169 posts were published in the last hour
- 21:33 : DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses
- 21:33 : NASA Sends International Crew Of Four Into Orbit
- 21:33 : Verizon will give you up to four free iPhone 15 Plus phones – here’s how to get yours
- 21:32 : A backlog at the Commerce Department is reportedly stalling Nvidia’s H20 chip licenses
- 21:32 : Friday Squid Blogging: A Case of Squid Fossil Misidentification
- 21:32 : OpenAI removes ChatGPT self-doxing option
- 21:32 : Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack
- 20:32 : Threat Actor Groups Tracked by Palo Alto Networks Unit 42 (Updated Aug. 1, 2025)
- 20:32 : Xreal wants you to split with your Meta Ray-Ban specs – here’s how with this trade-in deal
- 20:32 : The best Apple deals right now: Save on MacBooks, iPhones, and more
- 20:32 : A backlog at the Commerce Dept. is reportedly stalling Nvidia’s H20 chip licenses
- 20:2 : BSidesSF 2025: GenAI Application Security: Not Just Prompt Injection
- 19:32 : Your Windows 11 PC has a secret emergency shutdown feature – here’s how to use it
- 19:32 : Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks
- 19:3 : I tested the viral Sigma BF camera, and its radical redesign has me hooked
- 19:3 : Your Apple CarPlay is getting a big upgrade: 3 features I’m using on iOS 26 right now
- 19:3 : China Investigates NVIDIA’s H20 Chips for Surveillance Risks
- 19:3 : China says US spies exploited Microsoft Exchange zero-day to steal military info
- 19:3 : How IP Networks Improve Online Gaming
- 19:3 : Why Custom Database Software Matters in 2025
- 19:2 : Wi-Fi Signals Can Now Identify You Without Devices or Cameras, Raising New Privacy Fears
- 18:3 : Samsung is giving Galaxy Z Fold and Flip 7 users a free $120 bonus – how to redeem it
- 18:3 : Threat Actors Leverage Compromised Email Accounts for Targeted Phishing Attacks
- 18:3 : Secret Blizzard Group’s ApolloShadow Malware Install Root Certificates on Devices to Trust Malicious Sites
- 18:2 : Apple ID scam leads to $27,000 in-person theft of Ohio man
- 18:2 : Top 5 Ways CISOs Can Shift to a Proactive Cybersecurity Strategy
- 17:32 : SafePay Ransomware Strikes 260+ Victims Across Multiple Countries
- 17:32 : Samsung is giving a $120 bonus to Galaxy Z Fold and Flip 7 users – how to redeem it
- 17:32 : Cobalt Strike Beacon delivered via GitHub and social media
- 17:32 : Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
- 17:5 : IT Security News Hourly Summary 2025-08-01 18h : 7 posts
- 17:3 : Gartner Market Guide: Microsegmentation for Zero Trust and Resilience
- 17:3 : Qilin Ransomware Sees Surge After Collapse of Dominant RansomHub RaaS
- 17:3 : Social Engineering on the Rise — New Unit 42 Report
- 17:2 : Insurance Provider Reports June Cyber Breach
- 16:33 : LockBit Operators Use Stealthy DLL Sideloading to Mask Malicious App as Legitimate One
- 16:33 : The best smartwatch and fitness tracker deals to shop now
- 16:32 : PayPal and Venmo outage hit users Friday morning – what we know
- 16:32 : Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits
- 16:32 : Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
- 16:32 : Hackers Stole 384 Crore From Bengaluru Cryptocurrency Firm
- 16:3 : Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections
- 16:3 : Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers
- 16:3 : The top 10 products readers bought in July (including XR glasses that are $100 off)
- 16:3 : The best Amazon deals right now: Save on laptops, gadgets and more
- 16:2 : OpenAI kills “short-lived experiment” where ChatGPT chats could be found on Google
- 16:2 : Koske Marks a Significant Step in AI-Created Malware: Aqua Security
- 15:32 : 5 ways to successfully integrate AI agents into your workplace
- 15:3 : Your Tax Money and Data at Risk: UK Government Loses 2,000+ Devices
- 15:3 : Hackers Exploit Microsoft 365’s Direct Send Feature for Internal Phishing Attacks
- 15:3 : Chinese Threat Actors Hack 11,000 Android Devices to Deploy PlayPraetor Malware
- 15:3 : These jobs face the highest risk of AI takeover, according to Microsoft
- 15:3 : I switched my Garmin for this $130 rugged watch for a week – here’s my verdict now
- 15:3 : Apple’s tariff costs and iPhone sales are soaring – how long until device prices are too?
