136 posts were published in the last hour
- 21:32 : Discord discloses third-party breach affecting customer support data
- 20:32 : How Can IT Security Professionals Best Navigate the CMMC Maze?
- 20:32 : What Security Teams Are Looking for in Identity Management Today
- 20:32 : From Fortresses to Zero-Trust: What Baghdad’s Green Zone Teaches Us About Modern Cybersecurity
- 20:5 : IT Security News Hourly Summary 2025-10-06 21h : 4 posts
- 20:2 : ONE9 Spotlights ADAMnetworks Technologies in New Featurette
- 18:32 : Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users
- 18:32 : 2025-10-01: Possible Rhadamanthys disguised as cracked version of popular software
- 18:32 : CISA Adds Seven Known Exploited Vulnerabilities to Catalog
- 18:32 : Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
- 18:3 : Paris, France, October 6th, 2025, CyberNewsWire
- 18:3 : Developer Journey: Debug Complex Systems With Zero Context
- 18:3 : Most People Can’t Tell AI Phishing Emails from the Real Thing
- 18:3 : Combat Over Cyber: Pentagon Rewrites Training Priorities
- 18:3 : Phishers target 1Password users with convincing fake breach alert
- 18:3 : Ghosts in the Machine: ASCII Smuggling across Various LLMs – FireTail Blog
- 17:32 : Clop hackers caught exploiting Oracle zero-day bug to steal executives’ personal data
- 17:5 : IT Security News Hourly Summary 2025-10-06 18h : 6 posts
- 17:3 : NSSF Sued for Secretly Using Gun Owners’ Data in Political Ads
- 16:32 : Reemo Unveils Bastion+: A Scalable Solution for Global Privileged Access Management
- 16:32 : Threat Actors Claim Breach Of Huawei Technologies Source Code and Internal Tools
- 16:32 : Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day
- 16:2 : Scattered Lapsus$ Hunters offering $10 in Bitcoin to ‘endlessly harass’ execs
- 16:2 : Mobile App Security: Why It’s Still the Weakest Link in Enterprise Defense
- 16:2 : Europol Calls for Stronger Data Laws to Combat Cybercrime
- 15:32 : What’s there to save about social media? (Lock and Code S06E20)
- 15:32 : WestJet Confirms Cyberattack Exposed Passenger Data but No Financial Details
- 15:32 : Hackers steal sensitive Red Hat customer data after breaching GitLab repository
- 15:3 : NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks
- 15:3 : Forensic-Timeliner – Windows Forensic Tool for DFIR Investigators
- 15:3 : Doctors Imaging Group Suffers Data Breach – 171800+ Users Data Exposed
- 15:3 : Discord Says User Information Stolen in Third-Party Data Breach
- 15:3 : Inside the Hacker’s Playbook—Adversarial AI Up Close
- 15:2 : WestJet Confirms Cyberattack Exposed Passenger Data but Says Financial Details Remain Safe
- 15:2 : Ransomware Group “Trinity of Chaos” Launches Data Leak Site
- 14:32 : Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data
- 14:32 : Inside Microsoft’s AI bet with CTO Kevin Scott at TechCrunch Disrupt 2025
- 14:32 : LinkedIn sues ProAPIs for $15K/Month LinkedIn data scraping scheme
- 14:32 : Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
- 14:32 : Critical WhatsApp Zero Click Vulnerability Abused with DNG Payload
- 14:32 : Harrods Confirms Data Breach Exposing 430,000 Customer Records
- 14:32 : AI Turns Personal: Criminals Now Cloning Loved Ones to Steal Money, Warns Police
- 14:32 : Hackers launch data leak site to extort 39 victims, or Salesforce
- 14:32 : New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations
- 14:5 : IT Security News Hourly Summary 2025-10-06 15h : 14 posts
- 14:2 : How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
- 13:32 : New ‘Fully Undetectable’ Android RAT Discovered on GitHub
- 13:32 : Radiant Group won’t touch kids’ data now, but apparently hospitals are fair game
- 13:32 : Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk
- 13:32 : Sora 2 Unveiled To Mixed Reviews
- 13:3 : Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools
- 13:3 : Zero Trust Access Made Simple for Contractors
- 13:3 : Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges
- 13:3 : Qantas Wins Injunction Before Data Leak
- 13:3 : Abracadabra Hit by Third DeFi Hack
- 13:2 : Extortion Group Launches Salesforce Data Leak
- 13:2 : Oracle Issues Security Alert
- 13:2 : Discord Reveals Data Breach Incident
- 12:32 : Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882) [UPDATED[, (Mon, Oct 6th)
- 12:32 : Thieves steal IDs and payment info after data leaks from Discord support vendor
- 12:32 : Scattered Lapsus$ Hunters Extorts Victims, Demands Salesforce Negotiate
- 12:32 : eBook: Defending Identity Security the Moment It’s Threatened
- 12:32 : 5 Critical Questions For Adopting an AI Security Solution
- 12:32 : ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More
- 12:3 : Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation
- 12:2 : TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
