140 posts were published in the last hour
- 21:33 : Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
- 21:5 : Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense
- 21:5 : Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
- 21:5 : House Moves Forward With Dangerous Proposal Targeting Nonprofits
- 20:32 : US man who hacked SEC’s X account to spike Bitcoin price sentenced to prison
- 20:5 : IT Security News Hourly Summary 2025-05-16 21h : 4 posts
- 20:2 : New botnet HTTPBot targets gaming and tech industries with surgical attacks
- 19:32 : Pwn2Own Berlin 2025: Windows 11, VMware, Firefox and Others Hacked
- 19:32 : Secure by Design: Modernizing Authentication With Centralized Access and Adaptive Signals
- 19:4 : AWS Boss Calls For UK To Increase Nuclear Power – Report
- 18:32 : Trump Has A “Little Problem” With Apple’s Tim Cook
- 18:31 : Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams
- 18:31 : Orca Security Acquires Opus to Gain AI Agent Orchestration Technology
- 17:32 : Threat Group Assessment: Muddled Libra (Updated May 16, 2025)
- 17:31 : Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
- 17:31 : Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
- 17:5 : IT Security News Hourly Summary 2025-05-16 18h : 9 posts
- 17:2 : Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities
- 17:2 : Chinese Agent Impersonate as Stanford Student For Intelligence Gathering
- 17:2 : Printer Company Distributes Malicious Drivers Infected with XRed Malware
- 17:2 : New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
- 17:2 : Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
- 16:32 : The best Bluetooth trackers of 2025: Expert tested
- 16:4 : Ransomware attacks on education sector go unreported for months
- 16:4 : Pro-Ukraine Group Targets Russian Developers with Python Backdoor
- 16:4 : Linux Kernel Patching and Preventing Exploits in 2025
- 16:4 : SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
- 15:32 : Defamation case against DEF CON terminated with prejudice
- 15:32 : Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
- 15:32 : Ransomware Roundup – VanHelsing
- 15:32 : Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
- 15:31 : Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
- 15:4 : FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
- 15:4 : Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
- 15:4 : Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
- 15:4 : New Vulnerability Affects All Intel Processors From The Last 6 Years
- 15:4 : Google Warns UK Retailer Hackers Now Targeting US
- 14:31 : RSAC Conference 2025
- 14:31 : In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach
- 14:5 : Amazon Axes Jobs At Devices, Services Group – Again
- 14:5 : Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
- 14:5 : Communications Backdoor in Chinese Power Inverters
- 14:5 : IT Security News Hourly Summary 2025-05-16 15h : 11 posts
- 14:4 : Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR
- 14:4 : Hackers Attacking Industrial Automation Systems With 11,600+ Malware Families
- 14:4 : Windows 10 KB5058379 Update Boots PCs into Windows Recovery
- 14:4 : Windows Security Updates – How to Stay Ahead of Vulnerabilities
- 14:4 : Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution
- 14:4 : Broadcom employee data stolen by ransomware crooks following hit on payroll provider
- 13:31 : Smart Networks, Smarter Threats: Securing Telecoms in the Age of AI and Critical Infrastructure
- 13:4 : Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
- 13:4 : Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
- 13:4 : Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
- 12:32 : Operation RoundPress
- 12:31 : Sednit abuses XSS flaws to hit gov’t entities, defense companies
- 12:31 : Is it Illegal to Listen to a Podcast or Watch a Movie Online?