- 15:3 : This unexpected robot vacuum made me forget about my $2,000 Roborock
- 15:2 : Sex toy maker Lovense threatens legal action after fixing security flaws that exposed users’ data
- 15:2 : How to Stay Safe on Public Wi-Fi: Myths, Real Risks, and Smart Habits
- 15:2 : Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
- 14:33 : Finally, a sleek gaming laptop I can take to the office (without sacrificing power)
- 14:33 : How to use the John the Ripper password cracker
- 14:32 : In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
- 14:32 : Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
- 14:5 : IT Security News Hourly Summary 2025-08-01 15h : 8 posts
- 14:3 : Blizzard Group’s ApolloShadow Malware Installs Root Certificates to Trust Malicious Sites
- 14:3 : Want a job in tech? You need these skills, McKinsey study shows
- 14:3 : Why I’m recommending this midrange Lenovo tablet over competing models
- 14:3 : You can download iOS 26 beta on your iPhone now. How to install (and which models support it)
- 14:3 : APT36 Hackers Weaponizing PDF Files to Attack Indian Railways, Oil & Government Systems
- 14:3 : LLMs Accelerating Offensive R&D, Helps to Identify and Exploit Trapped COM Objects
- 14:3 : Threat Actors Impersonating Microsoft OAuth Applications to Steal Login Credentials
- 14:3 : Microsoft to Disable External Workbook Links to Blocked File Types By Default
- 14:3 : Microsoft Teams New Option Let IT admins Run 60-second Silent Test Call
- 13:32 : CloudGuard WAF Expands Global Footprint with Eight New Points of Presence (PoPs)
- 13:32 : This $599 Windows laptop is the back-to-school deal I most recommend right now
- 13:32 : DJI’s first 360-degree camera captures nearly two hours of 8K video
- 13:32 : News brief: Rise of AI exploits and the cost of shadow AI
- 13:32 : Authorities seize BlackSuit ransomware gang’s servers
- 13:32 : Florida prison email blunder exposes visitor contact info to inmates
- 13:3 : Microsoft Boosts .NET Bounty Program Rewards to $40,000
- 13:3 : How UK SMBs Can Handle Sensitive Information Without Breaking the Law (or the Bank)
- 13:3 : AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
- 12:32 : Illumina Fined $9.8M for Cybersecurity Flaws in Genomic Tools Sold to U.S. Agencies
- 12:32 : Microsoft Teams Adds Silent 60-Second Test Call Feature for IT Admins
- 12:32 : 9 things you shouldn’t use AI for at work
- 12:32 : You can use Google’s Math Olympiad-winning Deep Think AI model now – for a price
- 12:32 : Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
- 12:3 : Threat Actors Impersonate Microsoft OAuth Apps to Steal Login Credentials
- 12:3 : Search Engines Are Indexing ChatGPT Chats — Here’s What Our OSINT Found
- 12:3 : This month in security with Tony Anscombe – July 2025 edition
- 12:3 : Emerging Koske Malware Leverages Visual Deception on Linux Platforms
- 12:2 : You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
- 11:33 : Threat Actors Exploit Proofpoint and Intermedia Link Wrapping to Conceal Phishing Payloads
- 11:33 : APT36 Hackers Target Indian Railways, Oil, and Government Systems Using Malicious PDF Files
- 11:33 : LLMs Boost Offensive R&D by Identifying and Exploiting Trapped COM Objects
- 11:32 : The best free software uninstallers of 2025: Expert tested
- 11:32 : Google releases its award-winning Math Olympiad model, but it’ll come at a price
- 11:32 : ToolShell under siege: Check Point analyzes Chinese APT Storm-2603
- 11:32 : Spying on People Through Airportr Luggage Delivery Service
- 11:32 : Microsoft Upgrades .NET Bounty Program with Rewards to Researchers Up to $40,000
- 11:32 : Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
- 11:32 : CISA Issues ICS Advisories for Rockwell Automation Using VMware, and Güralp Seismic Monitoring Systems
- 11:32 : Cybercrooks attached Raspberry Pi to bank network and drained ATM cash
- 11:5 : IT Security News Hourly Summary 2025-08-01 12h : 8 posts
- 11:3 : Cyber Risk Management Firm Safe Raises $70 Million
- 11:3 : Hackers Regularly Exploit Vulnerabilities Before Public Disclosure, Study Finds
- 11:3 : Secret Blizzard Targets Moscow-Based Embassies in New Espionage Campaign
- 10:3 : Microsoft to Block External Workbook Links to Unsafe File Types by Default
- 10:3 : The best laptop cooling pads of 2025: Expert tested
- 10:3 : Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
- 9:32 : WhatsApp 0-Click RCE Exploit Worth $1 Million at Pwn2Own Ireland 2025
- 9:32 : The best printers of 2025: Your home office is about to get so much better
- 9:32 : Own a Samsung phone? 10 settings I always change first for the best user experience
- 9:32 : Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images
- 9:32 : Staggering 800% Rise in Infostealer Credential Theft
- 9:3 : Lack of Visibility Isn’t the Problem. It’s What Happens Next That Should Worry You.
