167 posts were published in the last hour
- 21:7 : New versions of Chaos RAT target Windows and Linux systems
- 21:7 : Barracuda Networks Leverages AI to Integrate Cybersecurity Workflows
- 21:6 : Zscaler Tightens AI Security With New Tools
- 20:32 : Trump’s cyber czar pick grilled over CISA cuts: ‘If we have a cyber 9/11, you’re the guy’
- 20:31 : Cellebrite buys Corellium to help cops bust phone encryption
- 20:31 : Many voices, one community: Three themes from RSA Conference 2025
- 20:5 : IT Security News Hourly Summary 2025-06-05 21h : 17 posts
- 20:4 : Misconfigured HMIs Expose US Water Systems to Anyone with a Browser
- 19:31 : Iranian APT ‘BladedFeline’ Remains Hidden in Networks for 8 Years
- 19:3 : ViperSoftX Malware Enhances Modularity, Stealth, and Persistence Techniques
- 19:2 : New Chaos RAT Targets Linux and Windows Users to Steal Sensitive Data
- 19:2 : Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect
- 19:2 : CISA Adds One Known Exploited Vulnerability to Catalog
- 19:2 : ColoCrossing – 7,183 breached accounts
- 18:33 : London Blow, As Wise Opts To Move Listing To US
- 18:33 : China Accuses Taiwan of Operating APT Groups with US Support
- 18:32 : What is third-party risk management (TPRM)?
- 18:32 : Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges
- 18:32 : New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack
- 18:32 : VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code
- 18:32 : WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins
- 18:32 : The Dangers of Consolidating All Government Information
- 18:31 : Akamai Extends Cybersecurity Reach to DNS Posture Management
- 18:31 : #Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO
- 18:5 : Everyone’s on the cyber target list
- 18:5 : Court Denies Apple Appeal In Epic Games Case
- 18:4 : Unsecured Database Exposes Data of 3.6 Million Passion.io Creators
- 18:4 : Beware of Fake Zoom Client Downloads Granting Attackers Access to Your Computer
- 17:32 : WordPress Admins Cautioned About Fake Cache Plugin Stealing Admin Credentials
- 17:32 : The best password managers for businesses in 2025: Expert tested
- 17:32 : The best AirTag wallets of 2025: Expert tested and recommended
- 17:32 : What is the WannaCry ransomware attack?
- 17:31 : BidenCash busted as Feds nuke stolen credit card bazaar
- 17:31 : Thousands of ASUS Routers Affected by Stealthy Persistent Backdoor
- 17:7 : CyberData 011209 SIP Emergency Intercom
- 17:6 : Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3
- 17:6 : Connect with us at the Gartner Security & Risk Management Summit
- 17:5 : IT Security News Hourly Summary 2025-06-05 18h : 15 posts
- 16:5 : Anthropic unveils custom AI models for US national security customers
- 16:5 : CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
- 16:4 : Yet Another Exposed Database, This Time with 184 Million Records
- 16:4 : Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials
- 16:4 : #Infosec2025: Ransomware Victims Urged to Engage to Take Back Control
- 16:4 : #Infosec2025: DNS Hijacking, A Major Cyber Threat for the UK Government
- 15:32 : Wordfence Intelligence Weekly WordPress Vulnerability Report (May 26, 2025 to June 1, 2025)
- 15:32 : Trump Renegotiating Biden-era Chips Act Grants
- 15:32 : Cybercriminals are stealing business Salesforce data with this simple trick – don’t fall for it
- 15:32 : How a Malicious Excel File (CVE-2017-0199) Delivers the FormBook Payload
- 15:7 : Google Partners Chile For Trans Pacific Humboldt Cable
- 15:7 : Lumma Infostealers Developers Trying Hard To Conduct Business As Usual
- 15:7 : Judges Stand With Law Firms (and EFF) Against Trump’s Executive Orders
- 15:7 : Pornhub, RedTube, and YouPorn block access in France, VPN use set to soar
- 15:7 : More than a hundred backdoored malware repos traced to single GitHub user
- 15:7 : New Self-Spreading Malware Hijacks Docker Servers to Secretly Mine Cryptocurrency
- 15:7 : Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands
- 14:32 : Nearly 94 Billion Stolen Cookies Found on Dark Web
- 14:32 : Databricks and Noma tackle CISOs’ AI nightmares around inference vulnerabilities
- 14:32 : DragonForce Targets MSPs Using SimpleHelp Exploit, Expands Ransomware Reach
- 14:32 : X Temporarily Disables Encrypted DMs to Launch New Messaging Features
- 14:32 : Vanta Customer Data Exposed Due to Code Bug at Compliance Firm
- 14:32 : #Infosec2025: Know Your Audience to Make an Impact, CISOs Tell Their Peers
- 14:5 : Members of ViLE Hacker Group Arrested for Hacking DEA Portal
- 14:5 : Odoo Employee Database Allegedly Exposed and Put Up for Sale on Dark Web
- 14:5 : Anthropic unveils custom AI models for U.S. national security customers
- 14:5 : IT Security News Hourly Summary 2025-06-05 15h : 15 posts
- 14:4 : Backdoored Open Source Malware Repositories Target Novice Cybercriminals
- 14:4 : Meet Escape Copilot: Automate App and Scan Management via MCP
- 14:4 : Dynatrace extends platform with agentic AI capabilities
- 14:4 : Bitdefender unifies security, risk management, and compliance in a single platform
- 14:4 : #Infosec2025: Threat Actors Weaponizing Hardware Devices to Exploit Fortified Environments
- 13:33 : Navigating the Future of Scope 2: Balancing Impact and Practicality
- 13:32 : Fog Computing vs. Edge Computing: Their Roles in Modern Technology
- 13:32 : 6 Key Insights from Check Point’s Cloud Security Report 2025
- 13:32 : How to turn off Gemini in your Gmail, Docs, Photos, and more – it’s easy to opt out
- 13:32 : Is your Asus router part of a botnet? How to check – and what you can do
- 13:32 : Google: New Vishing Threat ‘Particularly Effective’ at Tricking Employees to Steal Salesforce Data
- 13:32 : GenAI’s Impact — Surging Adoption and Rising Risks in 2025
- 13:32 : #Infosec2025: Defenders and Attackers are Locked in an AI Arms Race
- 13:7 : Critical Dell PowerScale Vulnerability Allows Attackers Unauthorized Access to Filesystem
- 13:7 : UNC6040 Vishing Threat ‘Particularly Effective’ at Tricking Employees Into Breaching Networks to Steal Salesforce Data
- 13:6 : Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal
- 13:6 : FIPS 140-3 and You, Part Three
- 13:6 : Top Cybersecurity Tools for Higher Education: Protecting Institutions
- 12:33 : TA397 Hackers Exploits Scheduled Tasks to Deploy Malware on Targeted Systems
- 12:32 : Phone unlocking firm Cellebrite to acquire mobile testing startup Corellium for $170M
- 12:32 : Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware
- 12:32 : Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation
- 12:8 : Private Lunar Lander From iSpace Nears Moon Touchdown
- 12:8 : Meta ‘Covertly Tracking’ Android Users Via Instagram, Facebook
- 12:7 : ClickFix Email Scam Alert: Fake Booking.com Emails Deliver Malware
- 12:7 : Wireshark Vulnerability Allows Attackers to Launch DoS Attacks
- 12:7 : Hackers Exploit New HTML Trick to Deceive Outlook Users into Clicking Malicious Links
- 12:7 : VMware NSX XSS Vulnerability Exposes Systems to Malicious Code Injection
- 12:7 : 6 Best Authenticator Apps for 2025
- 12:7 : Heimdal’s Latest Podcast Episode Unpacks Long-Term MSP Marketing Strategies with Paul Green
- 12:7 : ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- 12:6 : Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison
- 12:6 : #Infosec2025: Seven Steps to Building a Mature Vulnerability Management Program
- 11:32 : Researcher Found 6 Critical Vulnerabilities in NetMRI Allow Attackers Gain Complete Admin Access
- 11:32 : 830 Organizations Hacked via Glitch-hosted Phishing Attack Uses Telegram & Fake CAPTCHAs
- 11:32 : Ransomware hiding in fake AI, business tools
- 11:31 : FBI Aware of 900 Organizations Hit by Play Ransomware
- 11:5 : Driving Success on the Track or in the Boardroom
- 11:5 : UNC6040 APT Hackers Steals Salesforce data Without Exploit Any Vulnerabilities
- 11:5 : Start Your Tech Career with a Fundamental IT Training Bundle That’s Only $25
- 11:5 : Play Ransomware Hacked 900 Organizations, CISA Released TTPs & IOCs
- 11:5 : HMRC: Crooks broke into 100k accounts, stole £43M from British taxpayer in late 2024
- 11:5 : IT Security News Hourly Summary 2025-06-05 12h : 7 posts
- 11:4 : DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown
- 10:32 : Cisco IMC Vulnerability Allows Attackers to Gain Elevated Privileges
- 10:32 : What Really Happened in the Aftermath of the Lizard Squad Hacks
