159 posts were published in the last hour
- 21:32 : Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
- 21:32 : Allianz Life – 1,115,061 breached accounts
- 21:32 : Intrusion Detection and Prevention
- 21:3 : I tested this Garmin sleep tracker for weeks – here’s why it replaces my smart ring for good
- 21:2 : Save up to $400 on Razer’s newest gaming laptop – this back-to-school deal deal won’t last long
- 20:32 : My new favorite universal adapter for traveling has a hidden superpower (and on sale)
- 20:32 : Pot calls kettle black as China dubs US ‘surveillance empire’ over chip tracking
- 20:5 : IT Security News Hourly Summary 2025-08-18 21h : 8 posts
- 20:3 : Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan
- 20:2 : Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
- 19:33 : My internet went down – but this TV USB port trick made the outage more bearable
- 19:3 : Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft
- 19:3 : Every Google Pixel Watch owner should know these 2 simple performance tricks
- 19:3 : AI for Cybersecurity: Building Trust in Your Workflows
- 18:32 : Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
- 18:32 : The Kill Switch: A Coder’s Silent Act of Revenge
- 18:32 : Claude can now stop conversations – for its own protection, not yours
- 18:32 : I replaced my smartwatch with Garmin’s new sleep tracker for weeks – here’s my verdict
- 18:32 : Vulnerability Summary for the Week of August 11, 2025
- 18:4 : Upgrading your headphones? 5 things I recommend doing with your current pair first
- 17:33 : Fake Copyright Notices Drop New Noodlophile Stealer Variant
- 17:33 : Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence
- 17:33 : This universal adapter’s hidden superpower earned it a spot in my travel bag
- 17:32 : Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data
- 17:32 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 17:32 : Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
- 17:5 : IT Security News Hourly Summary 2025-08-18 18h : 13 posts
- 17:3 : Why my favorite MacBook Pro alternative is this Windows laptop with a striking design
- 17:3 : GPT-5 is friendlier now – but not everyone likes it. Here’s why
- 17:3 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 16:33 : Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data
- 16:33 : How much RAM does your PC really need in 2025? I did the math for Windows and Mac users
- 16:33 : How web scraping actually works – and why AI changes everything
- 16:33 : This Linux distro puts more than 20 desktops a click away
- 16:33 : CISA Adds One Known Exploited Vulnerability to Catalog
- 16:32 : Microsoft’s Nuance coughs up $8.5M to rid itself of MOVEit breach suit
- 16:32 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 16:4 : Accelerating Secure Enterprise Kubernetes Adoption
- 16:4 : Instagram Map: What is it and how do I control it?
- 16:4 : The weirdest tool I own is also one of the most useful (and it’s $10 on Amazon)
- 16:3 : Gemini Flaw Exposed Via Malicious Google Calendar Invites, Researchers Find
- 16:3 : Israel and Iran Cyber War Escalates After June Conflict Despite Ceasefire
- 16:3 : Why Hackers Focus on Certain Smart Home Devices and How to Safeguard Them
- 16:3 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 16:3 : USB Malware Campaign Spreads Cryptominer Worldwide
- 15:33 : You can delete sent text messages on Android now – here’s how
- 15:32 : Novel 5G Attack Bypasses Need for Malicious Base Station
- 15:32 : Strengthening Identity Security
- 15:32 : Workday Latest Company Hit by Third-Party CRM Platform Breach
- 15:32 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 15:4 : Manpower Data Breach Hits 144K, Workday Confirms 3rd-Party CRM Hack
- 15:4 : Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
- 15:3 : Patients trust AI’s medical advice over doctors – even when it’s wrong, study finds
- 15:3 : The Dark Side of Digital Advertising: Cyber Threats In 2025
- 15:3 : Workday warns of CRM breach after social engineers make off with business contact details
- 15:3 : New NIST guide explains how to detect morphed images
- 15:3 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 15:3 : Popular npm Package Compromised in Phishing Attack
- 14:33 : Keeping an Eye on MFA-Bombing Attacks, (Mon, Aug 18th)
- 14:33 : 5 reasons to switch to an immutable Linux distro today – and which to try first
- 14:33 : APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures
- 14:33 : X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-Grade AES-256 Encryption
- 14:33 : Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges
- 14:33 : New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
- 14:33 : Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
- 14:32 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 14:4 : How much RAM does your Linux PC really need in 2025?
