threats
- 5:5 : IT Security News Hourly Summary 2025-02-14 06h : 2 posts
- 4:32 : WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code
- 4:31 : New infosec products of the week: February 14, 2025
- 2:31 : Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability
- 2:31 : Chinese spies suspected of ‘moonlighting’ as tawdry ransomware crooks
- 2:9 : ISC Stormcast For Friday, February 14th, 2025 https://isc.sans.edu/podcastdetail/9324, (Fri, Feb 14th)
- 2:8 : Storm-2372 conducts device code phishing campaign
- 2:5 : IT Security News Hourly Summary 2025-02-14 03h : 3 posts
- 1:33 : The best free VPNs of 2025: Expert tested
- 1:33 : From Reactive to Predictive: Building Cyber Resilience for 2025
- 1:33 : A New Chapter in Cybersecurity Excellence: Nuspire Becomes PDI Security & Network Solutions
- 0:32 : DEF CON 32 – MFT Malicious Fungible Tokens
- 23:9 : Salt Typhoon compromises telecom providers’ Cisco devices
- 23:5 : IT Security News Hourly Summary 2025-02-14 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-02-13
- 21:32 : Meta To Show Marketplace Ads From Rival Ad Providers
- 21:32 : Microsoft Uncovers ‘BadPilot’ Campaign as Seashell Blizzard Targets US and UK
- 21:32 : New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild
- 21:32 : What is a denial-of-service attack?
- 21:32 : New Windows UI 0-Day Vulnerability Actively Exploited in the Wild by Chinese APT Group
- 21:31 : How AI was used in an advanced phishing campaign targeting Gmail users
- 20:32 : Nearly a Year Later, Mozilla is Still Promoting OneRep
- 20:32 : Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation
- 20:32 : Energy Regulations Are Rising: Stay Ahead with Modern DCIM
- 20:9 : Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration
- 20:9 : Fortinet Contributes to U.S. House Committee Hearing on Cyber Workforce
- 20:9 : Google Hub in Poland to Develop AI Use in Energy and Cybersecurity Sectors
- 20:5 : IT Security News Hourly Summary 2025-02-13 21h : 9 posts
- 19:32 : Doxbin Data Breach: Hackers Leak 136K User Records and Blacklist File
- 19:32 : Threat Actors In Russia, China, and Iran Targeting Local Communities In The U.S – New Report
- 19:32 : Burp AI – Burp Suite Now Integrate AI Powered Extension for Web Pentesting with 10,000 Free AI Credits
- 19:32 : Publishers Spotlight: Flashpoint
- 19:31 : Securing DeepSeek and other AI systems with Microsoft Security