134 posts were published in the last hour
- 21:32 : WPA vs. WPA2: Which Is More Secure and How to Switch
- 20:5 : IT Security News Hourly Summary 2025-10-03 21h : 2 posts
- 20:2 : New Playbook Offers Guidelines on Advancing Transformative Responsible AI
- 19:32 : Coordinated Exploitation Campaign Targets Grafana Vulnerability
- 19:2 : Cybercriminals Impersonate FedEx, UPS, Other Brands in New Smishing Campaign
- 19:2 : Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
- 18:3 : Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed
- 18:2 : Top 10 Best End-to-End Threat Intelligence Companies in 2025
- 18:2 : 6 confidential computing use cases that secure data in use
- 18:2 : Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data
- 18:2 : Scattered LAPSUS$ Hunters Announced Salesforce Breach List On New Onion Site
- 18:2 : Top 10 Best Supply Chain Intelligence Security Companies in 2025
- 17:5 : IT Security News Hourly Summary 2025-10-03 18h : 4 posts
- 17:2 : News brief: Cybersecurity weakened by government shutdown
- 17:2 : Innovator Spotlight: Singulr AI
- 17:2 : Microsoft Probes Outlook Bug Blocking Encrypted Emails Across Tenants
- 17:2 : Confucius Espionage: Gang Hijacks to Attack Windows Systems Via Malware
- 17:2 : World’s Largest 22.2Tbps DDoS Attack and Rogue SIM Network Busted by US Secret Service
- 16:32 : Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns
- 16:32 : USENIX 2025: PEPR ’25 – Demystifying The Android Telehealth Ecosystem
- 16:32 : Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
- 16:32 : Renault Group confirms certain UK customer data stolen in third-party breach
- 16:2 : HashiConf highlights security opportunities to support scale
- 16:2 : Top 10 Best Fraud Prevention Companies in 2025
- 16:2 : Oracle investigating extortion emails targeting E-Business Suite customers
- 15:32 : Top 10 Best Supply Chain Risk Management Solutions in 2025
- 15:2 : AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense
- 15:2 : Red Hat fesses up to GitLab breach after attackers brag of data theft
- 15:2 : Asahi Hack Update: Beer-Free Day #5 Dawns in Japanese Ransomware Crisis
- 15:2 : Global Supply Chains at Risk as Indian Third-Party Suppliers Face Rising Cybersecurity Breaches
- 15:2 : Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud
- 14:32 : ProSpy, ToSpy malware pose as Signal and ToTok to steal data in UAE
- 14:32 : Report Details Security Weakness in Comet AI Browser from Perplexity
- 14:5 : IT Security News Hourly Summary 2025-10-03 15h : 9 posts
- 14:3 : The UK Renews Clash with Apple Over Encrypted Data Access
- 14:3 : Apple ices ICE agent tracker app under government heat
- 14:3 : In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach
- 14:2 : Call-Recording App Neon Suspends Service After Security Breach
- 13:33 : Identity-Centric Security: ICAM as a Mission Advantage
- 13:33 : New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
- 13:32 : Rhadamanthys 0.9.2: A Stealer That Keeps Evolving
- 13:32 : ICE Wants to Build Out a 24/7 Social Media Surveillance Team
- 13:32 : Hacking group claims theft of 1 billion records from Salesforce customer databases
- 13:32 : New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
- 13:32 : Munich Airport chaos after drone sightings spook air traffic control
- 13:32 : North Korea Remote Worker Scam Goes Global, Expands Target Industries
- 13:32 : OnePlus Users Face Security Risks from OxygenOS Vulnerability
- 13:32 : IoT Routers Used In Targeted In SMS Phishing
- 13:32 : Georgia Tech Pays 875,000 In Cyber Fraud
- 13:32 : Hackers Target Oracle Apps For Extortion
- 13:32 : Facebook Scams Target Seniors With Malware
- 13:32 : Android Spyware Poses As Signal And Totok
- 13:3 : Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing
- 13:3 : DrayOS Router Flaw Allows Remote Code Execution by Attackers
- 13:2 : Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
- 13:2 : Oneleet Raises $33 Million for Security Compliance Platform
- 13:2 : Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
- 12:32 : Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers
- 12:32 : New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
- 12:32 : From threats to apology, hackers pull child data offline after public backlash
- 12:32 : UK government says digital ID won’t be compulsory – honest
- 12:3 : How Fileless Malware Differs From Traditional Malware Attacks
- 12:3 : Chinese Hackers Compromising High-Value IIS Servers to Manipulate Search Rankings
- 12:3 : DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely
- 12:3 : TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands
- 12:3 : Oracle tells Clop-targeted EBS users to apply July patch, problem solved
- 12:3 : Unauthenticated RCE Flaw Patched in DrayTek Routers
- 12:3 : Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security
- 11:32 : GhostSocks Malware-as-a-Service Turns Compromised Devices into Proxies for Threat Actors
- 11:5 : IT Security News Hourly Summary 2025-10-03 12h : 6 posts
- 11:2 : SideWinder Hacker Group Targets Users with Fake Outlook/Zimbra Portals to Steal Login Credentials
- 11:2 : MokN Raises $3 Million for Phish-Back Solution
- 11:2 : Organizations Warned of Exploited Meteobridge Vulnerability
- 11:2 : New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT
- 11:2 : Hackers Target Unpatched Flaws in Oracle E-Business Suite
- 10:32 : Hackers Exploit Grafana Vulnerability Allowing Arbitrary File Reads
- 10:32 : Threat Actors Mimic Popular Brands to Deceive Users and Deploy Malware in New Wave of Attacks
- 10:32 : Top 10 Best Account Takeover Protection Tools in 2025
- 10:32 : New ‘Point-and-Click’ Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads
- 10:32 : Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware
- 10:32 : SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials
- 10:32 : WestJet Data Breach Impacts 1.2 Million Customers
- 10:2 : What Is Identity Threat Detection and Response?