- 10:32 : IT threat evolution in Q1 2025. Mobile statistics
- 10:32 : IT threat evolution in Q1 2025. Non-mobile statistics
- 10:32 : Top 10 GPT Tools For Hackers, Penetration Testers, & Security Analysts
- 10:32 : Wireshark Vulnerability Enables DoS Attack Through Malicious Packet Injection
- 10:32 : New Phishing Attack that Hides Malicious Link from Outlook Users
- 10:32 : Cisco ISE Vulnerability Allows Remote to Access Sensitive Data – PoC Exploit Available
- 10:32 : Carding Marketplace BidenCash Shut Down by Authorities
- 10:31 : Pinterest Enhances Reliability and Quality Amid AI Content Flood
- 10:6 : Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- 10:6 : Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach
- 9:32 : AI, Inc: The Business of Artificial Intelligence
- 9:32 : AI, Inc: The Business of Artificial Intelligence: Head-to-Head
- 9:32 : CISA Releases TTPs & IoCs for Play Ransomware That Hacked 900+ Orgs
- 9:32 : Ransomware Gang Leaks Alleged Kettering Health Data
- 9:5 : Critical Cisco Nexus Dashboard Vulnerability Lets Attackers Impersonate Managed Devices
- 9:5 : Critical flaw in Cisco ISE impacts cloud deployments on AWS, Microsoft Azure, and Oracle Cloud Infrastructure
- 9:5 : China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links
- 8:32 : Cisco Alerts Users to Critical ISE Vulnerability Exposing Sensitive Data
- 8:32 : #Infosec2025: Securing Endpoints is Still Vital Amid Changing Threats
- 8:5 : IT Security News Hourly Summary 2025-06-05 09h : 5 posts
- 8:2 : U.S. Authorities Shut Down Major Dark Web Marketplace with 117,000 Users
- 8:2 : Authorities Seized 145 Dark Web Marketplace Having 117,000 Registered Customers
- 7:32 : Outlook Users Targeted by New HTML-Based Phishing Scheme
- 7:32 : Russian bomber maker popped, vishing targets Salesforce, MS helps out governments
- 7:5 : Be Careful With Fake Zoom Client Downloads, (Thu, Jun 5th)
- 7:5 : AI kept 15-year-old zombie vuln alive, but its time is drawing near
- 7:5 : Vodafone Germany Fined $51 Million Over Privacy, Security Failures
- 7:4 : Addressing API Security with NIST SP 800-228
- 6:32 : 35,000 Solar Power Systems Exposed To Internet Are Vulnerable To Cyberattacks
- 6:32 : Meta open-sources AI tool to automatically classify sensitive documents
- 6:32 : FortiMail Workspace Security expands protection beyond email to web and collaboration tools
- 6:32 : Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
- 6:2 : Law enforcement seized the carding marketplace BidenCash
- 6:2 : The cloud security crisis no one’s talking about
- 5:5 : IT Security News Hourly Summary 2025-06-05 06h : 5 posts
- 5:3 : APT37 Hackers Mimic Academic Forum Invites To Deliver Malicious LNK Files Via Dropbox Platform
- 5:2 : China accuses Taiwan of running five feeble APT gangs, with US help
- 5:2 : NPM Developers Targeted: Fake Packages Secretly Collecting Personal Data
- 5:2 : Google survey shows Americans are changing how they fight scams
- 4:31 : Healthcare organizations are at a turning point with AI
- 4:31 : Why SAP security updates are a struggle for large enterprises
- 4:2 : New Malware Attack Deploys Malicious Chrome & Edge Extensions To Steal Sensitive Data
- 4:2 : What the Arc Browser Story Reveals About the Future of Browser Security
- 3:6 : Meta, Yandex Covertly Tracked Billions of Android Users, According to Researcher
- 3:6 : Hackers Allegedly Leaked 86 Million AT&T Customer Records with Decrypted SSNs
- 3:5 : IBM Cloud login breaks for second time this week and Big Blue isn’t saying why
- 2:5 : IT Security News Hourly Summary 2025-06-05 03h : 2 posts
- 2:4 : ISC Stormcast For Thursday, June 5th, 2025 https://isc.sans.edu/podcastdetail/9480, (Thu, Jun 5th)
- 0:31 : Statement on California State Senate Advancing Dangerous Surveillance Bill
- 0:6 : Play ransomware crims exploit SimpleHelp flaw in double-extortion schemes
- 23:31 : Top 10 Challenges Implementing DMARC for Microsoft 365
- 23:5 : IT Security News Hourly Summary 2025-06-05 00h : 1 posts
- 23:4 : Feds Seize BidenCash Carding Market and Its Crypto Profits
- 22:55 : IT Security News Daily Summary 2025-06-04
- 22:31 : A guide to risk registers: Benefits and examples
- 22:31 : ICE Quietly Scales Back Rules for Courthouse Raids