- 14:4 : Have solar at home? Supercharge that investment with this other crucial component
- 14:4 : I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner
- 14:4 : Should you replace a traditional Wi-Fi router with mesh? I compared the two, and here’s my verdict
- 14:3 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 13:33 : Bragg Confirms Cyberattack, Internal IT Systems Breached
- 13:33 : EchoLink and the Rise of Zero-Click AI Exploits
- 13:33 : I tested Soundcore’s new sleep earbuds. Here’s who I’d recommend them to (and who I wouldn’t)
- 13:33 : Grammarly’s new AI agents can detect AI text and find citations for you – automatically
- 13:33 : Pixel Watch running slow? Do this to instantly improve the performance
- 13:33 : HR giant Workday says hackers stole personal data in recent breach
- 13:33 : 7 Things I Wish I Knew Before Becoming a CISO
- 13:33 : VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and 50 Bug Fixes
- 13:33 : 1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities
- 13:32 : Noodlophile infostealer is hiding behind fake copyright and PI infringement notices
- 13:32 : ⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
- 13:5 : Linux Kernel Netfilter Flaw Enables Privilege Escalation
- 13:4 : DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
- 13:4 : 7 Considerations for Disaster Recovery Plans for Remote Workforces
- 13:4 : Chinese APT Group Targets Web Hosting Services in Taiwan
- 12:32 : An explanation of quantum key distribution
- 12:32 : Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities
- 12:4 : WarLock Ransomware group Claims Breach at Colt Telecom and Hitachi
- 12:4 : Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
- 12:4 : Workday Data Breach Bears Signs of Widespread Salesforce Hack
- 11:32 : Silicon In Focus Podcast: CX 2040: Predicting the Next Era of Experience
- 11:32 : DOJ Seizes $2.8 Million, Indicts Alleged Zeppelin Ransomware Operator
- 11:5 : IT Security News Hourly Summary 2025-08-18 12h : 19 posts
- 11:4 : Accenture Buys Australia’s CyberCX As Breaches Rise
- 11:4 : Oracle Cloud To Offer Google’s Gemini AI Models
- 11:4 : New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
- 11:4 : The best cheap smartwatches of 2025: Expert tested and reviewed
- 11:4 : Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration
- 11:4 : What is Use-After-Free Vulnerability? – Impact and Mitigation
- 11:3 : Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
- 11:3 : Boffins say tool can sniff 5G traffic, launch ‘attacks’ without using rogue base stations
- 11:3 : US Seizes $2.8 Million From Zeppelin Ransomware Operator
- 11:3 : DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching
- 11:3 : Wazuh for Regulatory Compliance
- 10:33 : North Korean Hackers’ Secret Linux Malware Surfaces Online
- 10:32 : The best flip phones of 2025: Where does the Samsung Galaxy Z Flip 7 stand?
- 10:32 : Build Job-Ready IT and Cybersecurity Skills with Hands-On Labs
- 10:32 : Every question you ask, every comment you make, I’ll be recording you
- 10:32 : Colt Customers Face Prolonged Outages After Major Cyber Incident
- 10:4 : I tested the best antivirus software for Windows: Here’s what I’d use to protect my PC
- 10:4 : I dialed these 14 secret codes to unlock hidden features on my Android and iPhone
- 10:4 : Human resources firm Workday disclosed a data breach
- 10:3 : Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets
- 9:33 : VW Offers Paid Subscription To Unlock Horsepower
- 9:33 : Intel Shares Jump On Report Of Possible US Government Stake
- 9:33 : Insta360 Challenges DJI With 360-Degree Drone
- 9:33 : Applied Materials Shares Plunge On Reduced China Demand
- 9:33 : US Court Partially Blocks Maryland Digital Tax Law
- 9:33 : The AI-Powered Trojan Horse Returns: How LLMs Revive Classic Cyber Threats
- 9:33 : Here are all the GPT-5 updates OpenAI has rolled out since launch
- 9:33 : The best Motorola phones of 2025: Is the $1,300 Razr Ultra worth buying?
- 9:32 : Plagued by Cyberattacks: Indian Healthcare Sector in Critical Condition
- 9:32 : Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time
- 9:32 : HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM
- 9:32 : Man Jailed for 20 Months After Compromising Millions of Accounts
- 9:5 : Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites
- 9:5 : Workday Data Breach Exposes HR Records via Third-Party CRM Hack
- 9:5 : DoJ seizes $2.8M linked to Zeppelin Ransomware
- 9:5 : Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824
- 9:4 : Workday Reveals CRM Breach
- 8:33 : I love my Samsung Z Fold 7, but these Google Pixel upgrades would win me over
- 8:3 : How to spot wrong number phone scams
- 8:3 : Xerox fixed path traversal and XXE bugs in FreeFlow Core
- 7:33 : Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data
- 7:33 : Threat Actor Allegedly Claiming Access to 15.8 Million PayPal Email and Passwords in Plaintext
- 7:33 : North Korean Hackers Stealthy Linux Malware Leaked Online
- 7:33 : Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption
- 7:33 : A week in security (August 11 – August 17)
- 7:33 : Cisco firewall warning, Colt Telecom cyberattack, CISA’s OT request
- 7:4 : Someone’s poking the bear with infostealers targeting Russian crypto developers
- 7:4 : Breaking Cybersecurity News: Canada’s House of Commons Breached and Windows 10 Support Ending Soon
- 6:33 : Do We Have a CISO Payola Problem?
- 6:3 : Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites
- 6:3 : How security teams are putting AI to work right now
- 5:33 : Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
- 5:33 : Critical PostgreSQL Flaws Allow Code Injection During Restoration
- 5:32 : Review: Data Engineering for Cybersecurity
- 5:32 : Buttercup: Open-source AI-driven system detects and patches vulnerabilities
- 4:32 : Bridging the AI model governance gap: Key findings for CISOs
- 4:32 : Weak alerting and slipping prevention raise risk levels for CISOs
- 2:32 : Ultrahuman brings advanced cycle and ovulation tracking to its smart ring
- 2:3 : ISC Stormcast For Monday, August 18th, 2025 https://isc.sans.edu/podcastdetail/9574, (Mon, Aug 18th)
- 0:2 : Colt Technology faces multi-day outage after WarLock ransomware attack
- 23:32 : Threat Actor Claims to Sell 15.8 Million Plain-Text PayPal Credentials
- 23:32 : P2P payment service Zelle sued for enabling payment fraud hell
- 23:5 : IT Security News Hourly Summary 2025-08-18 00h : 5 posts
- 22:58 : IT Security News Weekly Summary 33
- 22:55 : IT Security News Daily Summary 2025-08-17