127 posts were published in the last hour
- 21:32 : Renault UK Customer Records Stolen in Third-Party Breach
- 21:32 : Top 10 Best Brand Protection Solutions for Enterprises in 2025
- 21:2 : Hacker Stole Sensitive Data From FEMA, Border Patrol: Reports
- 20:32 : Security update: Incident related to Red Hat Consulting GitLab instance
- 20:32 : How Red Hat can support your journey to a standard operating environment
- 20:5 : IT Security News Hourly Summary 2025-10-02 21h : 5 posts
- 20:3 : Securing the Model Context Protocol (MCP): New AI Security Risks in Agentic Workflows
- 20:3 : Microsoft Launches Security Store to Unify AI-Powered Defense Tools
- 20:2 : Silent Smishing: Abuse of Cellular Router APIs in Phishing Campaigns
- 20:2 : Cybersecurity at Risk: CISA 2015 Lapses Amid Government Shutdown
- 18:32 : How to Find Local File Inclusion (LFI) Vulnerabilities in WordPress Plugins and Themes
- 18:32 : How to Create an Incident Response Plan (+ Free Template)
- 18:32 : CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
- 18:32 : Microsoft to Launch New Secure Default Settings for Exchange and Teams APIs
- 18:32 : Your Meta AI conversations may come back as ads in your feed
- 18:2 : Family group chats: Your (very last) line of cyber defense
- 18:2 : Humanoid Robots are Walking Trojan Horses — And They’re Already in the Workplace
- 18:2 : Microsoft named a Leader in the IDC MarketScape for XDR
- 17:32 : Top 10 Best End-to-End Threat Intelligence Compaines in 2025
- 17:32 : Top 10 Best Cyber Threat Intelligence Companies in 2025
- 17:32 : Top 10 Best Digital Risk Protection (DRP) Platforms in 2025
- 17:32 : Subpoena tracking platform blames outage on AWS social engineering attack
- 17:32 : How to Build Apps That Are Secure, Fast, and Accessible
- 17:32 : Survey Surfaces Extent to Which Cybersecurity Teams Are Drowning in Alerts
- 17:5 : IT Security News Hourly Summary 2025-10-02 18h : 7 posts
- 17:2 : How to Clean Your Phone from Virus for Free in 4 Simple Steps
- 17:2 : CISA Releases Two Industrial Control Systems Advisories
- 17:2 : Co-op Faces Heavy Financial Losses Following April Cyberattack
- 17:2 : Hackers claim to have plundered Red Hat’s GitHub repos
- 17:2 : Defending against supply chain attacks like Chalk/Debug and the Shai-Hulud worm
- 16:33 : Daniel Miessler on the AI Attack/Defense Balance
- 16:33 : Decentralized AI Emerges as Counterweight to Big Tech Dominance
- 16:33 : Gemini in Chrome: Google Can Now Track Your Phone
- 16:32 : Hackers claiming ties to Clop launch wide extortion campaign targeting corporate executives
- 16:32 : UNFI reports solid results as it recovers from cyberattack
- 16:5 : Raise3D Pro2 Series 3D Printers
- 16:4 : Small Business Cybersecurity Statistics in 2025
- 15:32 : Allianz Life data breach impacted 1.5 Million people
- 15:32 : PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability
- 15:32 : New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime
- 15:32 : Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
- 15:32 : US Government Shutdown to Slash Federal Cybersecurity Staff
- 15:3 : The Digital Campus Challenge: Why Universities Need to Reassess Cyber Risks
- 15:3 : Infrastructure as Code (IaC) in a Multi-Cloud Environment: Consistency and Security Issues
- 15:3 : Hackers are sending extortion emails to executives after claiming Oracle apps’ data breach
- 15:3 : Karnataka Tops Cybercrime Cases in India with Bengaluru Emerging as the Epicenter
- 15:3 : The Digital Economy’s Hidden Crisis: How Cyberattacks, AI Risks, and Tech Monopolies Threaten Global Stability
- 15:3 : OpenSSL 3.6.0: New features, crypto support
- 15:3 : Extortion Emails Sent to Executives by Self-Proclaimed Clop Gang Member
- 14:33 : More .well-known Scans, (Thu, Oct 2nd)
- 14:33 : Wordfence Intelligence Weekly WordPress Vulnerability Report (September 22, 2025 to September 28, 2025)
- 14:33 : $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk
- 14:33 : DeepSeek AI Models Are Easier to Hack Than US Rivals, Warn Researchers
- 14:33 : Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency
- 14:33 : API Attack Awareness: Broken Object Level Authorization (BOLA) – Why It Tops the OWASP API Top 10
- 14:32 : Google Mandiant: Emails Sent to Corporate Execs Claiming Oracle Data Theft
- 14:32 : Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
- 14:5 : IT Security News Hourly Summary 2025-10-02 15h : 8 posts
- 14:2 : Unpack IPTables: Its Inner Workings With Commands and Demos
- 14:2 : Last chance alert: Founder and Investor Bundle savings for TechCrunch Disrupt 2025 ends tomorrow
- 14:2 : Scam Facebook groups send malicious Android malware to seniors
