196 posts were published in the last hour
- 21:32 : Microsoft Windows 11 Insider Preview Build 26200.5600 Released
- 21:32 : Intel’s data-leaking Spectre defenses scared off yet again
- 21:4 : Microsoft Patch Tuesday for May 2025 — Snort rules and prominent vulnerabilities
- 21:4 : CISA Statement on Cyber-Related Alerts and Notifications
- 21:4 : CISA Adds TeleMessage Vulnerability to KEV List Following Breach
- 21:4 : How Interlock Ransomware Affects the Defense Industrial Base Supply Chain
- 21:4 : Qatar’s $400M jet for Trump is a gold-plated security nightmare
- 20:32 : How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
- 20:32 : May 2025 Patch Tuesday Analysis
- 20:32 : Seven things we learned from WhatsApp vs. NSO Group spyware lawsuit
- 20:32 : Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network
- 20:31 : Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges
- 20:31 : Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges
- 20:31 : Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 With May Patch Tuesday
- 20:6 : The best VPN services for iPhone in 2025: Expert tested and reviewed
- 20:6 : Adobe Patches Big Batch of Critical-Severity Software Flaws
- 20:6 : Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- 20:5 : IT Security News Hourly Summary 2025-05-13 21h : 18 posts
- 19:32 : AI power rankings upended: OpenAI, Google rise as Anthropic falls, Poe report finds
- 19:32 : Microsoft to Lay Off About 3% of Its Workforce
- 19:31 : BSidesLV24 – GroundFloor – Pipeline Pandemonium: How To Hijack The Cloud And Make It Rain Insecurity
- 19:31 : AI lifecycle risk management: ISO/IEC 42001:2023 for AI governance
- 19:2 : Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day
- 19:2 : Google’s Advanced Protection for Vulnerable Users Comes to Android
- 19:2 : Marks and Spencer confirms data breach after April cyber attack
- 19:2 : Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)
- 18:32 : Zoom Fixes High-Risk Flaw in Latest Update
- 18:32 : Critical Ivanti ITSM Vulnerability Let Remote Attacker Gain Administrative Access
- 18:32 : FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code
- 18:32 : Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation
- 18:32 : Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day
- 18:32 : Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild
- 18:31 : Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
- 18:31 : Network Security Policy Management (NSPM) in 2025
- 18:7 : Microsoft Patch Tuesday: May 2025, (Tue, May 13th)
- 18:7 : Marks & Spencer Warns Customers Over Data Theft
- 18:6 : Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now
- 18:6 : In the New Era of Cybersecurity, Here’s What’s Driving Long-Term Resilience
- 18:6 : Commvault fixes critical Command Center issue after flaw finder alert
- 18:6 : How to safely change your name without putting your identity at risk
- 17:32 : Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild
- 17:32 : How can an enterprise mobile VPN fit into a mobility plan?
- 17:31 : Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud
- 17:31 : Ivanti EPMM vulnerabilities exploited in the wild (CVE-2025-4427, CVE-2025-4428)
- 17:5 : IT Security News Hourly Summary 2025-05-13 18h : 11 posts
- 17:4 : Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance
- 17:4 : Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies
- 17:4 : No, Microsoft has not changed Windows 10 or Microsoft 365 support deadlines (again)
- 17:4 : Your Android phone is getting a huge security upgrade for free – what’s new
- 17:4 : Google announces new security features for Android for protection against scam and theft
- 16:34 : PrepHero-Linked Database Exposed Data of 3M Students and Coaches
- 16:34 : Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords
- 16:33 : Swan Vector APT Targets Organizations with Malicious LNK and DLL Implants
- 16:33 : Hitachi Energy Service Suite
- 16:33 : Hitachi Energy MACH GWS Products
- 16:33 : Hitachi Energy Relion 670/650/SAM600-IO Series
- 16:33 : ABB Automation Builder
- 16:33 : In The New Era of Cybersecurity, Here’s What’s Driving Long-Term Resilience
- 16:33 : Ivanti Releases Critical Security Update for EPMM After Limited Exploits Discovered
- 16:33 : FortiOS Authentication Bypass Vulnerability Lets Attackers Take Full Control of Device
- 16:33 : Cyber War Escalates Between Indian and Pakistani Hacktivists After Pahalgam Attack
- 16:33 : Linux Servers Under Attack: Hidden Malware Found in Fake Go Packages
- 16:32 : Worldcoin in Crisis: Indonesia & Kenya Take Action on the Biometric Crypto Project
- 16:32 : NordVPN Introduces £5,000 ID Theft Recovery Coverage for UK Users on Ultimate Plan
