178 posts were published in the last hour
- 21:34 : AWS locks down cloud security, hits 100% MFA enforcement for root users
- 21:4 : Scattered Spider Aims at US Insurers After UK Retail Hit, Google Warns
- 21:4 : New ClickFix Malware Variant ‘LightPerlGirl’ Targets Users in Stealthy Hack
- 20:31 : WhatsApp to start targeting you with ads
- 20:5 : IT Security News Hourly Summary 2025-06-17 21h : 5 posts
- 20:2 : Pro-Israel hacktivist group claims responsibility for alleged Iranian bank hack
- 19:32 : New Sorillus RAT Targets European Organizations Through Tunneling Services
- 19:32 : ChatGPT can now connect to MCP servers – here’s how, and what to watch for
- 19:32 : Think Before You Click: ‘Unsubscribe’ Buttons Could Be a Trap, Experts Warn
- 19:32 : LinuxFest Northwest: Challenges of Managing Community Meetup Post-Pandemic
- 19:32 : Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
- 19:5 : 11 Simple Ways to Remove Your Information From the Internet
- 19:4 : New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
- 19:4 : New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper
- 19:4 : Why SMS two-factor authentication codes aren’t safe and what to use instead
- 18:34 : Google’s Gerrit Code Platform Vulnerability Allows Hack of 18 Google Projects Including ChromiumOS
- 18:2 : New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
- 18:2 : LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
- 17:34 : Beware: Weaponized Research Papers Delivering Malware Through Password-Protected Documents
- 17:34 : Pro-Israel hacktivist group claims reponsibility for alleged Iranian bank hack
- 17:34 : New Veeam Vulnerabilities Enables Malicious Remote Code Execution on Backup Servers
- 17:34 : How to Detect Threats Early For Fast Incident Response: 3 Examples
- 17:34 : DanaBot Malware Network Disrupted After Researchers Discover Key Flaw
- 17:9 : XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users
- 17:9 : Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia
- 17:9 : Sitecore CMS flaw let attackers brute-force ‘b’ for backdoor
- 17:9 : LS Electric GMWin 4
- 17:9 : Baby Tigers Bite — The Hidden Risks of Scaling AI Too Fast
- 17:8 : U.S. Moves to Collect $7.74 Million Tied to N. Korea IT Worker Scam
- 17:5 : IT Security News Hourly Summary 2025-06-17 18h : 14 posts
- 16:32 : Hacklink Market Linked to SEO Poisoning Attacks in Google Results
- 16:32 : Siemens Mendix Studio Pro
- 16:32 : Fuji Electric Smart Editor
- 16:32 : CISA Releases Five Industrial Control Systems Advisories
- 16:32 : Dover Fueling Solutions ProGauge MagLink LX Consoles
- 16:31 : Secure your Express application APIs in minutes with Amazon Verified Permissions
- 16:2 : How to Get Hacked on Facebook
- 16:2 : New Microsoft Excel Token Protection Policy May Block Certain Data Imports
- 16:2 : Citrix NetScaler ADC and Gateway Vulnerabilities Allow Attackers to Access Sensitive Data
- 16:2 : Email Hosting Provider Cock.li Hacked – 1 Million Email Addresses Stolen
- 16:2 : Researchers unearth keyloggers on Outlook login pages
- 16:2 : Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities
- 15:39 : Rapid Rebuild Hackathon 2025: When Legacy Meets Innovation
- 15:39 : M&S Faces £300M Loss After Cyberattack Involving DragonForce and Scattered Spider
- 15:38 : Data Security Posture Insights: Overcoming Complexity and Threat Landscape
- 15:38 : AI Integration Raises Alarms Over Enterprise Data Safety
- 15:38 : Hacklink Marketplace Fuels Surge in Covert SEO Poisoning Attacks
- 15:9 : How to Achieve SOC 2 Compliance in AWS Cloud Environments
- 15:9 : Redefining identity security in the age of agentic AI
- 15:8 : Kali vs. ParrotOS: Security-focused Linux distros compared
- 14:35 : Tips to make your summer travels cyber safe
- 14:35 : U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog
- 14:35 : WhatsApp to Show Ads for Users in Status & Updates Tab
- 14:34 : Critical Sitecore CMS Platform Vulnerabilities Let Attackers Gain Full Control of Deployments
- 14:34 : New Sorillus RAT Actively Attacking European Organizations Via Tunneling Services
- 14:34 : BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code
- 14:34 : The Quantum Supply Chain Risk: How Quantum Computing Will Disrupt Global Commerce
- 14:34 : What Is Vulnerability Prioritization? A No-Fluff Playbook
- 14:34 : Aravo Evaluate Engine manages and optimizes third-party risks
