182 posts were published in the last hour
- 21:36 : CISA Warns of Remote Control Flaws in SinoTrack GPS Trackers
- 21:36 : Google Releases Android 16: What’s New and What’s Missing
- 21:6 : Check Point Research Warns of Holiday-Themed Phishing Surge as Summer Travel Season Begins
- 21:6 : Cisco Isovalent Load Balancer takes aim at Broadcom’s VMware
- 20:36 : Patch Tuesday: Microsoft Patches 68 Security Flaws, Including One for Targeted Espionage
- 20:6 : Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online
- 20:6 : Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants
- 20:6 : Skybox Ya No Está. El Riesgo de Esperar Sigue Ahí.
- 20:5 : Los Peligros de la Gestión de Políticas de Seguridad de Red Desarrolladas Internamente
- 20:5 : IT Security News Hourly Summary 2025-06-11 21h : 4 posts
- 19:38 : New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes
- 19:5 : UK Spending Review Includes Investments In AI, Nuclear Power
- 19:5 : ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM
- 19:5 : Patch your Windows PC now before bootkit malware takes it over – here’s how
- 19:5 : How Waymo Handles Footage From Events Like the LA Immigration Protests
- 19:5 : US government’s vaccine website defaced with AI-generated content
- 18:35 : Linux Malware Authors Targeting Cloud Environments with ELF Binaries
- 18:35 : 23andMe raked by Congress on privacy, sale of genetic data
- 18:35 : Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks
- 18:35 : Hire me! To drop malware on your computer
- 18:3 : 12 Simple Ways to Remove Your Information From the Internet
- 18:3 : Insyde UEFI Application Vulnerability Enables Digital Certificate Injection Through NVRAM Variable
- 18:3 : How to delete your 23andMe data
- 18:3 : Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside
- 18:3 : How to Conduct a Secure Code Review – Tools and Techniques
- 18:3 : Infostealer crackdown: Operation Secure takes down 20,000 malicious IPs and domains
- 18:2 : Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
- 17:34 : Cybercriminals Exploit Fake Salesforce Tool to Steal Company Data and Demand Payments
- 17:5 : Google Layoffs Continue, As ‘Buyouts’ Offered To Search Staff
- 17:5 : Outlook Vulnerability Allows Remote Execution of Arbitrary Code by Attackers
- 17:5 : ‘Generative AI helps us bend time’: CrowdStrike, Nvidia embed real-time LLM defense, changing how enterprises secure AI
- 17:5 : IT Security News Hourly Summary 2025-06-11 18h : 7 posts
- 16:34 : Uber, Wayve To Trial Robotaxis In London In 2026
- 16:34 : Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges
- 16:34 : Linux Malware Authors Attacking Cloud Environments Using ELF Binaries
- 16:34 : FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes
- 16:34 : Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges
- 16:34 : Understanding OWASP Top 10 – Mitigating Web Application Vulnerabilities
- 16:34 : OffensiveCon25 – KernelGP: Racing Against The Android Kernel
- 16:33 : AI is Redefining Cyber Risk Quantification: Here’s What Every CISO Needs to Know
- 16:5 : Asia dismantles 20,000 malicious domains in infostealer crackdown
- 16:5 : Reddit Sues Anthropic for Training Claude AI with User Content Without Permission
- 16:5 : Lee Enterprises Ransomware Attack Exposes Data of 40,000 Individuals
- 16:5 : AWS completes Police-Assured Secure Facilities (PASF) audit in Europe (London) AWS Region
- 15:37 : Beyond Implementation: Building a Zero Trust Strategy That Works
- 15:37 : Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers
- 15:37 : Scam Phone Numbers to Block in 2025 (and How to Actually Stop Them)
- 15:37 : What is an asymmetric cyberattack?
- 15:36 : Securonix Acquires Threat Intelligence Firm ThreatQuotient
- 15:36 : 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
- 15:5 : Evaluating Similariy Digests: A Study of TLSH, ssdeep, and sdhash Against Common File Modifications
- 15:5 : Install this Windows patch ASAP before bootkit malware takes over your PC – here’s how
- 15:4 : Analysis to action: Operationalizing your threat intelligence
- 15:4 : Maze Banks $25M to Tackle Cloud Security with AI Agents
- 15:4 : Connectwise is rotating code signing certificates. What happened?
