164 posts were published in the last hour
- 21:32 : China-linked LapDogs Campaign Drops ShortLeash Backdoor with Fake Certs
- 21:32 : Salesforce launches Agentforce 3 with AI agent observability and MCP support
- 21:2 : Google Integrates GenAI to Counter Indirect Prompt Injection Attack Vectors
- 20:36 : UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems
- 20:36 : Cybersecurity Innovations in Software Development: How Developers Are Tackling Security Threats
- 20:36 : LinuxFest Northwest: Applying The Hybrid Threat Modeling Method
- 20:5 : Meta Slams US House Order For Staffers To Not Use WhatApp
- 20:5 : APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign
- 20:5 : Canada says telcos were breached in China-linked espionage hacks
- 20:5 : IT Security News Hourly Summary 2025-06-23 21h : 8 posts
- 19:34 : Improve Your Security with Attack Insights in Web Security Analytics
- 19:34 : RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video
- 19:3 : Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads
- 19:2 : 5 Chromecast features to make the most of your TV (including a smart home hack)
- 19:2 : Iran cyberattacks against US biz more likely following air strikes
- 19:2 : 1inch rolls out expanded bug bounties with rewards up to $500K
- 19:2 : CISPE Data Protection Code of Conduct Public Register now certifies 122 AWS services as adherent
- 18:34 : Man Pleads Guilty To $245m Bitcoin Theft
- 18:34 : What is a SYN flood DoS attack?
- 18:34 : Simbian Advances the AI Frontier With Industry’s First Benchmark for Measuring LLM Performance in the SOC
- 18:3 : What It Really Means to “Try Harder”
- 18:3 : Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls
- 18:3 : UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server
- 18:3 : New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References
- 18:3 : McLaren Health Care Data Breach Exposes 743,000 People Personal Information
- 18:3 : Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs
- 18:2 : Anubis Ransomware Becomes More Destructive With New File-Wiping Feature
- 18:2 : Fake Bitdefender Site Distributes Malware: Cybercriminals Exploit Trusted Brands to Steal Sensitive Data
- 17:5 : IT Security News Hourly Summary 2025-06-23 18h : 11 posts
- 17:3 : A Deep Dive into a Modular Malware Family
- 17:3 : DeepSeek Aided Chinese Military, US Official Alleges
- 17:3 : NASA Shows Photos Of Crashed ispace Lander
- 17:2 : Telegram Purged Chinese Crypto Scam Markets—Then Watched as They Rebuilt
- 17:2 : North Korean Hackers Take Over Victims’ Systems Using Zoom Meeting
- 17:2 : Navigating cyber risks with Microsoft Security Exposure Management eBook
- 16:33 : Scans for Ichano AtHome IP Cameras, (Mon, Jun 23rd)
- 16:33 : Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague
- 16:33 : Why we’re focusing VB Transform on the agentic revolution – and what’s at stake for enterprise AI leaders
- 16:33 : How to turn on Android’s Private DNS mode – and why it’s an absolute must for security
- 16:33 : 5 Chromecast features that maximize your TV’s potential (and a smart home hack)
- 16:33 : 22 free cybersecurity tools you should know about
- 16:32 : AI Deepfake Scams Surge: Over $200 Million Lost in Just Three Months
- 16:32 : Second attack on McLaren Health Care in a year affects 743k people
- 16:32 : Cyberattack Disrupts WestJet Systems as Investigation Begins
- 16:32 : Signs Your Phone Has a Virus and How to Remove It Safely
- 16:32 : Hackers Circumvent AntiVirus Using Google OAuth in New Malware Surge
- 16:32 : DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes
- 16:32 : Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
- 16:31 : Cyber Fattah Leaks Data from Saudi Games in Alleged Iranian Operation
- 15:33 : McLaren Health Care Data Breach Exposes Personal Information of 743,000 Individuals
- 15:32 : Steelmaker Nucor Hacked – Attackers Gained Unauthorized Access to IT Systems
- 15:32 : Hackers Allegedly Selling Intelbras Router 0-Day Exploit on Hacker Forums
- 15:32 : Microsoft Defender for Office 365 to Provide Detailed Results for Spam, Phishing or Clean Emails
- 15:32 : Linux Firewall IPFire 2.29 Core Update 195 Released With VPN Protocol Support
- 15:32 : APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack
- 15:32 : Vulnerability Summary for the Week of June 16, 2025
- 15:32 : Fake Web3 Wallet Prompt Steals $43,000 from CoinMarketCap Users
- 15:5 : Zero-Trust Architecture in the Era of Quantum Computing: A Proactive Defense Strategy
- 15:5 : SparkKitty Targets iOS and Android Devices via App Store and Google Play Attacks
- 15:5 : US insurance giant Aflac says customers’ personal data stolen during cyberattack
- 15:4 : Microsoft will start removing legacy drivers from Windows Update
- 14:37 : Mike Lynch’s Bayesian Superyacht Lifted From Ocean Floor
- 14:37 : North Korean Hackers Weaponize GitHub Infrastructure to Distribute Malware
- 14:37 : DDoS Attack on Financial Sector Triggers Multi-Day Service Outages
- 14:36 : The illusion of control: Can we ever fully secure autonomous industrial systems?
