210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-03-02
- 20:32 : The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe
- 18:31 : 11 Application Security Testing Types
- 18:2 : C++ creator calls for help to defend programming language from ‘serious attacks’
- 17:31 : Lending App Data Breach Leaves Sensitive Customer Information Unprotected
- 17:31 : FBI Warns: ‘Ghost’ Ransomware Is Spreading— Here’s How to Stay Safe
- 15:32 : Crypto Scammers Are Targeting AI Trade Bots
- 15:32 : These Four Basic PC Essentials Will Protect You From Hacking Attacks
- 15:31 : Strengthening PC Security with Windows Whitelisting
- 15:31 : Default Password Creates Major Security Risk for Apartment Complexes
- 11:41 : Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:41 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 35
- 11:5 : IT Security News Hourly Summary 2025-03-02 12h : 1 posts
- 10:39 : Meta fired 20 employees for leaking information, more firings expected
- 9:5 : (Re)Building the Ultimate Homelab NUC Cluster – Part 3
- 9:5 : Week in review: Botnet hits M365 accounts, PoC for Ivanti Endpoint Manager vulnerabilities released
- 8:14 : Wireshark 4.4.5 Released, (Sun, Mar 2nd)
- 6:4 : Flat Earth Sun, Moon and Zodiac App – 33,294 breached accounts
- 4:4 : Network Penetration Testing Checklist – 2025
- 4:4 : Stalkerware: How Scammers Might Be Tracking Your Phone and What You Can Do
- 23:5 : IT Security News Hourly Summary 2025-03-02 00h : 5 posts
- 22:32 : DEF CON 32 – No Symbols When Reversing: No Problem Bring Your Own
- 22:32 : When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business
- 22:32 : Freedom to Choose the Best Secrets Vault?
- 22:32 : How Supported is Your NHIs Policy Enforcement?
- 22:32 : Justified Spending on Cybersecurity Technology?
- 20:31 : Weak cyber defenses are exposing critical infrastructure — how enterprises can proactively thwart cunning attackers to protect us all
- 20:5 : IT Security News Hourly Summary 2025-03-01 21h : 1 posts
- 19:32 : Ransomware gangs exploit a Paragon Partition Manager BioNTdrv.sys driver zero-day
- 17:31 : Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service
- 17:5 : IT Security News Hourly Summary 2025-03-01 18h : 3 posts
- 16:32 : Independent Audit for Your Secrets Management?
- 16:32 : Certain About Your Data Privacy Measures?
- 16:32 : How Stable is Your Cloud Infrastructure Security?
- 16:2 : LightSpy Malware Attacks Users, Launches Over 100 Commands to Steal Data
- 16:2 : Bybit Suffers Historic $1.5 Billion Crypto Hack, Lazarus Group Implicated
- 15:32 : Metrics That Matter for CISOs
- 15:32 : DM Clinical Research Database Exposed Online, Leaking 1.6M Patient Records
- 15:32 : Beware of Fake Viral Video Links Spreading Malware
- 15:32 : Open Access to Critical Data With Bank Staff Leading to Financial Scam
- 15:31 : Call Merging Scams and Financial Security Risks with Prevention Strategies
- 15:6 : Business Continuity Planning: Scenarios vs. impact
- 14:5 : IT Security News Hourly Summary 2025-03-01 15h : 1 posts
- 14:2 : The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone
- 13:4 : AI’s High-Stakes Gamble: Balancing Breakthroughs with Unseen Risks
- 12:31 : Why Cyber Resilience Legislation is Vital to Safeguarding Our Networks
- 12:4 : The Trump Administration Is Deprioritizing Russia as a Cyber Threat
- 9:4 : Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
- 8:32 : Tarlogic Discovers Security Flaw Allowing Eavesdropping on Private Conversations Via Bluetooth Headset Microphone
- 8:31 : Almost All Organisations Experienced API Security Issues in Past Year