- 15:4 : Congress Introduces Bill to Strengthen Healthcare Cybersecurity
- 14:35 : How to turn on Android’s Private DNS Mode – and why your security depends on it
- 14:35 : Install this Windows PC update ASAP before bootkit malware takes over – here’s how
- 14:35 : Whole Foods warns of shortages after cyberattack at its primary distributor UNFI
- 14:35 : 23andMe says 15% of customers asked to delete their genetic data since bankruptcy
- 14:35 : 40,000+ Internet-connected Cameras Exposed Streaming Live on The Internet
- 14:35 : How to Use Threat Intelligence to Enhance Cybersecurity Operations
- 14:35 : Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices
- 14:34 : US Federal Authorities Disrupt Growing Malware Pyramid Network
- 14:5 : catdoc zero-day, NVIDIA, High-Logic FontCreator and Parallel vulnerabilities
- 14:5 : Windows Common Log File System Driver Flaw Allows Attackers to Escalate Privileges
- 14:5 : Windows Task Scheduler Flaw Allows Attackers to Escalate Privileges
- 14:5 : Your Android phone is getting a huge security upgrade for free – what’s new
- 14:5 : Red Hat’s global impact on Linux security
- 14:5 : The open source paradox: Unpacking risk, equity and acceptance
- 14:5 : Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape
- 14:5 : DoD issues new marching orders on secure software and SBOMs
- 14:5 : 5 Reasons to Replace VPNs with a Remote Privileged Access Management Solution (RPAM)
- 14:5 : IT Security News Hourly Summary 2025-06-11 15h : 4 posts
- 13:33 : IBM To Build First ‘Large Scale’ Quantum Computer In 2029
- 13:32 : Operation Secure: INTERPOL Disrupts 20,000 Infostealer Domains, 32 Arrested
- 13:32 : Check Point and Pax8 Partnership Provides Powerful New Security Offerings for MSPs
- 13:32 : Trump Guts Biden-Era Cyber Order, Ends Sanctions for Domestic Hackers
- 13:32 : Building a Cybersecurity Incident Response Plan – A Technical Guide
- 13:32 : HPE Aruba Network Vulnerability Exposes Sensitive Information to Hackers
- 13:32 : Microsoft to Block Attachments in Outlook Web & Windows Used by Threat Actors
- 13:32 : Advanced Persistent Threats (APTs) – Detection and Defense Strategies
- 13:32 : Trustwise protects AI deployments from security risks
- 13:32 : SpecterOps Privilege Zones enables security teams to define logical access boundaries
- 13:7 : One Piece of the Puzzle: How a Single Digital Identifier Can Unravel Your Entire Online Life
- 13:7 : Multiple Microsoft Office Vulnerabilities Enable Remote Code Execution by Attackers
- 13:7 : Outset raises $17M to replace human interviewers with AI agents for enterprise research
- 13:7 : Black Duck Elevates Leadership with New Chief Product & Technology Officer
- 13:7 : APIContext Releases Guide to Enterprise API Readiness for Autonomous AI Agents
- 13:7 : CybaVerse Acquires SecureAck to Expand Next-Gen Security Operations Platform for SMEs and MSPs
- 13:7 : Huntress Unveils Immersive Cybersecurity Training That Puts Users in the Shoes of Hackers
- 13:6 : KnowBe4 Wins Multiple 2025 Top Rated Awards From TrustRadius
- 13:6 : Fortinet, Ivanti Patch High-Severity Vulnerabilities
- 13:6 : 20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown
- 12:34 : Salesforce Industry Cloud Hit by 20 Vulnerabilities Including 0days
- 12:34 : CoreDNS Vulnerability Allows Attackers to Exhaust Server Memory via Amplification Attack
- 12:33 : I replaced my Ring with this subscription-less security camera – and it did some things better
- 12:33 : 40,000 Security Cameras Exposed to Remote Hacking
- 12:3 : Enabling Secure AI Inference: Trend Cybertron Leverages NVIDIA Universal LLM NIM Microservices
- 12:3 : Elon Musk Backs Down After Explosive Feud With Donald Trump
- 12:3 : Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited
- 12:3 : How to Detect and Mitigate Insider Threats in Your Organization
- 12:3 : Cyera Raises $540 Million to Expand AI-Powered Data Security Platform
- 12:2 : Recently Disrupted DanaBot Leaked Valuable Data for 3 Years
- 12:2 : SAML SSO: 8 Easy Steps to Understand How It Works (2025 Guide)
- 12:2 : Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053)
- 12:2 : Why DNS Security Is Your First Defense Against Cyber Attacks?
