210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-02-23
- 20:31 : Investigators Link $1.4B Bybit Hack to North Korea’s Lazarus Group
- 20:31 : Windscribe VPN review: A flexible and free VPN
- 20:5 : IT Security News Hourly Summary 2025-02-23 21h : 1 posts
- 19:32 : Top 10 Best Ransomware Protection Tools – 2025
- 18:7 : 50 World’s Best Penetration Testing Companies – 2025
- 18:6 : 10 Best Email Security Gateways In 2025
- 17:5 : IT Security News Hourly Summary 2025-02-23 18h : 2 posts
- 16:32 : What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection
- 16:7 : U.S. CISA adds Microsoft Power Pages flaw to its Known Exploited Vulnerabilities catalog
- 15:32 : Chinese Spies Allegedly Engaged in Ransomware Operations
- 15:32 : USAID Cybersecurity Aid to Ukraine Halted as Trump Administration Freezes Projects
- 15:32 : Amazon Prime Phishing Campaign Siphons Login And Payment Info
- 15:32 : Protect Your Security Cameras from Hackers with These Simple Steps
- 15:32 : Cyber-Espionage Malware FinalDraft Exploits Outlook Drafts for Covert Operations
- 14:5 : IT Security News Hourly Summary 2025-02-23 15h : 1 posts
- 14:2 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34
- 13:2 : Security Affairs newsletter Round 512 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:5 : IT Security News Hourly Summary 2025-02-23 12h : 1 posts
- 11:2 : Wireshark 4.4.4 Released, (Sun, Feb 23rd)
- 9:31 : Week in review: PostgreSQL 0-day exploited in US Treasury hack, top OSINT books to learn from
- 9:7 : Securing Payment Pages: A Complete Guide to PCI DSS 4.0.1 Compliance for SAQ A-EP Merchants
- 6:9 : New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency
- 5:5 : IT Security News Hourly Summary 2025-02-23 06h : 1 posts
- 4:6 : BlackBastaGPT – A ChatGPT Powered Tool to Uncover Ransomware Group Tactics
- 2:5 : IT Security News Hourly Summary 2025-02-23 03h : 1 posts
- 1:6 : Lazarus APT stole $1.5B from Bybit, it is the largest cryptocurrency heist ever
- 23:5 : IT Security News Hourly Summary 2025-02-23 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-02-22
- 19:4 : North Korea’s Lazarus Group Hacks Bybit, Steals $1.5 Billion in Crypto
- 18:4 : Hackers Target South America and Southeast Asia
- 16:4 : Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange
- 16:4 : Russian State Actors Target Microsoft 365 Accounts Via Device Code Phishing Campaign
- 16:4 : Hackers Leak 15,000 FortiGate Device Configs, IPs, and VPN Credentials
- 15:2 : ADR Report | Application Detection and Response Trends | Contrast Labs
- 12:6 : $1.4 Billion Stolen From ByBit in Biggest Crypto Theft Ever
- 12:6 : Apple removes iCloud encryption in UK following backdoor demand
- 8:32 : Huge Data Leak Puts 2.7 Billion Records at Risk – What You Should Know
- 8:32 : The Dark Side of AI: Project Synapse
- 8:5 : IT Security News Hourly Summary 2025-02-22 09h : 1 posts
- 8:4 : Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
- 6:31 : Bybit Hack: Massive $1.5 Billion Worth Ethereum Stolen
- 6:4 : OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
- 5:32 : Salt Typhoon Hackers Exploit Cisco Vulnerability To Gain Access To U.S. Telecom Networks
- 5:5 : IT Security News Hourly Summary 2025-02-22 06h : 1 posts
- 4:5 : New Guidelines: Cybersecurity Resilience in the Healthcare Industry
- 4:4 : Feel Relieved with Effective Secrets Sprawl Control
- 4:4 : Stay Calm: Securing Your Enterprise Against Leaks
- 4:4 : Achieving Satisfaction in Cloud Security Investments
- 1:2 : The Judicial Conference Should Continue to Liberally Allow Amicus Briefs, a Critical Advocacy Tool
- 23:31 : Week in Review: More telecoms breached, Chase blocks Zelle, more DeepSeek bans
- 23:5 : IT Security News Hourly Summary 2025-02-22 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-02-21
- 21:31 : Bybit Hack: $1.4B Stolen from World’s 2nd Largest Crypto Exchange
- 21:31 : Google Announces Quantum-Safe Digital Signatures in Cloud KMS, Takes “Post-Quantum Computing Risks Seriously”
- 21:31 : Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting
- 21:2 : Controlling Access to Google BigQuery Data
- 20:32 : Leaked Files Tie Chinese Cybersecurity Firm to Government Censorship
- 20:32 : Apple Breaks Silence on UK Probe, Removes Data Protection Tool From UK Users
- 20:31 : Palo Alto Networks vulnerabilities exploited in chained attack
- 20:31 : Auto-Generated Password Vulnerability In Sitevision Leaks Signing Key
- 20:5 : IT Security News Hourly Summary 2025-02-21 21h : 7 posts
- 20:2 : Harnessing Agentic AI To Supercharge Security Awareness Training
- 20:2 : DOGE’s USDS Purge Included the Guy Who Keeps Veterans’ Data Safe Online
- 19:31 : Cases of China-Backed Spy Groups Using Ransomware Come to Light
- 19:9 : Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 19:9 : Crypto exchange Bybit says it was hacked and lost around $1.4B
- 19:9 : Bridewell and I-TRACING Form Strategic Partnership
- 19:8 : How DDoS Attacks Work and How You Can Protect Your Business From Them
- 18:34 : From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic
- 18:7 : SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix
- 18:7 : Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection
- 18:7 : Fake job offers target software developers with infostealers
- 18:7 : Don’t Miss Out: 15 Months of Powerful Cyber Protection and Backup for Only $30
- 18:7 : Crypto exchange Bybit says it was hacked and lost around $1.4 billion
- 17:37 : ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials
- 17:37 : NSA Allegedly Hacked Northwestern Polytechnical University, China Claims
- 17:37 : Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key
- 17:37 : What is a network packet?
- 17:37 : ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials
- 17:36 : China Claim That NSA Allegedly Hacked Northwestern Polytechnical University
- 17:36 : EFF at RightsCon 2025
- 17:36 : Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
- 17:36 : Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
- 17:9 : CISA Adds One Known Exploited Vulnerability to Catalog
- 17:9 : Healthcare security lapses keep piling up
- 17:5 : IT Security News Hourly Summary 2025-02-21 18h : 12 posts
- 16:34 : Security and privacy concerns challenge public sector’s efforts to modernize
- 16:13 : Apple backs out of offering Data Security tool to UK customers
- 16:13 : Apple Withdraws Advanced Data Protection For UK, After Government Order
- 16:13 : American Airlines now lets you track your luggage with AirTags – here’s how
- 16:13 : Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor
- 16:13 : Implementing Cryptography in AI Systems
- 16:13 : Darcula 3.0 Tool Automatically Generates Phishing Kit For Any Brand
- 16:13 : Freelance Software Developers in North Korean Malware Crosshairs
- 16:13 : The Upcoming Tech Revolution Foreseen by Sundar Pichai
- 16:13 : Italian Spyware Firm SIO Linked to Malicious Android Apps Targeting WhatsApp Users
- 16:13 : whoAMI Name Assaults Can Compromise AWS Accounts to Malicious Code Execution
- 16:13 : Android Phishing Apps: A Growing Cybersecurity Threat in 2024
- 15:32 : Sweden Investigates Another Baltic Sea Cable Damage Incident
- 15:32 : Digital life protection: How Webroot keeps you safe in a constantly changing world
- 15:32 : Is your whole digital life protected? 4 ways to address common vulnerabilities
- 15:32 : A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims
- 15:4 : Is your phone truly waterproof? Here’s what the IP rating tells you
- 15:4 : B1ack’s Stash released 1 Million credit cards
- 15:4 : Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics
- 14:32 : Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks
- 14:32 : Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”
- 14:31 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 14:31 : Salt Typhoon Exploited Cisco Devices With Custom Tool to Spy on US Telcos
- 14:11 : OpenAI’s ‘Operator’ AI Agent Starts Rollout In Select Countries
- 14:11 : Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks
- 14:11 : Cyber Criminals Using URL Tricks to Deceive Users
- 14:11 : What is application allowlisting?
