137 posts were published in the last hour
- 21:32 : Friday Squid Blogging: Squid Inks Philippines Fisherman
- 21:2 : Denial of Fuzzing: Rust-Safe Code Triggers Kernel Crashes in Windows
- 21:2 : 5 SOC Problems Morpheus Solves (That Legacy Tools Can’t)
- 20:32 : News brief: National cyberdefenses under mounting pressure
- 20:32 : NDSS 2025 – Workshop On The Security Of Space And Satellite Systems (SpaceSec) 2025, Panel
- 19:32 : Microsoft Warns: Ransomware Powers Most Cyberattacks
- 19:5 : IT Security News Hourly Summary 2025-10-17 21h : 2 posts
- 19:2 : What is a backup storage device?
- 19:2 : TDL 007 | Cyber Warriors & Digital Shadows: Insights from Canada’s Cybersecurity Leader
- 18:2 : Securing Amazon Bedrock API keys: Best practices for implementation and management
- 17:3 : Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
- 17:3 : Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
- 17:3 : Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
- 16:32 : Generative AI and Agentic Systems: The New Frontline in Phishing and Smishing Defense
- 16:32 : Q3 Ransomware Attacks Increase 36% YoY, BlackFog Report Reveals
- 16:32 : Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
- 16:32 : Hands-On Web Application Security
- 16:5 : IT Security News Hourly Summary 2025-10-17 18h : 12 posts
- 16:4 : North Korean Hackers Use Blockchain to Hide Crypto-Stealing Malware
- 16:4 : Have I Been Pwned logs 17.6M victims in Prosper breach
- 16:4 : OAuth for MCP – Emerging Enterprise Patterns for Agent Authorization
- 16:4 : BreachForums Taken Down by FBI and French Authorities as LAPSUS$-Linked Group Threatens Salesforce Data Leak
- 16:4 : NK Hackers Hide Malware In Blockchain
- 16:4 : Microsoft Pulls 200 Suspicious Certificates
- 16:4 : Five Healthcare Providers Warn Patients
- 16:4 : Matters AI Raises 6 Million For Security
- 16:4 : Qilin Ransomware Claims New Victims
- 16:4 : Fortune 500 companies designate specialist roles to bolster security operations teams
- 15:32 : CISA Warns of Critical Vulnerability in Adobe Experience Manager Forms
- 15:32 : F5 supply-chain hack endangers more than 600,000 internet-connected devices
- 15:2 : From AI to Generative AI: The Evolution of Cloud Security Operations
- 15:2 : North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
- 15:2 : Teen Tied to Russian Hackers in Dutch Cyber Espionage Probe
- 14:32 : Hackers Using AI to Automate Vulnerability Discovery and Malware Generation – Microsoft Report
- 14:32 : Chrome vs Comet: Security Concerns Rise as AI Browsers Face Major Vulnerability Reports
- 14:32 : Asahi Beer Giant Hit by Cyberattack, Forced to Manual Operations
- 14:32 : Data Breach at Bectu Exposes Members’ Information and Bank Details
- 14:32 : North Korean Hackers Use EtherHiding to Steal Crypto
- 14:12 : Attackers Exploit Zendesk Authentication Issue to Flood Targets’ Inboxes with Corporate Notifications
- 14:12 : A critical WatchGuard Fireware flaw could allow unauthenticated code execution
- 14:12 : In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach
- 13:33 : Wordfence Bug Bounty Program Monthly Report – September 2025
- 13:32 : TikTok Videos Weaponized to Deliver Self-Compiling PowerShell Malware
- 13:32 : WatchGuard VPN Flaw Allows Remote Attackers to Execute Arbitrary Code
- 13:32 : Fortinet Advances Global Cyber Resilience at the World Economic Forum’s Annual Meeting on Cybersecurity
- 13:32 : Critical ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates
- 13:32 : APT28 With Weaponized Office Documents Delivers BeardShell and Covenant Modules
- 13:32 : Windows Rust-based Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error
- 13:32 : New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials
- 13:32 : Labor unions sue Trump administration over social media surveillance
- 13:5 : IT Security News Hourly Summary 2025-10-17 15h : 7 posts
- 13:3 : ClickFake Interview Campaign Used by Threat Actors to Deliver OtterCandy Malware
- 13:3 : Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia
- 13:3 : Powering AI at the Tactical Edge
- 13:3 : Carmakers fear chip crunch as Dutch sanctions hit Nexperia
- 13:3 : Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- 12:32 : Prosper disclosed a data breach impacting 17.6 million accounts
- 12:32 : Hackers used Cisco zero-day to plant rootkits on network devices (CVE-2025-20352)
- 12:2 : AI, Quantum Computing and Other Emerging Risks
- 12:2 : Over $3 Million in Prizes Offered at Pwn2Own Automotive 2026
- 12:2 : Identity Security: Your First and Last Line of Defense
- 11:32 : Malicious Perplexity Comet Browser Download Ads Push Malware Via Google
- 11:32 : Email Bombs Exploit Lax Authentication in Zendesk
- 11:32 : A Surprising Amount of Satellite Traffic Is Unencrypted
- 11:32 : Hackers Steal Sensitive Data From Auction House Sotheby’s
- 11:3 : New Tech Support Scam Exploits Microsoft Logo to Steal User Credentials
- 11:2 : Cisco Desk, IP, and Video Phone Vulnerabilities Let Remote Attackers Trigger DoS And XSS Attacks
- 11:2 : LinkPro Rootkit Attacking GNU/Linux Systems Using eBPF Module to Hide Malicious Activities
- 11:2 : ‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability
- 11:2 : Prosper Data Breach Exposes 17 Million Customers’ Personal Info
- 10:33 : Microsoft revokes 200+ certificates abused by Vanilla Tempest in fake Teams campaign
- 10:33 : Prosper data breach puts 17 million people at risk of identity theft
- 10:32 : Differences Between Secure by Design and Secure by Default
- 10:5 : IT Security News Hourly Summary 2025-10-17 12h : 12 posts
- 10:2 : Windows GDI Vulnerability in Rust Kernel Module Enables Remote Attacks
- 10:2 : Post-exploitation framework now also delivered via npm
- 10:2 : Microsoft revokes 200 certs used to sign malicious Teams installers
- 10:2 : Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
- 9:32 : New York Judge Sanctions Lawyer Over AI-Generated Filings
- 9:32 : ConnectWise Flaws Let Attackers Deliver Malicious Software Updates
- 9:32 : Microsoft Report Warns of AI-Powered Automation in Cyberattacks and Malware Creation
- 9:32 : Microsoft’s Patch Tuesday: 172 Flaws Fixed
- 9:32 : PowerSchool hacker got four years in prison
- 9:32 : Over 269,000 F5 Devices Exposed Online After Major Breach: U.S. Faces Largest Risk
- 9:32 : North Korean Hackers Using EtherHiding to Deliver Malware and Steal Cryptocurrency
- 9:32 : VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support
- 9:3 : Is it possible to keep AI out of your personal life?