- 8:33 : Looking for a budget travel tablet? I found one under $200 that hits all the right notes
- 8:33 : CISA released Thorium platform to support malware and forensic analysis
- 8:32 : Search Engines are Indexing ChatGPT Conversations! – Here is our OSINT Research
- 8:32 : Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
- 8:32 : UK Leads the Way with £15m AI Alignment Project
- 8:5 : IT Security News Hourly Summary 2025-08-01 09h : 6 posts
- 7:33 : These $300 Swarovski earbuds aren’t my style, but their sound quality has me hooked
- 7:32 : Japan’s Active Cyberdefense Law: A New Era in Cybersecurity Strategy
- 7:32 : Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
- 7:32 : $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
- 7:32 : ATM Raspberry Pi breach, Easterly West Point cancellation, Chinese company-hacker link
- 7:2 : Confidential containers on Microsoft Azure with Red Hat OpenShift Sandboxed Containers 1.10 and Red Hat Build of Trustee
- 7:2 : Deploy sensitive workloads with OpenShift confidential containers
- 7:2 : Smart steps to keep your AI future-ready
- 6:32 : Top spy says LinkedIn profiles that list defence work ‘recklessly invite attention of foreign intelligence services’
- 6:32 : It’s time to sound the alarm on water sector cybersecurity
- 6:31 : Cybersecurity Today: Supply Chain Attacks, St. Paul’s Cyber Emergency, and Ingram Micro’s Data Breach
- 6:2 : Hackers Abuse EDR Free Trials to Bypass Endpoint Protection
- 6:2 : Microsoft Upgrades .NET Bounty Program, Offers Rewards Up to $40,000
- 5:32 : Over 17,000 SharePoint Servers Found Exposed Online — 840 Vulnerable to Active 0-Day Attacks
- 5:32 : CISA Releases Thorium: Open-Source Malware and Forensics Tool Now Public
- 5:32 : Review: CISA Certified Information Systems Auditor Practice Tests
- 5:31 : What attackers know about your company thanks to AI
- 5:5 : IT Security News Hourly Summary 2025-08-01 06h : 2 posts
- 5:2 : Security gaps still haunt shared mobile device use in healthcare
- 4:32 : Ransomware Payment Bans: Prevention Strategy or Misguided Policy?
- 4:32 : Salt Security Unveils Salt Surface to Expose Hidden API Risks
- 4:3 : Infosec products of the month: July 2025
- 3:32 : Microsoft Authenticator won’t manage your passwords anymore – or most passkeys
- 2:32 : Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations
- 2:31 : Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
- 2:5 : IT Security News Hourly Summary 2025-08-01 03h : 5 posts
- 2:2 : ISC Stormcast For Friday, August 1st, 2025 https://isc.sans.edu/podcastdetail/9552, (Fri, Aug 1st)
- 2:2 : This one feature could make GPT-5 a true game changer (if OpenAI gets it right)
- 2:2 : Why the best-value robot vacuum right now isn’t made by iRobot or Shark
- 1:32 : I replaced my ThinkPad with this Lenovo tablet for a week – and it was pretty dang close
- 1:32 : Finally, an Android tablet that I can confidently recommend to gamers
- 1:32 : The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
- 1:2 : New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials
- 1:2 : First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account
- 1:2 : Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials
- 1:2 : Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware
- 1:2 : Navigating APTs – Singapore’s Cautious Response to State-Linked Cyber Attacks
- 23:32 : Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated July 31)
- 23:32 : Apple Patches Zero-Day Exploit Targeting Google Chrome Users
- 23:32 : Pi-hole – 29,926 breached accounts
- 23:1 : IT Security News Weekly Summary August
- 22:55 : IT Security News Daily Summary 2025-07-31
- 22:32 : NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets
- 22:31 : Chinese Silk Typhoon Hackers Filed 10+ Patents for Highly Intrusive Hacking Tools
- 22:3 : China’s Covert Capabilities | Silk Spun From Hafnium
- 22:3 : How to Run a Firewall Test: A Guide for Enterprises
- 22:2 : External Attack Surface Management: The Complete Guide
- 22:2 : Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines