169 posts were published in the last hour
- 21:38 : Kali Linux gets a UI refresh, new tools, and an updated car hacking toolset
- 21:38 : Connectivity is a Lifeline, Not a Luxury: Telecom Blackouts in Gaza Threaten Lives and Digital Rights
- 21:38 : How AWS improves active defense to empower customers
- 21:4 : Google’s Advanced Protection Arrives on Android: Should You Use It?
- 20:32 : Why 99% Accuracy Isn’t Good Enough: The Reality of ML Malware Detection
- 20:31 : 1Password and AWS join forces to secure AI, cloud environments for the enterprise
- 20:5 : IT Security News Hourly Summary 2025-06-16 21h : 8 posts
- 20:4 : EFF to NJ Supreme Court: Prosecutors Must Disclose Details Regarding FRT Used to Identify Defendant
- 19:34 : What is HMAC (Hash-Based Message Authentication Code)?
- 19:34 : Washington Post Journalists’ Microsoft Accounts Hacked in Targeted Cyberattack
- 19:3 : Washington Post Hacked – Multiple Journalists’ Email Accounts Compromised
- 19:3 : Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
- 19:3 : CISA Adds Two Known Exploited Vulnerabilities to Catalog
- 19:3 : Law enforcement operation shut down dark web drug marketplace Archetyp Market
- 19:2 : Remorseless extortionists claim to have stolen thousands of files from Freedman HealthCare
- 19:2 : U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
- 18:34 : How to Remove a Virus From Your Android Phone in 4 Simple Steps
- 18:34 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
- 18:4 : How Much Data Does Streaming Use? + 5 Tips to Manage Data
- 18:4 : Do iPhones Need Antivirus Software? iPhone Security Considerations + Safety Tips
- 18:4 : Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
- 18:4 : Massive JSFireTruck Malware Campaign Infects Over 269,000 Websites
- 17:32 : Report Links Los Pollos and RichAds to Malware Traffic Operations
- 17:9 : The data on denying social media for kids (re-air) (Lock and Code S06E12)
- 17:9 : Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack
- 17:9 : Protecting Minors Online Must Not Come at the Cost of Privacy and Free Expression
- 17:5 : IT Security News Hourly Summary 2025-06-16 18h : 10 posts
- 16:36 : 3 leading multifactor authentication tool providers
- 16:36 : Canada’s WestJet says ‘expect interruptions’ online as it navigates cybersecurity turbulence
- 16:36 : LinuxFest Northwest: Beyond ARIA Labels What A Blind Film Enthusiast Can Teach Us About Open Source
- 16:7 : AI Skills Shortage Deepens as Enterprise Demand Grows Faster Than Talent Supply
- 16:7 : United Natural Foods Confirms Network Disruption from Cyberattack
- 16:7 : Understanding the Dynamic threat Landscape of Ransomware Attacks
- 16:7 : Cisco Introduces New Tools to Protect Networks from Rogue AI Agents
- 16:6 : Threat Actors Target Victims with HijackLoader and DeerStealer
- 15:34 : Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
- 15:34 : As grocery shortages persist, UNFI says it’s recovering from cyberattack
- 15:34 : Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report
- 15:5 : Ongoing Money Laundering Insights
- 15:5 : Car sharing giant Zoomcar says hacker accessed personal data of 8.4 million users
- 15:5 : Microsoft Outlook Users Face Crashes When Creating New Emails, Temp Fix Issued
- 15:5 : Darknet Market Archetyp Takedown by Authorities in Joint Action ‘Operation Deep Sentinel’
- 15:5 : Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone
- 15:5 : Vulnerability Summary for the Week of June 9, 2025
- 15:5 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 15:4 : Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
- 15:4 : Archetyp Market Shut Down in Europe-wide Law Enforcement Operation
- 14:34 : Mastering Kubernetes Observability: Boost Performance, Security, and Stability With Tracestore, OPA, Flagger, and Custom Metrics
- 14:34 : How to delete your 23andMe data
- 14:34 : Eurocops arrest suspected Archetyp admin, shut down mega dark web drug shop
- 14:34 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 14:5 : IT Security News Hourly Summary 2025-06-16 15h : 20 posts