- 9:3 : ABB Sees Surge In AI Data Centre Orders
- 9:3 : Authors Sue Salesforce Over AI Training Methods
- 9:3 : APT28 Deploys BeardShell and Covenant Modules via Weaponized Office Documents
- 9:3 : Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
- 9:3 : Prosper Data Breach Impacts 17.6 Million Accounts
- 8:32 : Auction house Sotheby’s disclosed a July data breach
- 8:32 : F5 Released Security Updates Covering Multiple Products Following Recent Hack
- 8:32 : Under the engineering hood: Why Malwarebytes chose WordPress as its CMS
- 8:32 : Vulnerabilities Allow Disruption of Phoenix Contact UPS Devices
- 8:32 : Levo.ai platform unifies AI security and compliance from development to runtime
- 8:32 : AISLE emerges from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities
- 8:32 : Censys ICS/OT solution closes visibility gaps and secures exposed industrial systems
- 8:32 : Security Teams Must Deploy Anti-Infostealer Defenses Now
- 8:2 : TikTok Videos Promoting Malware Installation, (Fri, Oct 17th)
- 8:2 : Lyft To Open Toronto Tech Hub In International Growth Push
- 8:2 : Over 269,000 F5 Devices Found Exposed Online After Massive Breach
- 8:2 : Gladinet Patches Exploited CentreStack Vulnerability
- 7:32 : Anthropic Updates Low-Cost Haiku AI Model
- 7:32 : SEO spam and hidden links: how to protect your website and your reputation
- 7:32 : AISLE launches from stealth with AI-native cyber reasoning system to tackle zero-day vulnerabilities
- 7:32 : Sotheby’s suffers cyberattack, Cisco “Zero Disco’ attacks, Microsoft revokes ransomware certificates
- 7:5 : IT Security News Hourly Summary 2025-10-17 09h : 7 posts
- 7:2 : Apple Rolls Out Devices With Faster M5 Chip
- 7:2 : Government Rejects Cummings’ China Intelligence Breach Claim
- 7:2 : Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
- 6:32 : VMware Releases Workstation & Fusion 25H2 With Enhanced Features and OS Support
- 6:32 : LinkPro: An eBPF-Based Rootkit Hiding Malicious Activity on GNU/Linux
- 6:32 : F5 Security Incident Advisory
- 6:32 : How Ransomware’s Data Theft Evolution is Rewriting Cyber Insurance Risk Models
- 6:2 : F5 Issues Security Patches for Multiple Products After Recent Breach
- 6:2 : Critical Cisco IOS and IOS XE Flaws Allow Remote Code Execution
- 6:2 : Inside healthcare’s quiet cybersecurity breakdown
- 6:2 : A new approach to blockchain spam: Local reputation over global rules
- 5:32 : SAP zero-day wake-up call: Why ERP systems need a unified defense
- 5:2 : North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets
- 5:2 : Everyone’s adopting AI, few are managing the risk
- 4:5 : IT Security News Hourly Summary 2025-10-17 06h : 2 posts
- 4:2 : Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
- 4:2 : New infosec products of the week: October 17, 2025
- 2:2 : ISC Stormcast For Friday, October 17th, 2025 https://isc.sans.edu/podcastdetail/9660, (Fri, Oct 17th)
- 1:5 : IT Security News Hourly Summary 2025-10-17 03h : 1 posts
- 1:2 : How Votiro Turns Threat Prevention Into Intelligence
- 0:2 : Choosing the Best NHIs Options for Your Needs
- 0:2 : Foster Innovation with Strong NHI Security Measures
- 0:2 : Satisfying Regulatory Requirements with PAM
- 0:2 : SIEM, Startups, and the Myth (Reality?) of IT Inertia: A Reformed Analyst Reflects on SIEM MQ 2025
- 22:5 : IT Security News Hourly Summary 2025-10-17 00h : 3 posts
- 22:2 : Voting Machine Company Smartmatic Charged in Federal Indictment That Previously Only Charged Executives
- 22:2 : Threat Brief: Nation-State Actor Steals F5 Source Code and Undisclosed Vulnerabilities
- 21:55 : IT Security News Daily Summary 2025-10-16