- 6:3 : Android Phone’s Unlocked Using Cellebrite’s Linux USB Zero-day Exploit
- 6:3 : Angel One Data Breach: 8 Million Users Personal Records at Risk
- 5:5 : IT Security News Hourly Summary 2025-03-01 06h : 1 posts
- 5:4 : BlackLock Ransomware: The Fastest-Growing Cyber Threat and How to Stay Safe
- 2:32 : Microsoft Listed Hackers Abusing Azure OpenAI Service to Generate Malicious Content
- 2:31 : Hackers Abused Google & PayPal’s Infrastructure to Steal Users Personal Data
- 2:5 : IT Security News Hourly Summary 2025-03-01 03h : 1 posts
- 1:33 : 2025 ISO and CSA STAR certificates now available with four additional services
- 23:32 : Attackers could hack smart solar systems and cause serious damages
- 23:5 : IT Security News Hourly Summary 2025-03-01 00h : 3 posts
- 23:1 : IT Security News Weekly Summary March
- 22:55 : IT Security News Daily Summary 2025-02-28
- 22:32 : DEF CON 32 – Inside Dash Cam Custom Protocols And Discovered 0days
- 22:5 : What is a watering hole attack?
- 22:4 : Friday Squid Blogging: Eating Bioluminescent Squid
- 22:4 : DMARC Adoption among Europe’s Higher Education Sector
- 22:4 : Week in Review: Apple encryption, gamification for security, DISA breach
- 21:32 : Empowering Women in Cybersecurity: How Education and Training Are Key
- 21:2 : Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation
- 20:32 : Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
- 20:32 : Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist
- 20:7 : Researchers uncover unknown Android flaws used to hack into a student’s phone
- 20:5 : IT Security News Hourly Summary 2025-02-28 21h : 2 posts
- 19:31 : $1.5B Bybit Hack is Linked to North Korea, FBI Says, in Potentially the Largest Crypto Heist Ever
- 19:31 : Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature
- 18:32 : Over 350 High-Profile Websites Hit by 360XSS Attack
- 18:31 : Microsoft to shut down Skype, Here is the Deadline
- 18:31 : Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
- 18:4 : Cyber Security Today February 2025 Month In Review
- 17:32 : Microsoft To Retire Skype On 5 May
- 17:32 : What is multifactor authentication?
- 17:32 : Millions of stalkerware users exposed again
- 17:32 : Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone
- 17:5 : IT Security News Hourly Summary 2025-02-28 18h : 10 posts
- 17:2 : How to Avoid Costly Technical Debt and Get Your Software Project Back on Track
- 17:2 : Senator Susan Collins’ Betrayal of Maine Demands Accountability
- 17:2 : Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
- 16:32 : Openreach To Start Telephone Exchange Closure Process
- 16:32 : Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations
- 16:32 : Chinese Hackers Breach Belgium State Security Service as Investigation Continues
- 16:32 : Microsoft targets AI deepfake cybercrime network in lawsuit
- 16:31 : The biggest data breaches of 2025 — so far
- 16:9 : Belgian Intelligence Agency emails leaked by Barracuda Vulnerability
- 16:9 : Enhanced capabilities sustain the rapid growth of Vo1d botnet
- 15:32 : Chinese Hackers Exploiting Check Point’s VPN Zero-Day Flaw to Attack Orgs Worldwide
- 15:32 : Bybit Crypto Exchange Hacked for $1.5 Billion in Largest Crypto Heist
- 15:32 : Building Robust AI Systems with Verified Data Inputs
- 15:32 : Role of Continuous Threat Exposure Management in Business Security
- 15:31 : OT/ICS cyber threats escalate as geopolitical conflicts intensify
- 15:9 : Lightning-Fast Requests with Early Data
- 15:9 : The best VPN services for torrenting in 2025: Expert tested and reviewed
- 15:9 : What is FCAPS (fault, configuration, accounting, performance and security)?