- 14:3 : Archetyp Dark Web Market Seized, Admin Arrested in Spain
- 14:3 : Hackers Target and Hijack Washington Post Journalists’ Email Accounts
- 14:3 : Introducing the Ticket Enrichment AI Agent
- 14:3 : Malicious Loan App Removed from iOS and Google Play App Store Posed Severe Risks to Users
- 14:3 : What is a compliance audit? (With an example checklist)
- 14:3 : Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
- 14:3 : Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels
- 14:2 : Zoomcar Hacked – 8.4 Million Users’ Sensitive Details Exposed
- 14:2 : Automated Guard Rails for Vibe Coding
- 14:2 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 13:33 : Enhancements to Akamai API Security, Q2 2025
- 13:33 : Mac Mini won’t power on? Apple will fix it for you – for free
- 13:33 : Collaborating with the World Economic Forum to Advance Systemic Defense Solutions to Protect Our Digital Ecosystem
- 13:32 : Salesforce study finds LLM agents flunk CRM and confidentiality tests
- 13:32 : Archetyp Dark Web Market Shut Down by Law Enforcement
- 13:32 : App Store Security Threats in 2025: Why Hackers Target Mobile Ecosystems
- 13:32 : SinoTrack GPS vulnerabilities may allow attackers to track, control vehicles
- 13:32 : History made as MI6 appoints first female Chief
- 13:32 : Cyolo expands remote access coverage for OT and cyber-physical systems
- 13:32 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 13:3 : The Impact of Quantum Decryption
- 13:3 : Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
- 13:3 : Zoomcar Data Breach Exposes Sensitive Details of 8.4 Million Users
- 13:2 : Microsoft adds export option to Windows Recall in Europe
- 13:2 : Washington Post Journalists’ Microsoft Email Accounts Hacked
- 13:2 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 12:35 : Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users’ PCs
- 12:35 : Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
- 12:35 : BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
- 12:35 : Scaling Beyond Borders: Establishing a Global Footprint
- 12:35 : How PureVPN’s Password Manager Closes A Major Security Gap Hackers Exploit
- 12:35 : Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation
- 12:35 : 46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks
- 12:35 : 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials
- 12:34 : Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data
- 12:34 : Zoomcar Says Hackers Accessed Data of 8.4 Million Users
- 12:34 : Asheville Eye Associates Says 147,000 Impacted by Data Breach
- 12:34 : Police shut down long-running dark web drug market
- 12:34 : Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine
- 12:34 : ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
- 12:2 : North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
- 12:2 : New Anubis RaaS includes a wiper module
- 11:34 : Got a new password manager? How to clean up the credential mess you left in the cloud
- 11:34 : Generative AI Is Moving Fast. Are Your Security Practices Keeping Up?
- 11:34 : 240,000 Impacted by Data Breach at Eyecare Tech Firm Ocuco
- 11:34 : GUEST ESSAY: The AI illusion: Don’t be fooled, innovation without guardrails is just risk–at scale
- 11:34 : Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
- 11:5 : IT Security News Hourly Summary 2025-06-16 12h : 14 posts
- 11:2 : Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
- 11:2 : Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records
- 11:2 : North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials
- 11:2 : Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware
- 11:2 : Spy school dropout: GCHQ intern jailed for swiping classified data
- 10:36 : US ‘Reviews’ Google’s $32bn Wiz Buy Over Competition Concerns
- 10:36 : China Postpones Approval Of $35bn Synopsys-Ansys Merger
- 10:36 : GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
- 10:36 : Why We Made a Guide to Winning a Fight
- 10:36 : The WIRED Guide to Protecting Yourself From Government Surveillance