- 10:2 : Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
- 10:2 : Enterprise Vulnerability Management: Key Processes and Tools
- 10:2 : Top Vulnerability Management Tools for the Future
- 9:32 : WhatsApp Exploited to Spread SORVEPOTEL Malware on Windows Systems
- 9:32 : CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
- 9:3 : New ‘Point-and-Click’ Phishing Kit Evades Security Filters to Deliver Malicious Payloads
- 9:3 : Criminals take Renault UK customer data for a joyride
- 9:3 : Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities
- 9:3 : Your Guide to EDUCAUSE 2025: What Higher-Ed Leaders Need to Know
- 9:2 : Beyond IPs: Why Your Next Firewall Ruleset Will be Written in Identity
- 8:32 : Signal Enhances Security With New Hybrid PQ Ratchet to Compact Quantum Computing Threats
- 8:32 : Confucius Hacker Group Attacking Weaponizing Documents to Compromised Windows Systems With AnonDoor Malware
- 8:32 : HackerOne Paid $81 In Bug Bounty With Emergence of Bionic Hackers
- 8:32 : Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data
- 8:5 : IT Security News Hourly Summary 2025-10-03 09h : 6 posts
- 8:3 : Threat Actors Imitate Popular Brands in New Malware Distribution Campaigns
- 8:3 : IIS Servers Compromised by Chinese Hackers for SEO Manipulation
- 7:32 : Rhadamanthys Stealer Offered on Dark Web for $299–$499
- 7:32 : Oracle Confirms Hackers Target E-Business Suite Data in Extortion Campaigns
- 7:32 : Oracle Confirms that Hackers Targeting E-Business Suite Data With Extortion Emails
- 7:32 : When loading a model means loading an attacker
- 7:32 : Shutdown furloughs CISA, Defender BIOS bug, Motilily dealership cyberattack
- 7:2 : What personal information does the Nintendo Switch 2 collect?
- 7:2 : Red Hat Confirms GitLab Instance Hack, Data Theft
- 6:32 : Hundreds of Free VPN Apps Expose Android and iOS Users’ Personal Data
- 6:32 : Signal Introduces Hybrid Post-Quantum Ratchet to Strengthen Security
- 6:32 : Google warns of Cl0p extortion campaign against Oracle E-Business users
- 6:32 : Protegrity Developer Edition: Free containerized Python package to secure AI pipelines
- 6:3 : Confucius Hacker Group Weaponizes Documents to Infect Windows Systems with AnonDoor Malware
- 6:3 : PoC Released for VMware Workstation Guest-to-Host Escape Vulnerability
- 6:3 : Microsoft Defender Bug Sparks Numerous False BIOS Security Alerts
- 6:3 : HomeRefill – 187,457 breached accounts
- 6:2 : Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories
- 6:2 : Passkeys rise, but scams still hit hard in 2025
- 6:2 : 4 ways to use time to level up your security monitoring
- 5:32 : Over 40% of schools have already experienced AI-related cyber incidents
- 5:32 : Apple strengthens storage flexibility with new disk image formats
- 5:32 : Cybersecurity Today: Red Hat Breach, CLOP Targets Oracle, and CISA Cuts Critical Support
- 5:5 : IT Security News Hourly Summary 2025-10-03 06h : 1 posts
- 5:2 : New Obex Tools Blocks Runtime Loading of EDR Dynamic Libraries
- 5:2 : AI hype hits a wall when the data doesn’t deliver
- 4:2 : New infosec products of the week: October 3, 2025
- 3:2 : Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts
- 2:5 : IT Security News Hourly Summary 2025-10-03 03h : 1 posts
- 2:2 : ISC Stormcast For Friday, October 3rd, 2025 https://isc.sans.edu/podcastdetail/9640, (Fri, Oct 3rd)
- 1:32 : Latest Pilot Jobs – 118,864 breached accounts
- 1:2 : Freedom to Choose: Flexible Secret Scanning Solutions
- 23:5 : IT Security News Hourly Summary 2025-10-03 00h : 4 posts
- 23:2 : Oracle Extortion Case: $50M Demand From ‘Notorious’ Hacking Group
- 22:55 : IT Security News Daily Summary 2025-10-02
- 22:2 : Microsoft Unveils 365 Premium, Its New Top-Tier AI and Productivity Bundle