- 15:9 : Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data
- 15:9 : MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- 15:9 : 5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs
- 15:9 : RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
- 14:31 : Top Tech Conferences & Events to Add to Your Calendar in 2025
- 14:31 : Next-Gen Phishing Techniques – How Back-End Tech Made Scams More Effective
- 14:31 : Third-Party Attacks Drive Major Financial Losses in 2024
- 14:5 : IT Security News Hourly Summary 2025-02-28 15h : 4 posts
- 14:4 : Belgium investigating alleged cyberattack on intelligence agency by China-linked hackers
- 14:4 : Nakivo Backup & Replication Tool Vulnerability Allows Attackers to Read Arbitrary Files – PoC Released
- 13:31 : Migrating from Hub and Spoke Network to Azure Virtual WAN
- 13:31 : In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story
- 13:2 : Google Starts Layoffs In Cloud, HR Units
- 13:2 : DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight
- 13:2 : PingAM Java Agent Vulnerability Let Attackers Gain Unauthorized Access
- 13:2 : New Pass-the-Cookie Attack Bypass Microsoft 365 & YouTube MFA Logins
- 13:2 : Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications
- 13:2 : Poco RAT Malware Exploits PDF Files to Infiltrate Systems and Steal Data
- 13:2 : OSPS Baseline: Practical security best practices for open source software projects
- 12:31 : Cisco fixed command injection and DoS flaws in Nexus switches
- 12:6 : Ransomware Group Takes Credit for Lee Enterprises Attack
- 12:6 : Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
- 12:6 : Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn
- 11:32 : JavaGhost’s Persistent Phishing Attacks From the Cloud
- 11:32 : Man Jailed 24 Years for Running Dark Web CSAM Sites from Coffee Shop
- 11:32 : New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access
- 11:32 : Telegram as #1 Messenger Used by Cybercriminals for Communications
- 11:32 : Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes
- 11:32 : Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face
- 11:6 : Microsoft Names Suspects in Lawsuit Against AI Hackers
- 11:6 : Old Vulnerabilities Among the Most Widely Exploited
- 11:5 : IT Security News Hourly Summary 2025-02-28 12h : 4 posts
- 10:32 : How to Protect Your Digital Identity While Gaming Online
- 10:31 : Lynx Ransomware Attacking Organizations to Exfiltrate Sensitive Data
- 10:31 : Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
- 10:31 : 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
- 10:4 : New GitHub Scam With Thousand of “mods” & “cracks” Steal Your Data
- 10:4 : 1.6 Million Android TVs Worldwide Hacked by Vo1d Botnet
- 9:32 : Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally
- 9:32 : Prolific Data Extortion Actor Arrested in Thailand
- 9:4 : PingAM Java Agent Vulnerability Allows Attackers to Bypass Security
- 8:32 : China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails
- 8:32 : 18 Best Web Filtering Solutions – 2025
- 8:32 : Wallbleed Exposes Memory Vulnerability in China’s Great Firewall DNS System
- 8:32 : 260 Domains Hosting 5,000 Weaponized PDF Files Attacking Users to Steal Credit Card Data
- 8:31 : Massive Banking Data Leaks Under Scrutiny as Cyber Fraud Cases Surge
- 8:31 : Cyber espionage increase, Nakasone cyber warning, PolarEdge exploits Cisco
- 8:6 : New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data
- 7:2 : IRS contractor leaked the tax returns of over 400k Americans and businesses
- 7:2 : 5 Best Practices for Bolstering Physical Access Security in Data Centers in 2025
- 6:32 : Cyber Attack news headlines trending on Google
- 6:32 : 260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data
- 6:32 : The SOC files: Chasing the web shell
- 6:32 : Massive Cyberattack Exploits Legacy Windows Driver to Evade Detection
- 6:31 : Understanding the AI Act and its compliance challenges
- 6:4 : The First International AI Safety Report: A Call to Action
- 6:4 : Windows CE and ICS Security: A Ticking Time Bomb?
