170 posts were published in the last hour
- 21:32 : Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
- 21:32 : Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider
- 21:32 : Friday Squid Blogging: Gonate Squid Video
- 21:32 : Netflix, Apple, BofA websites hijacked with fake help-desk numbers
- 21:32 : Week in Review: ClickFake deepfake scam, Krispy Kreme breach, NIST ZTA guidance
- 21:4 : Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
- 20:34 : Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
- 20:34 : Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself
- 20:5 : Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
- 20:5 : Anthropic study: Leading AI models show up to 96% blackmail rate against executives
- 20:5 : IT Security News Hourly Summary 2025-06-20 21h : 4 posts
- 20:4 : News brief: LOTL attacks, spoofed sites, malicious repositories
- 19:34 : Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
- 19:34 : What is perfect forward secrecy (PFS)?
- 19:4 : Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
- 18:36 : Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
- 18:36 : CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
- 18:36 : US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
- 18:4 : TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
- 18:4 : A Token of Appreciation for Sustaining Donors 💞
- 18:4 : Protect Yourself From Meta’s Latest Attack on Privacy
- 18:4 : Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations
- 18:4 : Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web
- 17:32 : PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
- 17:32 : Your Kubernetes Survival Kit: Master Observability, Security, and Automation
- 17:32 : Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency
- 17:32 : A Token of Appreciation for Sustaining Donors 💞
- 17:32 : Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025
- 17:32 : Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
- 17:7 : New Detection Method Uses Hackers’ Own Jitter Patterns Against Them
- 17:7 : 16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself
- 17:7 : Iran’s government says it shut down internet to protect against cyberattacks
- 17:6 : A Token of Appreciation for Sustaining Donors 💞
- 17:6 : Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds
- 17:5 : IT Security News Hourly Summary 2025-06-20 18h : 8 posts
- 16:32 : Norway Plans Temporary Ban On New Crypto Mining Data Centres
- 16:32 : Hackers Use Social Engineering to Target Expert on Russian Operations
- 16:32 : 16 Billion Credentials Leaked, Though Some Critics Question the Data
- 16:32 : Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT
- 16:32 : A Token of Appreciation for Sustaining Donors 💞
- 16:32 : Fake Resumes Become Weapon of Choice for FIN6 Threat Group
- 16:32 : Smartwatches: New Air-Gapped System Assault Vehicle
- 16:32 : Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
- 16:4 : I found the easiest way to delete myself from the internet (and you shouldn’t wait to use it, too)
- 16:4 : A Token of Appreciation for Sustaining Donors 💞
- 15:36 : A Token of Appreciation for Sustaining Donors 💞
- 15:7 : BBC Warns Perplexity Of Legal Action Over Content Use
- 15:7 : Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
- 15:7 : Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds
- 15:7 : A Token of Appreciation for Sustaining Donors 💞
- 15:7 : The Digital Pandemic: Inside 2024’s Most Devastating Cyber Breaches
- 14:35 : What is risk assessment?