- 16:5 : 50,000 WordPress Sites Affected by PHP Object Injection Vulnerability in Uncanny Automator WordPress Plugin
- 16:5 : Government email alert system GovDelivery used to send scam messages
- 16:5 : Swan Vector APT Hackers Attacking Organizations With Malicious LNK & DLL Implants
- 16:4 : 5 Ways Threat Intelligence Helps Against Phishing Attacks
- 16:4 : Marks & Spencer Confirmed Customer Data Theft in Recent Cyber Attack
- 16:4 : Researchers Proposed Mythic Framework Agent to Boost Pentesting Tool Performances
- 16:4 : Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads
- 16:4 : China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
- 16:4 : Turkey-Aligned Hackers Targeted Iraq-Based Kurds with Zero-Day Exploit
- 16:4 : Mapping AWS security services to MITRE frameworks for threat detection and mitigation
- 15:32 : Now ransomware starts infecting Central Processing Units aka CPUs
- 15:32 : iClicker Website Hacked with Fake CAPTCHA in ClickFix Attack
- 15:32 : RSAC Conference 2025
- 15:32 : DPRK-Backed TA406 Targets Ukraine With Malware Campaigns
- 15:4 : Cybercrime Syndicate Escalates Global Threat Levels
- 14:32 : An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado
- 14:32 : Zoom Workplace Apps Vulnerabilities Let Attackers Escalate Privileges
- 14:32 : Apache Superset Vulnerability Let Attackers Takeover Resource Ownership
- 14:32 : Hackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwords
- 14:32 : VMware Aria XSS Vulnerability Let Attackers Steal Access Token of Logged in User
- 14:32 : Scattered Spider Attacking UK Retail Organizations in Supply Chain Attack
- 14:32 : Top 5 Cybersecurity Automation Tools Transforming Risk Management
- 14:32 : Apple Device Users Can File Claims in $95 Million Siri Spying Settlement
- 14:32 : AI Can Now Shop for You: Visa’s Smart Payment Platform
- 14:31 : CISA Shifts Alert Distribution Strategy to Email, Social Media
- 14:7 : Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack
- 14:7 : With the Right Tools, You Can Prevent This Healthcare Scam from Hurting Employees
- 14:6 : ‘We still have embeds in CISA’: CTO of Brit cyber agency talks post-Trump relationship with US counterpart
- 14:6 : Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources
- 14:6 : Tufin TOS Discovery automates device discovery and onboarding
- 14:5 : IT Security News Hourly Summary 2025-05-13 15h : 12 posts
- 13:32 : A DDoS Attack Just Breached Your Defenses ? Now What?
- 13:32 : PoC Exploit Published for macOS Sandbox Escape Vulnerability (CVE-2025-31258)
- 13:32 : Zoom Workplace Apps Flaws Allow Hackers to Gain Elevated Access
- 13:32 : 5 Subtle Indicators Your Development Environment Is Under Siege
- 13:32 : Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments
- 13:31 : Product showcase: Go beyond VPNs and Tor with NymVPN
- 13:31 : DefectDojo boosts unified vulnerability management
- 13:5 : Scattered Spider Launches Supply Chain Attacks on UK Retail Organizations
- 13:5 : F5 BIG-IP Vulnerability Allows Remote Command Execution
- 13:4 : Four Hackers Caught Exploiting Old Routers as Proxy Servers
- 13:4 : Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies
- 13:4 : Advancing Cybersecurity in Australia
- 13:4 : AI Agents: Transformative or Turbulent?
- 13:4 : SAP Patches Another Critical NetWeaver Vulnerability
- 12:32 : Marks & Spencer confirms customers’ personal data was stolen in hack
- 12:32 : Top 5 Takeaways from RSAC 2025: INE Security Alert
- 12:32 : Researchers Uncovered North Korean Nationals Remote IT Worker Fraud Scheme
- 12:32 : SAP May 2025 Patch Tuesday – Patch for Actively Exploited 0-Day & 15 Vulnerabilities
- 12:31 : North Korean Hackers Leveraging Academic Forum Invitation & Dropbox to Deliver Malware
- 12:31 : Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023
- 12:2 : Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer
- 11:32 : Court Rules Against NSO Group
- 11:32 : Marks & Spencer Says Data Stolen in Ransomware Attack
- 11:32 : CISO Survey Surfaces Shift in Application Security Responsibilities
- 11:32 : North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
- 11:31 : Deepfake Defense in the Age of AI
- 11:5 : IT Security News Hourly Summary 2025-05-13 12h : 11 posts
- 11:4 : PupkinStealer Targets Windows Users to Steal Browser Login Credentials
- 11:4 : APT group exploited Output Messenger Zero-Day to target Kurdish military operating in Iraq
- 11:4 : Marks & Spencer admits cybercrooks made off with customer info
- 11:4 : Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying
- 10:32 : Huawei, UBTech Team Up On Humanoid Robots
- 10:32 : Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot
- 10:32 : Using a Mythic agent to optimize penetration testing
- 10:32 : Exploring CNAPP Options for Cloud Security in 2025