- 12:7 : Cybersecurity for Mergers and Acquisitions – A CISO’s Guide
- 12:7 : Meta sent cease and desist letter over AI training
- 12:6 : Data broker protection rule quietly withdrawn by CFPB
- 12:6 : New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
- 12:6 : US Officials Impersonated Via SMS and Voice Deepfakes
- 11:32 : APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
- 11:32 : Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
- 11:31 : FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
- 11:31 : Good luck to Atos’ 7th CEO and its latest biz transformation
- 11:7 : Hackers Now Targeting US Retailers After UK Attacks, Google
- 11:7 : Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
- 11:7 : SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
- 11:7 : Meta plans to train AI on EU user data from May 27 without consent
- 11:7 : From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth
- 11:7 : Cranium introduces AI red teaming platform
- 11:6 : CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- 11:6 : Top 10 Best Practices for Effective Data Protection
- 11:6 : UK Cyber Vacancies Growing 12% Per Year
- 11:5 : IT Security News Hourly Summary 2025-05-16 12h : 12 posts
- 10:32 : Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
- 10:32 : Salt Security Partners With Wiz, Combines Cloud and API Security
- 10:32 : Mitigating macOS Zero-Day Risks – Tools and Techniques
- 10:31 : Russian APT Exploiting Mail Servers Against Government, Defense Organizations
- 10:31 : Russian Espionage Operation Targets Organizations Linked to Ukraine War
- 10:4 : FBI Warns of Deepfake Messages Impersonating Senior Officials
- 9:31 : I tested a TCL smart lock, and its palm vein recognition feature blew me away
- 9:31 : Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
- 9:31 : Healthcare Cyber-Attacks Intensify, Sector Now Prime Target
- 9:8 : Video Test
- 9:7 : Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants
- 9:7 : SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access
- 9:7 : Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked
- 9:7 : From hype to harm: 78% of CISOs see AI attacks already
- 9:7 : AI in the Cloud: The Rising Tide of Security and Privacy Risks
- 9:6 : IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience
- 9:6 : Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
- 8:31 : Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
- 8:5 : IT Security News Hourly Summary 2025-05-16 09h : 9 posts
- 8:2 : Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware
- 8:2 : Google fixed a Chrome vulnerability that could lead to full account takeover
- 8:2 : Commit Stomping – An Offensive Technique Let Hackers Manipulate Timestamps in Git to Alter File Metadata
- 8:2 : Jenkins Security Update Released With the Fixes for the Vulnerabilities that Exploit CI/CD Pipelines
- 8:2 : Securing Linux Containers – A Guide for Cloud-Native Environments
- 7:33 : Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance
- 7:32 : Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025
- 7:32 : Securing ICAM in spacecraft-based missions
- 7:32 : Are You Using the Right SSPM Software? | Grip Security
- 7:31 : [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
- 7:31 : Coinbase hackers bribe staff, Windows 11 hacked at Pwn2Own, Telegram purges black market group
- 7:2 : Dior likely hit by ransomware attack
- 7:2 : Tor Oniux Tool Offers Anonymous Linux App Traffic
- 7:2 : Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
- 7:2 : Printer company provided infected software downloads for half a year
- 7:2 : Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down
- 6:32 : SonicWall SMA1000 Vulnerability Let Attackers to Exploit Encoded URLs To Gain Internal Systems Access Remotely
- 6:32 : Windows Defender Best Practices – Optimizing Endpoint Protection
- 6:32 : Researchers Emulated VanHelsing Ransomware Advanced Tactics & Tools Used
- 6:32 : Deepfake attacks could cost you more than money
- 6:2 : DoorDash scam used fake drivers, phantom deliveries to bilk $2.59M
- 6:2 : Scammers are deepfaking voices of senior US government officials, warns FBI
- 5:32 : Proofpoint To Acquire Microsoft 365 Security Provider Hornetsecurity For $1 Billion
- 5:32 : Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked – Pwn2Own Day 1
- 5:32 : Google to Release Android 16 with Advanced Device-level Security Setting Protection for 3 Billion Devices
- 5:31 : Polymorphic phishing attacks flood inboxes
- 5:6 : The U.S. Copyright Office’s Draft Report on AI Training Errs on Fair Use
- 5:6 : How working in a stressful environment affects cybersecurity
- 5:6 : Cybersecurity Skills Framework connects the dots between IT job roles and the practical skills needed
- 5:5 : IT Security News Hourly Summary 2025-05-16 06h : 1 posts
- 4:31 : CISA Warns of Google Chromium 0-Day Vulnerability Actively Exploited in the Wild – Patch Now!
- 4:25 : O que é um ataque cibernético? Tipos e prevenção
- 4:25 : New infosec products of the week: May 16, 2025
- 3:12 : AI Governance Is Your Competitive Edge If You Treat It That Way
- 2:2 : ISC Stormcast For Friday, May 16th, 2025 https://isc.sans.edu/podcastdetail/9454, (Fri, May 16th)
- 23:6 : Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List
- 23:5 : IT Security News Hourly Summary 2025-05-16 00h : 6 posts
- 22:55 : IT Security News Daily Summary 2025-05-15
- 22:32 : Is Your Cloud Truly Safe from Invisible Threats?
- 22:32 : How Protected Are Your Automated Systems?
- 22:31 : Fostering Innovation with Secure Access Management
- 22:31 : Building Confidence in Your Cybersecurity Strategy
- 22:4 : Commit Stomping
- 22:4 : ‘Expect Imposters’ Coinbase Tells Customers Whose Information Was Exposed in Data Breach
- 22:4 : Windows 10 Users Get 3 More Years of Microsoft 365 Security Updates
- 22:4 : Nova Scotia Power discloses data breach after March security incident