- 14:34 : Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number
- 14:34 : A Token of Appreciation for Sustaining Donors 💞
- 14:5 : IT Security News Hourly Summary 2025-06-20 15h : 14 posts
- 14:3 : In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
- 13:32 : Massive DDoS Attack Hits 7.3 Tbps Delivering 37.4 Terabytes in 45 Seconds
- 13:32 : Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
- 13:32 : World Economic Forum Meeting on Rethinking Cyber Resilience: A Fortinet Q&A
- 13:32 : Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware
- 13:31 : A Token of Appreciation for Sustaining Donors 💞
- 13:31 : M&S and Co-op Hacks Classified as Single Cyber Event
- 13:5 : The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security
- 13:4 : Azure Misconfiguration Lets Attackers Take Over Cloud Infrastructure
- 13:4 : How to turn off ACR on your TV (and what your TV stops tracking when you do)
- 13:4 : A Token of Appreciation for Sustaining Donors 💞
- 13:4 : Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
- 13:4 : Personal Data of Oxford City Council Officers Exposed
- 12:32 : New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack
- 12:32 : Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware
- 12:32 : Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection
- 12:31 : A Token of Appreciation for Sustaining Donors 💞
- 12:31 : Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
- 12:5 : Waymo Applies For New York Testing Permit
- 12:5 : AntiDot 3-in-1 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
- 12:5 : A Token of Appreciation for Sustaining Donors 💞
- 12:5 : Godfather Android Trojan Creates Sandbox on Infected Devices
- 12:4 : Microsoft boosts default security of Windows 365 Cloud PCs
- 12:4 : Meta To Introduce Full Passkey Support for Facebook on Mobiles
- 11:32 : Oxford City Council Hit by Cyberattack Exposing Employee Personal Data
- 11:31 : A Token of Appreciation for Sustaining Donors 💞
- 11:31 : Motors Theme Vulnerability Exploited to Hack WordPress Websites
- 11:6 : Resurgence of the Prometei Botnet
- 11:6 : GodFather Android Malware Uses On-Device Virtualization to Hijack Legitimate Banking Apps
- 11:6 : Versa Director Flaws Let Attackers Execute Arbitrary Commands
- 11:5 : 184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach
- 11:5 : Your Android phone is getting a big security upgrade for free – these Pixel models included
- 11:5 : Linux flaws chain allows Root access across major distributions
- 11:5 : Surveillance in the US
- 11:5 : ClamAV 1.4.3 and 1.0.9 Released With Fix for Vulnerabilities that Enable Remote Code Execution
- 11:5 : New TxTag Phishing Attack Leverages .gov Domain to Trick Employees
- 11:5 : A Token of Appreciation for Sustaining Donors 💞
- 11:5 : IT Security News Hourly Summary 2025-06-20 12h : 12 posts
- 11:5 : Attack on Oxford City Council exposes 21 years of election worker data
- 11:4 : FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks
- 11:4 : Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
- 11:4 : 6 Steps to 24/7 In-House SOC Success
- 10:4 : Microsoft Introduces Enhanced Security Defaults for Windows 365 Cloud PCs
- 10:4 : Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
- 10:4 : A Token of Appreciation for Sustaining Donors 💞
- 9:35 : Dover Fueling Solutions Flaw Lets Attackers Control Fueling Operations
- 9:34 : 200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
- 9:34 : PowerShell Loaders With In-Memory Execution Techniques To Evade Disk-Based Detection
- 9:34 : Hackers Exploit Atlassian’s Model Context Protocol by Submitting a Malicious Support Ticket
- 9:34 : Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack
- 9:34 : A Token of Appreciation for Sustaining Donors 💞
- 9:34 : Cloudflare Tunnels Abused in New Malware Campaign
- 9:34 : DuckDuckGo’s Scam Blocker now blocks more types of scams
- 9:34 : UK Gov Cybersecurity Jobs Average Salary is Under £45,000, Study Finds
- 8:54 : Securing Embedded IoT Devices Through Hardware-backed Root of Trust
- 8:34 : A ransomware attack pushed the German napkin firm Fasana into insolvency
- 8:34 : What’s OpenID Connect (OIDC) and Why Should You Care?
- 8:34 : Is Your CISO Ready to Flee?
- 8:34 : 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
- 8:7 : Apache SeaTunnel Flaw Lets Unauthorized Users Launch Deserialization Attacks
- 8:7 : IBM QRadar SIEM Bug Lets Attackers Run Arbitrary Commands
- 8:7 : 16 Billion Passwords Stolen From 320 Million+ Computers Leaked Online
- 8:7 : AntiDot – 3-in-1 Android Malware Let Attackers Full Control of Compromised Devices
- 8:7 : Massive 16 Billion Passwords From Apple, Facebook, Google and More Leaked From 320 Million Computers
- 8:6 : A Token of Appreciation for Sustaining Donors 💞
- 8:6 : 161,000 People Impacted by Krispy Kreme Data Breach
- 8:6 : Amazon Linux 2023 achieves FIPS 140-3 validation
- 8:6 : Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
- 8:5 : IT Security News Hourly Summary 2025-06-20 09h : 8 posts
- 7:32 : What can I do with a VPN?
- 7:32 : A Token of Appreciation for Sustaining Donors 💞
- 7:31 : Cisco, Atlassian fixes, Ryuk member arrested, Viasat Typhoon attack
- 7:6 : IBM QRadar SIEM Vulnerabilities Allows Attackers to Execute Arbitrary Commands
- 7:6 : A Token of Appreciation for Sustaining Donors 💞
- 7:6 : Hackers Access Legacy Systems in Oxford City Council Cyberattack
- 6:32 : A Token of Appreciation for Sustaining Donors 💞
- 6:32 : Is Cold Email Still Effective in 2025? Best Practices for Outreach and Security
- 6:32 : Strategies to secure long-life IoT devices
- 6:32 : Exposing Cybersecurity Threats: Breaches, Vulnerabilities, and Evolving Malware
- 6:5 : Tesla Wall Connector Hacked Through Charging Port in Just 18 Minutes
- 6:5 : Alert: Billions of Logins Exposed in Massive Data Leak – Change Your Password Now
- 6:5 : GodFather Android Malware Leverages On-Device Virtualization Technique to Hijack Legitimate Banking Apps
- 6:5 : A Token of Appreciation for Sustaining Donors 💞
- 5:33 : Malicious Support Tickets Let Hackers Exploit Atlassian’s Model Context Protocol
- 5:33 : A Token of Appreciation for Sustaining Donors 💞
- 5:33 : Zoomcar Data Breach Exposes Personal Information of 8.4 Million Users
- 5:32 : CISOs flag gaps in GenAI strategy, skills, and infrastructure
- 5:5 : IT Security News Hourly Summary 2025-06-20 06h : 3 posts
- 5:2 : A Token of Appreciation for Sustaining Donors 💞
- 5:2 : AI Index 2025: What’s changing and why it matters
- 5:2 : Who’s guarding the AI? Even security teams are bypassing oversight
- 4:32 : A Token of Appreciation for Sustaining Donors 💞
- 4:32 : New infosec products of the week: June 20, 2025
- 4:4 : A Token of Appreciation for Sustaining Donors 💞
- 3:34 : Tesla Wall Connector Charger Hacked Through Charging Port in 18-Minute Attack
- 3:34 : A Token of Appreciation for Sustaining Donors 💞
- 3:2 : A Token of Appreciation for Sustaining Donors 💞
- 2:34 : A Token of Appreciation for Sustaining Donors 💞
- 2:34 : The Identity Gaps in Agentic AI: 9 Problems We Must Solve to Secure the Future
- 2:34 : A New Identity Playbook for AI Agents: Securing the Agentic User Flow
- 2:5 : IT Security News Hourly Summary 2025-06-20 03h : 3 posts
- 2:4 : ISC Stormcast For Friday, June 20th, 2025 https://isc.sans.edu/podcastdetail/9498, (Fri, Jun 20th)
- 2:4 : A Token of Appreciation for Sustaining Donors 💞
- 1:39 : A Token of Appreciation for Sustaining Donors 💞
- 1:9 : A Token of Appreciation for Sustaining Donors 💞
- 0:36 : A Token of Appreciation for Sustaining Donors 💞
- 0:36 : Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security
- 0:5 : A Token of Appreciation for Sustaining Donors 💞
- 23:34 : A Token of Appreciation for Sustaining Donors 💞
- 23:5 : IT Security News Hourly Summary 2025-06-20 00h : 3 posts
- 23:4 : A Token of Appreciation for Sustaining Donors 💞
- 22:55 : IT Security News Daily Summary 2025-06-19
- 22:32 : A Token of Appreciation for Sustaining Donors 💞
- 22:31 : Be Optimistic About the Future of Secrets Management
- 22:6 : A Token of Appreciation for Sustaining Donors 💞