- 10:31 : Suspected DoppelPaymer Ransomware Group Member Arrested
- 10:31 : INE Security Alert: Top 5 Takeaways from RSAC 2025
- 10:10 : Redefining IABs: Impacts of compartmentalization on threat tracking and modeling
- 10:10 : Defining a new methodology for modeling and tracking compartmentalized threats
- 10:9 : Asus One-Click Flaw Exposes Users to Remote Code Execution Attacks
- 10:9 : CISA Flags Hidden Functionality Flaw in TeleMessage TM SGNL on KEV List
- 10:9 : As US vuln-tracking falters, EU enters with its own security bug database
- 10:9 : How Compliance Training Software Protects Your Business from Risk
- 10:9 : Orca Snaps Up Opus in Cloud Security Automation Push
- 10:9 : M&S Confirms Customer Data Stolen in Cyber-Attack
- 10:9 : European Vulnerability Database Launches Amid US CVE Chaos
- 9:32 : EU Queries SES, Intelsat Customers Over $3.1bn Merger
- 9:32 : Regulator Probes Tesla Safety Ahead Of Robotaxi Launch
- 9:32 : Report Reveals BEC Cryptocurrency Scams Rose by 344%
- 9:32 : PoC Exploit Released for macOS CVE-2025-31258 Vulnerability Bypassing Sandbox Security
- 9:31 : F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
- 9:31 : Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats
- 9:7 : I wanted a privacy screen protector – until I put one on my Galaxy S25 Ultra
- 9:7 : Sit, Fetch, Steal – Chihuahua Stealer: A new Breed of Infostealer
- 9:6 : CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor
- 9:6 : Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated
- 9:6 : UK Considers New Enterprise IoT Security Law
- 8:31 : Apple ‘Mulls’ iPhone Price Rises – Without Citing Tariffs
- 8:31 : AI Start-Up Perplexity ‘Raising $500m’ On $14bn Valuation
- 8:5 : IT Security News Hourly Summary 2025-05-13 09h : 2 posts
- 8:2 : Cobalt Strike 4.11.1 Released With SSL Checkbox Fix
- 8:2 : Attackers Leverage Unpatched Output Messenger 0‑Day to Deliver Malicious Payloads
- 8:2 : Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals
- 8:2 : Cobalt Strike 4.11.1 Released With Fix For ‘Enable SSL’ Checkbox
- 8:2 : Türkiye-linked spy crew exploited a messaging app zero-day to snoop on Kurdish army in Iraq
- 7:31 : OpenAI, Microsoft ‘Renegotiating’ Deal Around Future IPO
- 7:31 : Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook
- 7:31 : Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
- 7:31 : GlobalX breach, Google settles lawsuits, UK software security guidelines
- 7:7 : Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
- 7:7 : Apple Security Update: Multiple Vulnerabilities in macOS & iOS Patched
- 7:7 : Ransomware Wreaks Havoc on Businesses Struggling to Bolster Digital Security Measures
- 7:6 : GenAI’s New Attack Surface: Why MCP Agents Demand a Rethink in Cybersecurity Strategy
- 7:6 : CISOs must speak business to earn executive trust
- 6:33 : AI vs AI: How cybersecurity pros can use criminals’ tools against them
- 6:32 : Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
- 6:4 : Malware emerging from AI Video generation tools
- 6:4 : Are Cloud Storage Solutions 100% Secure with Regards to Cybersecurity?
- 6:4 : Apple Releases Security Patches to Fix Critical Data Exposure Flaws
- 6:4 : Apple released security updates to fix multiple flaws in iOS and macOS
- 6:4 : Futurum Group Research Sees Cybersecurity Spending Reaching $287.6B by 2029
- 6:4 : Breaking down silos in cybersecurity
- 5:31 : Why Traditional Vulnerability Management Fails in the Cloud
- 5:2 : The CVE Crisis: Why Reactive Patching is Obsolete
- 5:2 : UNIDIR Intrusion Path: New framework to analyze ICT environment activities
- 5:2 : Review: Resilient Cybersecurity
- 4:45 : Cybersecurity jobs available right now: May 13, 2025
- 4:6 : Artificial Intelligence Fuels New Wave of Complex Cyber Attacks Challenging Defenders
- 3:2 : Hackers Exploiting Output Messenger 0-Day Vulnerability to Deploy Malicious Payloads
- 2:5 : IT Security News Hourly Summary 2025-05-13 03h : 6 posts
- 2:2 : ISC Stormcast For Tuesday, May 13th, 2025 https://isc.sans.edu/podcastdetail/9448, (Tue, May 13th)
- 1:4 : Vulnerability Management Automation: Here’s Why You Need it
- 1:4 : Keeping Secrets Safe in a Dynamic Cloud Environment
- 1:4 : Building an Impenetrable Defense with NHIs
- 1:4 : How NHIs Deliver Value to Your Cybersecurity Framework
- 0:8 : Roblox Lawsuit Claims Hidden Tracking Used to Monetize Kids Data
- 0:8 : BSidesLV24 – GroundFloor – WHOIS The Boss? Building Your Own WHOIS Dataset For Reconnaissance
- 23:5 : IT Security News Hourly Summary 2025-05-13 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-05-12
- 22:31 : M365 apps on Windows 10 to get security fixes into 2028
- 22:5 : Anonymous Hackers Steal Flight Data from US Deportation Airline GlobalX