- 14:2 : Confucius Shifts from Document Stealers to Python Backdoors
- 13:32 : Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite
- 13:32 : Amazon Prime Day 2025: The Dark Side of Deals
- 13:32 : Confucius Espionage: From Stealer to Backdoor
- 13:32 : The Spectrum of Google Product Alternatives
- 13:32 : Project Zero Exposes Apple ASLR Bypass via NSDictionary Serialization Flaw
- 13:32 : Oracle customers targeted with emails claiming E-Business Suite breach, data theft
- 13:2 : Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities
- 13:2 : Clop-linked crims shake down Oracle execs with data theft claims
- 13:2 : 1.2 Million Impacted by WestJet Data Breach
- 13:2 : Free VPN Apps Found Riddled With Security Flaws
- 12:33 : EU funds are flowing into spyware companies, and politicians are demanding answers
- 12:32 : Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
- 12:32 : ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
- 12:32 : Automating Pentest Delivery: 7 Key Workflows for Maximum Impact
- 12:3 : Oneleet raises $33M to shake up the world of security compliance
- 12:3 : 766,000 Impacted by Data Breach at Dealership Software Provider Motility
- 12:3 : Fake npm Package Hijacks Postmark Emails in Supply Chain Breach
- 11:32 : WireTap Attack Breaks Intel SGX Security
- 11:32 : How to Close Threat Detection Gaps: Your SOC’s Action Plan
- 11:5 : IT Security News Hourly Summary 2025-10-02 12h : 9 posts
- 11:3 : Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
- 11:3 : Expired US Cyber Law Puts Data Sharing and Threat Response at Risk
- 10:32 : Malicious ZIP Files Use Windows Shortcuts to Drop Malware
- 10:32 : Cybercriminals Claim Theft of Data From Oracle E-Business Suite Customers
- 10:32 : Allianz Life July Breach Hits 1.5M
- 10:32 : MatrixPDF Toolkit Turns PDFs Into Lures
- 10:32 : Outlook Bug Causes Repeated Crashes
- 10:32 : Smishing targets routers in Belgium 2025
- 10:32 : Dealership Software Breach Hits 766k
- 10:2 : UAT-8099: Chinese-speaking cybercrime group targets high-value IIS for SEO fraud
- 10:2 : Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
- 10:2 : Zania Raises $18 Million for AI-Powered GRC Platform
- 10:2 : Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
- 9:32 : Cybercrims claim raid on 28,000 Red Hat repos, say they have sensitive customer files
- 9:32 : Reducing Mean Time to Remediation (MTTR) with Automated Policy Workflows
- 9:32 : Insider Threat Intelligence Solutions | Trend Analysis Report
- 9:32 : ProSpy and ToSpy: New spyware families impersonating secure messaging apps
- 9:32 : Forrester: Agentic AI-Powered Breach Will Happen in 2026
- 9:3 : Small Businesses and Ransomware: Navigating the AI Era Threat
- 9:3 : TOTOLINK X6000R Routers Hit by Three Vulnerabilities Allowing Remote Code Execution
- 9:3 : Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser
- 9:3 : Sendit tricked kids, harvested their data, and faked messages, FTC claims
- 9:3 : Phishing Dominates EU-Wide Intrusions, says ENISA
- 8:32 : Termix Docker Image Leaking SSH Credentials (CVE-2025-59951)
- 8:32 : China-linked APT Phantom Taurus uses Net-Star malware in espionage campaigns against key sectors
- 8:32 : 1.5 Million Impacted by Allianz Life Data Breach
- 8:5 : IT Security News Hourly Summary 2025-10-02 09h : 2 posts
- 7:32 : Microsoft Outlook for Windows Bug Leads to Crash While Opening Email
- 7:32 : Breaches set for North America, Outlook bug needs Microsoft support, Air Force admits SharePoint issue
- 6:33 : Chekov: Open-source static code analysis tool
- 6:33 : Building a mature automotive cybersecurity program beyond checklists
- 6:3 : Chrome Security Update Addressing 21 Vulnerabilities
- 5:32 : Splunk Enterprise Flaws Allow Attackers to Run Unauthorized JavaScript Code
- 5:32 : Microsoft Outlook Bug on Windows Devices Results in Repeated Email Crashes
- 5:32 : The energy sector is ground zero for global cyber activity
- 5:32 : GPT needs to be rewired for security
- 5:2 : Google Drive Desktop Gets AI-Powered Ransomware Detection to Block Cyberattacks
- 5:2 : Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code
- 5:2 : Biotech platforms keep missing the mark on security fundamentals
- 4:32 : Underwriting is shifting to AI-driven, real-time decisions by 2030
- 3:2 : Moline-Coal Valley School District Shifts from Reactive to Proactive Student Safety & Google Security
- 2:2 : ISC Stormcast For Thursday, October 2nd, 2025 https://isc.sans.edu/podcastdetail/9638, (Thu, Oct 2nd)
- 23:5 : IT Security News Hourly Summary 2025-10-02 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-10-01
- 22:31 : USENIX 2025: PEPR ’25 – Network Structure And Privacy: The Re-Identification Risk In Graph Data