- 5:32 : DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
- 5:32 : Winos4.0 Malware Targets Windows Users Through Malicious PDF Files
- 5:31 : The art of balancing data security with business goals
- 5:5 : IT Security News Hourly Summary 2025-02-28 06h : 4 posts
- 5:4 : Infosec products of the month: February 2025
- 4:32 : Microsoft names alleged credential-snatching ‘Azure Abuse Enterprise’ operators
- 4:31 : Beyond SMS: HYPR’s Perspective on Gmail’s Shift to QR Code Authentication
- 4:31 : University of Notre Dame Hit by Cyberattack— Hackers Say They Stole Everything
- 4:4 : DeepSeek Data Leak – 12,000 Hardcoded Live API keys and Passwords Exposed
- 4:4 : Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
- 3:3 : PayPal’s “no-code checkout” abused by scammers
- 2:32 : How Scalping Bots Exploited a Vulnerable API to Disrupt Online Retail Sales
- 2:5 : IT Security News Hourly Summary 2025-02-28 03h : 2 posts
- 2:2 : ISC Stormcast For Friday, February 28th, 2025 https://isc.sans.edu/podcastdetail/9344, (Fri, Feb 28th)
- 1:31 : Spyzie – 518,643 breached accounts
- 1:4 : Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI
- 0:2 : Do Powerful Tools Enhance Your Data Security?
- 0:2 : Is Your NHI Lifecycle Management Capable?
- 0:2 : Optimistic About Future Cybersecurity Trends?
- 23:31 : GHOSTR Hacker Linked to 90+ Data Breaches Arrested
- 23:5 : IT Security News Hourly Summary 2025-02-28 00h : 5 posts
- 23:2 : Psychological Safety as a Competitive Edge
- 23:2 : Feds: Army soldier accused of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’
- 22:55 : IT Security News Daily Summary 2025-02-27
- 22:6 : eCommerce Customer Service Tips For Online Support: The Basics
- 22:6 : FBI officially fingers North Korea for $1.5B Bybit crypto-burglary
- 21:31 : Lina’s Write-up
- 21:31 : Ninth Circuit Correctly Rules That Dating App Isn’t Liable for Matching Users
- 21:31 : CMMC is Here: Simplifying Compliance with Enclaves
- 21:5 : STRIDE: A Guide to Threat Modeling and Secure Implementation
- 21:5 : Are Your VM Scans Testing the Entirety of the Network?
- 21:5 : FBI: Lazarus Group behind $1.5 billion Bybit heist
- 21:4 : Record-Breaking Data Theft: 3.9 Billion Passwords Compromised by Infostealer Malware
- 20:32 : Ransomware Attacks Reach Record-Breaking Levels In 2024 – BlackFog
- 20:32 : How to Use Slack for Business: Workplace Communication
- 20:32 : Spyzie stalkerware is spying on thousands of Android and iPhone users
- 20:5 : IT Security News Hourly Summary 2025-02-27 21h : 5 posts
- 20:4 : New Backdoor Auto-color Linux Targets Systems in US and Asia
- 19:31 : 26 New Threat Groups Spotted in 2024: CrowdStrike
- 19:7 : Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome
- 19:7 : How data centers can help balance the electrical grid
- 19:7 : FBI: North Korea-linked TraderTraitor is responsible for $1.5 Billion Bybit hack
- 18:32 : Strengthening Our Emissions Accounting Process Blog
- 18:32 : Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications
- 18:32 : “Emergent Misalignment” in LLMs
- 18:32 : Top 10 Best Dynamic Malware Analysis Tools in 2025
- 18:32 : Comic Agilé – Luxshan Ratnaravi, Mikkel Noe-Nygaard – #327 – Including QA Tasks At Sprint Planning
- 18:7 : Meta Fixes Fault After Violent Videos Hits Instagram Reels
- 18:7 : New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections
- 18:7 : DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations
- 18:7 : Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details