- 14:34 : Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
- 14:5 : IT Security News Hourly Summary 2025-06-17 15h : 9 posts
- 14:4 : 23andMe hit with £2.3M fine after exposing genetic data of millions
- 14:4 : Free AI coding security rules now available on GitHub
- 14:4 : UK ICO Fines 23andMe £2.3m for Data Protection Failings
- 14:4 : Introducing the new console experience for AWS WAF
- 13:33 : How Long Until the Phishing Starts? About Two Weeks, (Tue, Jun 17th)
- 13:33 : Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks
- 13:32 : BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
- 13:32 : Without automation, external attack surface management misses the point
- 13:32 : DMV-Themed Phishing Campaign Targeting U.S. Citizens
- 13:32 : The default TV setting you should turn off immediately – and why experts recommend it
- 13:32 : Threat Group Targets Companies in Taiwan
- 13:32 : New Variants of Chaos RAT Attacking Windows and Linux Systems to Steal Sensitive Data
- 13:32 : ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine
- 13:32 : New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper
- 13:32 : Zyxel Firewall Vulnerability Again in Attacker Crosshairs
- 13:32 : Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
- 13:32 : Taiwan Hit by Sophisticated Phishing Campaign
- 12:39 : Hackers Manipulate Search Engines to Push Malicious Sites
- 12:39 : Google Chrome 0-Day Vulnerability Exploited by APT Hackers in the Wild
- 12:39 : Critical sslh Vulnerabilities Let Hackers Trigger Remote DoS Attacks
- 12:39 : Kimsuky and Konni APT Groups Accounts Most Active Attacks Targeting East Asia
- 12:39 : Beware of Weaponized Research Papers That Delivers Malware Via Password-Protected Documents
- 12:39 : New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script
- 12:38 : US Insurance Industry Warned of Scattered Spider Attacks
- 12:38 : How Azul and Moderne Are Boosting Java Developer Productivity
- 12:38 : Novel TokenBreak Attack Method Can Bypass LLM Security Features
- 12:2 : Zoomcar Data Breach Exposes Personal Info of 8.4 Million Users
- 12:2 : Backups Are Under Attack: How to Protect Your Backups
- 12:2 : Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments
- 12:2 : Are Forgotten AD Service Accounts Leaving You at Risk?
- 12:2 : Circumvent Raises $6 Million for Cloud Security Platform
- 12:2 : Sumsub Device Intelligence offers protection against identity threats
- 11:34 : Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT
- 11:34 : WhatsApp’s Status Tab Set to Feature Ads as Meta Monetizes Platform
- 11:34 : Attackers target Zyxel RCE vulnerability CVE-2023-28771
- 11:34 : Where AI Provides Value
- 11:34 : Reddit’s new AI-powered tools scan your posts to serve you better ads
- 11:34 : Smart air fryers ordered to stop invading our digital privacy
- 11:34 : Chained Flaws in Enterprise CMS Provider Sitecore Could Allow Remote Code Execution
- 11:5 : IT Security News Hourly Summary 2025-06-17 12h : 3 posts
- 11:2 : ASUS Armoury Crate Vulnerability Lets Hackers Gain System-Level Access on Windows
- 11:2 : Hackers Deliver Fileless AsyncRAT Using Clickfix Technique via Fake Verification Prompt
- 11:2 : XDSpy Threat Actors Leverages Windows LNKs Zero-Day Vulnerability to Attack Windows System Users
- 11:2 : Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers
- 10:35 : Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation
- 10:35 : Italy Opens DeepSeek Probe Over False Information
- 10:35 : OpenAI In $200m Pentagon Deal
- 10:35 : Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks
- 10:35 : Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware
- 10:35 : Are WAFs Obsolete? Pros, Cons, and What the Future Holds
- 10:35 : How Human Behavior Can Strengthen Healthcare Cybersecurity
- 10:35 : Hackers Actively Exploiting Zyxel RCE Vulnerability Via UDP Port
- 10:35 : Threat Actors Exploits OEM Permissions on Android Devices to Perform Privilege Escalation Attacks
- 10:34 : CISA Warns of iOS 0-Click Vulnerability Exploited in the Wild
- 10:34 : Malicious Loan App on iOS & Google Play Store Infected 150K+ Users Devices
- 10:34 : Water Curse Hacker Group Weaponized 76 GitHub Accounts to Deliver Multistage Malware
- 10:34 : Asus Armoury Crate Vulnerability Leads to Full System Compromise
- 10:34 : New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks
- 10:34 : Microsoft Promises to Keep European Cloud Data in Europe
- 9:38 : Dutch Court Upholds Competition Ruling Against Apple
- 9:38 : OpenAI ‘Considers’ Making Antitrust Allegations Against Microsoft
- 9:38 : TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert
- 9:4 : Hackers Exploiting Chrome Zero‑Day Vulnerability in the Wild
- 9:4 : 150K+ Users Affected by Malicious Loan Apps on iOS and Google Play
- 9:4 : Recent Langflow Vulnerability Exploited by Flodrix Botnet
- 9:4 : Inside PayPal’s Strategy to Stop AI-Powered Bots & Reduce Fraud
- 8:34 : China Robot Industry Projected To Reach $108bn In 2028
- 8:34 : Huawei, ByteDance ‘Plan’ Major Brazil Cloud Deals
- 8:34 : State-sponsored hackers compromised the email accounts of several Washington Post journalists
- 8:34 : India-based car-sharing company Zoomcar suffered a data breach impacting 8.4M users
- 8:34 : Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer
- 8:34 : Brits Lose £106m to Romance Fraud in a Year
- 8:6 : CISA Alerts: iOS Zero‑Click Flaw Actively Exploited
- 8:6 : Android Devices Under Siege: How Threat Actors Abuse OEM Permissions for Privilege Escalation
- 8:6 : Got a new password manager? Don’t leave your old logins exposed in the cloud – do this next
- 8:5 : IT Security News Hourly Summary 2025-06-17 09h : 5 posts
- 7:34 : Meta Brings Ads To WhatsApp After Long Delay
- 7:34 : Beyond Just Detection: Oasis Offers Full Lifecycle Management for NHIs
- 7:34 : 2FA middleman, Archetyp seized, Zoomcar hacked
- 7:7 : DeerStealer Malware Deployed Through Exploitation of Windows Run Prompt by Threat Actors
- 7:7 : GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
- 7:7 : How to disable ACR on your TV (and why doing so makes such a big difference)
- 7:7 : Google to scale up AI-powered fraud detection and security operations in India
- 7:6 : Apache Tomcat Vulnerabilities Allow Authentication Bypass and DoS Attacks
- 7:6 : From LLMs to Cloud Infrastructure: F5 Aims to Secure the New AI Attack Surface
- 7:6 : Women in CyberSecurity (WiCyS): Building Community and Fostering Opportunity in Cybersecurity
- 6:32 : Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
- 6:32 : Top 5 AI SOC Analyst Platforms to Watch out for in 2025
- 6:32 : NSFOCUS APT Monthly Briefing – April 2025
- 6:32 : Hackers love events. Why aren’t more CISOs paying attention?
- 6:32 : BigID Vendor AI Assessment reduces third-party AI risk
- 6:2 : Hackers Weaponize Langflow Vulnerability to Launch Flodrix Botnet
- 6:2 : Before scaling GenAI, map your LLM usage and risk zones
- 6:2 : Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement
- 5:36 : Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw
- 5:7 : Updates to Red Hat Advanced Cluster Security for Kubernetes Cloud Service strengthen your security posture
- 5:7 : GrayAlpha Exposed: Deploys Malware via Infection Vectors
- 5:6 : CISOs brace for a surge in domain-based cyber threats
- 5:6 : CURBy: A quantum random number generator you can verify
- 5:5 : IT Security News Hourly Summary 2025-06-17 06h : 5 posts
- 4:34 : Cybersecurity jobs available right now: June 17, 2025
- 4:2 : Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet
- 4:2 : Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users
- 4:2 : Gunra Ransomware Group Allegedly Leaks 40TB of Data from American Hospital
- 4:2 : Hyperview DCIM vs. Nlyte DCIM: Which Software is Right for You?
- 3:36 : Output-driven SIEM — 13 years later
- 3:2 : Minnesota Shooting Suspect Allegedly Used Data Broker Sites to Find Targets’ Addresses
- 2:31 : Minnesota Shooting Suspect Allegedly Used Data Broker Sites to Find Targets’ Addresses
- 2:6 : ISC Stormcast For Tuesday, June 17th, 2025 https://isc.sans.edu/podcastdetail/9496, (Tue, Jun 17th)
- 23:34 : Cutting cloud waste at scale: Akamai saves 70% using AI agents orchestrated by kubernetes
- 23:7 : Randall Munroe’s XKCD ‘Alert Sound’
- 23:6 : LinuxFest Northwest: Code-By-Mail: A Rough And Tumble Guide To Submitting To Mailing Lists
- 23:5 : IT Security News Hourly Summary 2025-06-17 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-06-16
- 22:36 : Betting on Your Digital Rights: EFF Benefit Poker Tournament at DEF CON 33
- 22:36 : Scattered Spider has moved from retail to insurance
- 22:2 : Groq just made Hugging Face way faster — and it’s coming for AWS and Google