- 10:36 : 6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties
- 10:36 : How to Protect Yourself From Phone Searches at the US Border
- 10:36 : Anubis Ransomware Packs a Wiper to Permanently Delete Files
- 10:2 : Anubis Ransomware Introduces Irreversible File Destruction Feature
- 10:2 : Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data
- 10:2 : Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
- 10:2 : New Predator spyware infrastructure revealed activity in Mozambique for the first time
- 10:2 : Red Teaming AI: The Build Vs Buy Debate
- 10:2 : Hacktivists Strike Within Minutes of Israel Missile Attacks on Iran Nuclear Sites
- 10:2 : Anubis Ransomware Adds File-Wiping Capability
- 9:34 : Apple ‘Eyes Spring 2026’ For Delayed Siri AI Upgrade
- 9:34 : AstraZeneca In $5.3bn AI Drug Discovery Deal With China’s CSPC
- 9:34 : Gemini, Coinbase Set To Receive EU Crypto Licences
- 9:34 : Apple Hits Top Spot In China After Price Cuts
- 9:34 : Hackers Hijacked Discord Invite to Inject Malicious Links That Deliver AsyncRAT
- 9:34 : Hackers Could Hide Images in Text Data and Embeds Directly into DNS TXT Records
- 9:34 : Over a Third of Grafana Instances Exposed to XSS Flaw
- 9:4 : A JPEG With A Payload, (Mon, Jun 16th)
- 9:4 : Brace Yourselves: The Game-Changing Impact of India’s DPDP Act, 2023
- 9:4 : Canadian Airline WestJet Hit by Cyberattack
- 9:4 : High-Severity Vulnerabilities Patched in Tenable Nessus Agent
- 8:32 : Google Massive Cloud Outage Linked to API Management System
- 8:32 : How collaborative security can build you a better business
- 8:31 : WestJet Investigates Cyber-Attack Impacting Customers
- 8:5 : IT Security News Hourly Summary 2025-06-16 09h : 3 posts
- 7:34 : Temu Resumes Direct Shipments From China After Trade Talks
- 7:34 : Uncovering the Technique of Hiding Images in DNS TXT Entries
- 7:34 : Anubis Ransomware With Wipe Mode That Permanently Erases File With No Recovery Option
- 7:34 : IBM Backup Services Vulnerability Let Attackers Escalate Privileges
- 7:34 : GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT
- 7:34 : A week in security (June 9 – June 15)
- 7:34 : Washington Post hacked, WestJet suffers cyberattack, Texas DoT breach
- 7:5 : Pride Tech: LGBTIQ+ Digital Security
- 7:5 : IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
- 7:5 : Google Cloud Suffers Major Disruption After API Management Error
- 7:5 : Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities
- 7:5 : Protecting Against Origin Server DDoS Attacks
- 7:4 : Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
- 7:4 : Cybersecurity Today: WestJet Cyber Incident, Anubis Ransomware Evolution, Discord Exploits, and Google Cloud Outage
- 6:34 : KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
- 6:2 : Why banks’ tech-first approach leaves governance gaps
- 5:36 : MDEAutomator: Open-source endpoint management, incident response in MDE
- 5:5 : IT Security News Hourly Summary 2025-06-16 06h : 1 posts
- 5:4 : Virtual kidnapping scams prey on our worst fears
- 4:36 : Why CISOs need to understand the AI tech stack
- 4:36 : Review: Learning Kali Linux, 2nd Edition
- 3:34 : AT&T Customers at Risk Again After New Data Leak
- 3:2 : KIA Ecuador Keyless Entry Systems Vulnerability Exposes Thousands of Vehicles to Theft
- 3:2 : Armored cash transport trucks allegedly hauled money for $190 million crypto-laundering scheme
- 2:5 : IT Security News Hourly Summary 2025-06-16 03h : 3 posts
- 2:4 : ISC Stormcast For Monday, June 16th, 2025 https://isc.sans.edu/podcastdetail/9494, (Mon, Jun 16th)
- 0:36 : Scalable Secrets Management for Growing Businesses
- 0:36 : Gain Full Control Over Your Digital Identities
- 0:36 : Drive Innovation Through Advanced NHI Management
- 23:5 : IT Security News Hourly Summary 2025-06-16 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 24
- 22:55 : IT Security News Daily Summary 2025-06-15
- 22:9 : Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
- 22:9 : Dems demand audit of CVE program as Federal funding remains uncertain