- 12:2 : INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
- 12:2 : Hands-On Skills Now Key to Landing Your First Cyber Role
- 11:5 : Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions
- 11:5 : Securing Microservices – Best Practices for Distributed Systems
- 11:5 : Microsoft Teams New Audit log Feature Allows Admins to Track Individuals Actions
- 11:5 : Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections
- 11:5 : IT Security News Hourly Summary 2025-06-11 12h : 11 posts
- 11:4 : Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal
- 11:4 : Horizon3.ai Raises $100 Million in Series D Funding
- 11:4 : How to Build a Lean Security Model: 5 Lessons from River Island
- 11:4 : SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords
- 10:36 : BT Mulls Takeover Of Troubled TalkTalk – Report
- 10:36 : AI-Powered Attacks and Lack of Cyber Readiness. How Mexico Can Respond
- 10:36 : Microsoft slows Windows 11 24H2 Patch Tuesday due to a ‘compatibility issue’
- 10:36 : Chrome, Firefox Updates Resolve High-Severity Memory Bugs
- 10:36 : Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- 10:3 : Toxic trend: Another malware threat targets DeepSeek
- 10:3 : Microsoft Teams New Update Enhances Productivity & Customization
- 10:3 : Windows Remote Desktop Services Vulnerability Allows Remote Code Execution
- 10:3 : Salesforce OmniStudio Vulnerabilities Exposes Sensitive Customer Data in Plain Text
- 10:2 : Firefox Patches Multiple Vulnerabilities That Could Lead to Browser Crash
- 10:2 : URL Scams Everywhere? These Steps Will Help You Stay Safe
- 9:36 : Global analysis of Adversary-in-the-Middle phishing threats
- 9:36 : HPE Aruba Network Flaw Exposes Sensitive Data to Potential Hackers
- 9:36 : How IP Geolocation Enhances Password Security
- 9:36 : Half of Mobile Users Now Face Daily Scams
- 9:8 : Two Microsoft Zero-Days for Admins to Fix in June Patch Tuesday
- 8:32 : Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild
- 8:31 : Two Microsoft Zero Days for Admins to Fix in June Patch Tuesday
- 8:5 : IT Security News Hourly Summary 2025-06-11 09h : 5 posts
- 8:4 : A flaw could allow recovery of the phone number associated with any Google account
- 8:4 : Sentra boosts regulatory readiness for large enterprises
- 7:34 : ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA
- 7:34 : Vanta AI Agent automates time-consuming GRC workflows
- 7:34 : Red Canary AI agents accelerate incident response
- 7:34 : 40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat
- 7:34 : Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
- 7:5 : Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable
- 6:34 : Multiple Chrome Flaws Enable Remote Code Execution by Attackers
- 6:34 : CISO who helped unmask Badbox warns: Version 3 is coming
- 6:34 : OWASP Nettacker: Open-source scanner for recon and vulnerability assessment
- 6:5 : Quasar RAT Delivered Through Bat Files, (Wed, Jun 11th)
- 6:5 : Microsoft Outlook Vulnerability Let Attackers Execute Arbitrary Code Remotely
- 6:4 : The path to better cybersecurity isn’t more data, it’s less noise
- 5:9 : Monkey365 – PowerShell Security Scanner for Microsoft 365, Azure, and Entra ID
- 5:9 : Argusee and Agentic AI in Cybersecurity
- 5:9 : How to build AI into your business without breaking compliance
- 5:5 : IT Security News Hourly Summary 2025-06-11 06h : 1 posts
- 4:34 : Multiple Chrome Vulnerabilities Allow Attackers to Execute Malicious Code Remotely
- 4:34 : Crocodilus Android Malware Can Now Trick Victims Using Fake Contacts
- 4:34 : AI forces IT leaders to rethink their network strategies
- 4:2 : 86% of all LLM usage is driven by ChatGPT
- 2:5 : IT Security News Hourly Summary 2025-06-11 03h : 4 posts
- 2:2 : ISC Stormcast For Wednesday, June 11th, 2025 https://isc.sans.edu/podcastdetail/9488, (Wed, Jun 11th)
- 1:32 : How Scammers Are Using AI to Steal College Financial Aid
- 1:5 : Capabilities Unlocked by Advanced NHI Management
- 1:4 : Innovative Approaches to NHI Protection
- 1:4 : Why Users Are Satisfied with Secure NHIs
- 1:4 : Why agent fabrics and registries are central to AI identity security
- 0:34 : Patch Tuesday, June 2025 Edition
- 0:4 : New Report Warns of Internet is The Top Threat Source for Industrial Automation Systems
- 0:3 : Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack
- 0:3 : OffensiveCon25 – Breaking The Sound Barrier: Exploiting CoreAudio Via Mach Message Fuzzing
- 0:3 : 5 Common Ways Non-Human Identities Are Exploited – and How to Secure Them
- 23:34 : Apple Intelligence Is Gambling on Privacy as a Killer Feature
- 23:34 : Beware of Instagram Growth That Steals User Login Credentials & Send to Attacker Server
- 23:34 : Threat Hunting 101 – Proactive Cybersecurity Strategies for Experts
- 23:34 : Oppose STOP CSAM: Protecting Kids Shouldn’t Mean Breaking the Tools That Keep Us Safe
- 23:5 : IT Security News Hourly Summary 2025-06-11 00h : 8 posts
- 22:55 : IT Security News Daily Summary 2025-06-10
- 22:32 : June 2025 Patch Tuesday: Microsoft Fixes 66 Bugs, Including Active 0-Day
- 22:32 : Despite Changes, A.B. 412 Still Harms Small Developers
- 22:3 : Microsoft Patch Tuesday for June 2025 — Snort rules and prominent vulnerabilities
- 22:3 : GirlsDoPorn owner faces life in jail after pleading guilty to sex trafficking
- 22:3 : Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025