- 14:11 : The US Is Considering a TP-Link Router Ban—Should You Worry?
- 14:11 : CL0P Ransomware Attacking Telecommunications & Healthcare Sectors In Large Scale
- 14:11 : Persistent Phishing Campaign Uses Surveymonkey and Cloudflare, Bypasses Gmail’s Spam Filter
- 14:11 : In Other News: Black Basta Chats Leaked, New SEC Cyber Unit, DOGE Site Hacked
- 14:11 : Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
- 14:11 : DoD Contractor Pays $11.2M over False Cyber Certifications Claims
- 13:2 : Experts race to extract intel from Black Basta internal chat leaks
- 13:2 : What Is EDR? Endpoint Detection and Response
- 13:2 : Why Internal Audit Services Are Key to Risk Management in Today’s Business Landscape
- 13:2 : Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
- 12:34 : Top 9 Arctic Wolf Competitors and Alternatives
- 12:34 : How China Pinned University Cyberattacks on NSA Hackers
- 12:4 : CISA Warns of Attacks Exploiting Craft CMS Vulnerability
- 12:4 : Is Vibe Coding The Future of Software Development
- 11:32 : Investigating LLM Jailbreaking of Popular Generative AI Web Products
- 11:32 : Second Recently Patched Flaw Exploited to Hack Palo Alto Firewalls
- 11:32 : AI-Powered Deception is a Menace to Our Societies
- 11:32 : BlackBasta Ransomware Chatlogs Leaked Online
- 11:31 : OpenSSL 3.5 will be the next long term stable (LTS) release
- 11:5 : IT Security News Hourly Summary 2025-02-21 12h : 10 posts
- 11:2 : U.S. CISA adds Craft CMS and Palo Alto Networks PAN-OS flaws to its Known Exploited Vulnerabilities catalog
- 10:32 : New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
- 10:32 : Angry Likho: Old beasts in a new forest
- 10:31 : Top 9 Arctic Wolf alternatives and competitors
- 10:31 : zkLend DeFi Platform Hacked, Loses $9.5 Million
- 10:13 : Adversary-in-the-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
- 10:13 : CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors
- 10:13 : Salt Typhoon Hackers Exploit Cisco Vulnerability to Gain Device Access on US.Telecom Networks
- 10:13 : Cyber Threat Actors Leveraging Exploits To Attack Financial Sector With Advanced Malware
- 10:13 : Google Cloud’s Multi-Factor Authentication Mandate: Setting a Standard or Creating an Illusion of Security?
- 9:31 : OpenText unveils AI-powered threat detection and response capabilities
- 9:31 : Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption Protocols
- 9:11 : Atlassian fixed critical flaws in Confluence and Crowd
- 9:11 : Cybersecurity Survey Indicates Organizations Favouring Consolidation and Automation
- 9:11 : Versa Sovereign SASE enables organizations to create self-protecting networks
- 8:32 : Symbiotic Security improves software vulnerability detection in the coding process
- 8:32 : CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
- 8:32 : Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
- 8:31 : NioCorp BEC scam, Australian IVF breach, SEC’s cyber unit
- 8:11 : CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities
- 8:11 : Chinese Hackers Using New Bookworm Malware In Attacks Targeting Southeast Asia
- 8:11 : SPAWNCHIMERA Malware Exploiting Ivanti Buffer Overflow Vulnerability By Applying A Fix
- 8:11 : Pegasus Spyware Used Widely to Target Individuals in Private Industry & Finance Sectors
- 8:11 : CISA Releases 7 ICS Advisories Detailing Vulnerabilities & Exploits
- 8:5 : IT Security News Hourly Summary 2025-02-21 09h : 2 posts
- 7:7 : Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals
- 7:6 : Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws
- 6:32 : Genea Australia data breach and Black Basta Ransomware gang data leak
- 6:32 : Controlling Shadow AI: Protecting Knowledge Management from Cyber Threats
- 6:7 : Cybercriminals Leverage Google Tag Manager for Credit Card Data Theft
- 6:7 : How to secure Notes on iOS and macOS
- 6:6 : Mastering the cybersecurity tightrope of protection, detection, and response
- 5:31 : Baby, You Can Hack My Car: Upstream’s 2025 Automotive and Smart Mobility Cybersecurity Report
- 5:11 : Google Released PoC Exploit For Palo Alto Firewall Command Injection Vulnerability
- 5:5 : IT Security News Hourly Summary 2025-02-21 06h : 3 posts
- 4:31 : New infosec products of the week: February 21, 2025
- 4:9 : New Active Directory Pentesting Tool For KeyCredentialLink Management
- 4:8 : Thailand ready to welcome 7,000 trafficked scam call center victims back from Myanmar
- 2:6 : Windows Wi-Fi Password Stealer Malware Found Hosted on GitHub
- 2:5 : IT Security News Hourly Summary 2025-02-21 03h : 3 posts
- 1:31 : Life in the Swimlane with Gabriella Lopez, Senior Sales Development Representative
- 1:9 : ISC Stormcast For Friday, February 21st, 2025 https://isc.sans.edu/podcastdetail/9334, (Fri, Feb 21st)
- 1:8 : Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable
- 0:32 : Cocospy – 1,798,059 breached accounts
- 0:32 : Spyic – 875,999 breached accounts
- 0:32 : Driving Innovation with Secure Cloud Practices
- 0:31 : Feel Empowered: Managing Access with Precision
- 0:31 : Build a Confident Security Posture with Proven Tactics
- 0:9 : Tool update: sigs.py – added check mode, (Fri, Feb 21st)
- 0:9 : Salt Typhoon used custom malware JumbledPath to spy U.S. telecom providers
- 0:8 : Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes
- 23:31 : How to Sue a Company Under GDPR for Data Misuse and Privacy Violations
- 23:31 : Oops, some of our customers’ Power Pages sites were exploited, says Microsoft
- 23:5 : IT Security News Hourly Summary 2025-02-21 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-02-20
- 22:9 : Penetration testing vs. vulnerability scanning: What’s the difference?
- 22:9 : What is Transport Layer Security (TLS)?
- 22:8 : Risk & Repeat: Salt Typhoon hasn’t stopped hacking
- 22:8 : Your Android phone could have stalkerware — here’s how to remove it
- 21:32 : How Page Protect Enabled Seamless PCI DSS 4.0 Compliance for a Leading Beverage Retailer
- 21:2 : New NailaoLocker Ransomware Attacking European Healthcare
- 21:2 : Ivanti Endpoint Manager Vulnerabilities Proof-of-Concept (PoC) Exploit Released
- 21:2 : SecTopRAT bundled in Chrome installer distributed via Google Ads
- 20:32 : The National Institute of Standards and Technology Braces for Mass Firings
- 20:32 : Stalkerware apps Cocospy and Spyic are exposing phone data of millions of people
- 20:32 : Hacked, leaked, exposed: Why you should never use stalkerware apps
- 20:31 : Your Android phone could have stalkerware. Here’s how to remove it
- 20:11 : Brazilian Judge Who Clashed With Elon Musk, Sued By Trump Firm
- 20:11 : Kata Containers: From Kubernetes Pods to Secure VMs
- 20:11 : Beware of North Korean Job Interview Process Delivers Malware Via Fake Chrome Update
- 20:5 : IT Security News Hourly Summary 2025-02-20 21h : 4 posts
- 19:9 : Efficiency? Security? When the quest for one grants neither.
- 19:9 : Nigeria Sues Binance For $81.5bn For Economic Losses, Back Tax
- 19:9 : OpenAI’s ChatGPT explodes to 400M weekly users, with GPT-5 on the way
- 19:8 : 9 ways to delete yourself from the internet (and hide your identity online)
- 18:32 : New FrigidStealer Malware Infects macOS via Fake Browser Updates