- 12:2 : Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
- 11:32 : Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
- 11:32 : AI in the 2026 Midterm Elections
- 11:32 : Hackers Extorting Salesforce After Stealing Data From Dozens of Customers
- 11:5 : IT Security News Hourly Summary 2025-10-06 12h : 9 posts
- 11:3 : Technical Details and Exploit Released for Chrome Remote Code Execution Flaw
- 11:2 : Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality
- 11:2 : Google Chrome RCE Vulnerability Details Released Along with Exploit Code
- 11:2 : How to set up two-factor authentication (2FA) on your Facebook account
- 11:2 : Jaguar Land Rover engines ready to roar again after weeks-long cyber stall
- 11:2 : Data Breach at Doctors Imaging Group Impacts 171,000 People
- 11:2 : The Political Weaponization of Cybersecurity
- 10:32 : Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login
- 10:32 : Vulnerability Management and Patch Management: How They Work Together
- 10:32 : Vibe Coding Is the New Open Source—in the Worst Way Possible
- 10:2 : Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files
- 10:2 : Clop crew hits Oracle E-Business Suite users with fresh zero-day
- 10:2 : $4.5 Million Offered in New Cloud Hacking Competition
- 10:2 : Scanning of Palo Alto Portals Surges 500%
- 9:32 : Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution
- 9:32 : PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access
- 9:32 : Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
- 9:32 : From Deception to Defense: Understanding and Combating Phishing
- 9:32 : Asahi Confirms Ransomware Attack, Data Stolen from Servers
- 9:2 : Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
- 9:2 : Leak suggests US government is fibbing over FEMA security failings
- 8:32 : Zimbra users targeted in zero-day exploit using iCalendar attachments
- 8:32 : How we trained an ML model to detect DLL hijacking
- 8:32 : Sometimes Your Startup Hasn’t Failed, You’re Just Too Early
- 8:32 : Renault Informs Customers of Supply Chain Data Breach
- 8:5 : IT Security News Hourly Summary 2025-10-06 09h : 6 posts
- 8:2 : Detecting DLL hijacking with machine learning: real-world cases
- 8:2 : Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks
- 8:2 : Beer Giant Asahi Says Data Stolen in Ransomware Attack
- 7:32 : Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
- 7:32 : Reading the ENISA Threat Landscape 2025 report
- 7:32 : How Windows Command-line Utility PsExec Can Be Abused To Execute Malicious Code
- 7:32 : QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code
- 7:32 : Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
- 7:32 : A week in security (September 29 – October 5)
- 7:32 : Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
- 7:32 : ParkMobile breach settlement, UK schools vulnerable, Zimbra calendar attacks
- 7:2 : JLR cyberattack: How one hack devastated Britain’s Biggest carmaker
- 7:2 : Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
- 6:32 : Hackers Turn AWS X-Ray into Command-and-Control Platform
- 6:32 : QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution
- 6:32 : Asgard Malware Protector Reversed: Researchers Expose Its Antivirus Bypass Methods
- 6:32 : PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability
- 6:2 : How to succeed at cybersecurity job interviews
- 6:2 : Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks
- 5:32 : PoC Published for Sudo Flaw Lets Attackers Escalate to Root
- 5:32 : PoC Released for Remotely Exploitable Oracle E-Business Suite 0-Day
- 5:32 : WARMCOOKIE Malware Operators Introduce Advanced Capabilities
- 5:32 : Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files
- 5:32 : Proxmox Mail Gateway: Open-source email security solution reaches version 9.0
- 5:32 : Meet ARGUS, the robot built to catch hackers and physical intruders
- 5:32 : AI Browser Steals Data
- 5:5 : IT Security News Hourly Summary 2025-10-06 06h : 3 posts
- 4:32 : CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
- 4:32 : Phishing is old, but AI just gave it new life
- 4:32 : Old authentication habits die hard
- 4:2 : Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
- 3:32 : A breach every month raises doubts about South Korea’s digital defenses
- 3:32 : Discord customer service data breached; Government-ID images, and user details stolen
- 3:2 : ISC Stormcast For Monday, October 6th, 2025 https://isc.sans.edu/podcastdetail/9642, (Mon, Oct 6th)
- 23:5 : IT Security News Hourly Summary 2025-10-06 00h : 6 posts
- 22:58 : IT Security News Weekly Summary 40
- 22:55 : IT Security News Daily Summary 2025-10-05
- 22:2 : iPhone Software Update Failed? Here’s How to Fix It Without Data Loss
- 22:2 : Android Not Reading SD Card? Here’s How to Fix it