- 14:36 : Defeating PumaBot: How Check Point Quantum IoT Protect Nano Agent Shields Surveillance Devices
- 14:36 : Update Kali Linux to the latest software repository key
- 14:36 : McLaren Health Care data breach impacted over 743,000 people
- 14:36 : Quantum dice: Scientists harness true randomness from entangled photons
- 14:36 : China’s Salt Typhoon Hackers Target Canadian Telecom Firms
- 14:5 : RapperBot Attacking DVRs to Gain Access Over Surveillance Cameras to Record Video
- 14:5 : New AI Jailbreak Bypasses Guardrails With Ease
- 14:5 : CoinMarketCap, Cointelegraph compromised to serve pop-ups to drain crypto wallets
- 14:5 : IT Security News Hourly Summary 2025-06-23 15h : 16 posts
- 14:4 : Okta Cross App Access secures AI agents in the enterprise
- 14:4 : XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks
- 13:32 : Fake DMV Texts Scam Hit Thousands in Widespread Phishing Campaign
- 13:32 : Critical Teleport Vulnerability Allows Remote Authentication Bypass
- 13:32 : Confucius Hackers Target Government and Military Entities Using WooperStealer Malware
- 13:32 : This Linux distro routes all your traffic through the Tor network – and it’s my new favorite for privacy
- 13:32 : Fortinet Partners with FIRST on New Initiative to Build Global Cyber Capacity
- 13:32 : How to Use Open-Source AI in Defense Tech: Cybersecurity Safeguards for Developers
- 13:32 : Okta Introduces Cross App Access to Secure AI Agents in Enterprise
- 13:3 : Fake DMV Texts Scam Thousands in Widespread Phishing Campaign
- 13:3 : BlueNoroff Hackers Exploit Zoom App to Deploy Infostealer Malware in Targeted Attacks
- 13:3 : Shadow Vector Malware Weaponizes SVG Images to Deploy AsyncRAT and RemcosRAT
- 13:2 : North Korean Hackers Weaponizes Github Infrastructure Used to Deliver Malware
- 13:2 : DDoS Attack Crippling Financial Sectors, Leds to Multi-Day Outages
- 13:2 : Microsoft Family Safety Blocking All the Version of Chrome Browsers
- 13:2 : Microsoft Limits Windows 11 24H2 Restore Points From 90 to 60 Days
- 13:2 : Gmail’s multi-factor authentication bypassed by hackers to pull off targeted attacks
- 13:2 : US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes
- 12:34 : Tesla Launches Robotaxi Service In Austin
- 12:34 : Linux-Based Firewall IPFire 2.29 Rolls Out Update 194 with Improved VPN Features
- 12:34 : NCSC Issues Alert on ‘UMBRELLA STAND’ Malware Targeting Fortinet FortiGate Firewalls
- 12:34 : American steel giant Nucor confirms data breach in May attack
- 12:34 : How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout
- 12:5 : Fake Minecraft Mods on GitHub Found Stealing Player Data
- 12:5 : Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis
- 12:4 : Experts count staggering costs incurred by UK retail amid cyberattack hell
- 12:4 : US Braces for Cyberattacks After Bombing Iranian Nuclear Sites
- 12:4 : 743,000 Impacted by McLaren Health Care Data Breach
- 12:4 : Critical Authentication Bypass Flaw Patched in Teleport
- 11:33 : Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability
- 11:33 : Hackers Allegedly Selling Intelbras Router 0-Day Exploit on Dark Web Forums
- 11:33 : Microsoft Reduces Windows 11 24H2 Restore Point Retention from 90 to 60 Days
- 11:33 : Steel Giant Nucor Suffers Cyberattack, IT Systems Breached
- 11:33 : Largest DDoS Attack to Date
- 11:33 : Windows Screencast Snipping Tool Allow Users to Export Captures as GIF
- 11:32 : SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play
- 11:32 : CoinMarketCap Doodle Image Vulnerability Triggered Malicious Code Through an API Call
- 11:32 : Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages
- 11:32 : US Braces for Cyberattacks After Joining Israel-Iran War
- 11:32 : Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777)
- 11:32 : ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
- 11:32 : Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks
- 11:8 : ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
- 11:5 : IT Security News Hourly Summary 2025-06-23 12h : 10 posts
- 10:32 : The best password manager for families in 2025: Expert tested and reviewed
- 10:32 : Taiwan Is Rushing to Make Its Own Drones Before It’s Too Late
- 10:32 : ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
- 10:32 : Closing the Gap Between AI Ambition and Enterprise Reality
- 10:31 : ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
- 10:2 : Stop Blaming CVSS: The Real Problem in Vulnerability Management is Us
- 10:2 : ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More
- 9:34 : Microsoft Family Safety Now Blocking All Versions of Google Chrome
- 9:34 : Clean Up in the Cybersecurity Aisle: Cybercriminals and Groceries
- 9:34 : Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes’ Data from Saudi Games
- 9:34 : The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M
- 9:34 : BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware
- 9:34 : Steelmaker Nucor Says Hackers Stole Data in Recent Attack
- 9:34 : Securing ACH Against Emerging Authentication Bypass Methods
- 9:34 : Cyber Essentials Breaks Quarterly Record for Certifications
- 9:2 : Chinese “LapDogs” ORB Network Targets US and Asia
- 8:38 : Former JBLM Soldier Admits Attempting to Leak U.S. Military Network Details to China
- 8:38 : Stealthy backdoor found hiding in SOHO devices running Linux
- 8:4 : 184 million passwords leaked across Facebook, Google, more: What to know about this data breach
- 8:4 : SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play
- 7:32 : A week in security (June 15 – June 21)
- 7:32 : WormGPT Variants Powered by Grok and Mixtral Have Emerged
- 7:31 : CMS retailer report, Aflac investigates activity, Russian dairy cyberattack
- 7:31 : Cybersecurity Today: Chinese Hackers Target Canadian Telco, U.S. on Alert for Iranian Cyber Retaliation, and Sitecore XB Critical Vulnerability
- 7:6 : Was there a recent dental data breach?
- 7:6 : Windows Snipping Tool Now Lets Users Export Captures as GIFs
- 7:6 : NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls
- 7:6 : Amazon EKS Vulnerabilities Expose Sensitive AWS Credentials and Escalate Privileges
- 6:4 : Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
- 6:4 : Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation
- 6:4 : How CISOs can justify security investments in financial terms
- 5:38 : CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call
- 5:38 : Quantum risk is already changing cybersecurity
- 5:38 : Review: Redefining Hacking
- 4:34 : Medical device cyberattacks push hospitals into crisis mode
- 4:34 : 71% of new hires click on phishing emails within 3 months
- 4:6 : Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025
- 2:34 : Feel Reassured with Advanced Secrets Scanning Technologies
- 2:6 : 
ADS & Python Tools, (Sat, Jun 21st)
- 2:6 : ISC Stormcast For Monday, June 23rd, 2025 https://isc.sans.edu/podcastdetail/9500, (Mon, Jun 23rd)
- 1:9 : Former US Army Sergeant pleads guilty after amateurish attempt at selling secrets to China
- 23:5 : IT Security News Hourly Summary 2025-06-23 00h : 3 posts
- 22:58 : IT Security News Weekly Summary 25
- 22:55 : IT Security News Daily Summary 2025-06-22
- 22:34 : Qilin ransomware gang now offers a “Call Lawyer” feature to pressure victims
- 22:2 : What Satellite Images Reveal About the US Bombing of Iran’s Nuclear Sites