146 posts were published in the last hour
- 22:34 : AWS, Nvidia, CrowdStrike seek security startups to enter the arena
 - 22:34 : Ransomware negotiator, pay thyself!
 - 22:34 : Scaling Your Security with NHIs: Key Insights
 - 22:34 : Empowering Teams with Robust NHI Management
 - 22:34 : Innovating Cyber Defense with Enhanced NHIDR
 - 22:8 : How an ex-L3 Harris Trenchant boss stole and sold cyber exploits to Russia
 - 21:14 : Detecting Supply Chain Attacks in NPM, PyPI, and Docker: Real-World Techniques That Work
 - 21:14 : Defense in Depth for AI: The MCP Security Architecture You’re Missing
 - 20:34 : Jabber Zeus developer ‘MrICQ’ extradited to US from Italy
 - 20:34 : AWS, Nvidia, Crowdstrike seek security startups to enter the arena
 - 20:8 : Sketchy Graphics: Windows GDI Flaws Open RCE and Data Loss
 - 20:8 : DOJ accuses US ransomware negotiators of launching their own ransomware attacks
 - 20:8 : How Ransomware Attacks Leverage Cyber Insurance Policies
 - 20:5 : IT Security News Hourly Summary 2025-11-03 21h : 2 posts
 - 19:9 : Browser detection and response fills gaps in security programs
 - 19:9 : Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
 - 18:34 : Unauthenticated RCE in WSUS Puts Organizations at Risk
 - 18:34 : Analysis Playbooks: USB
 - 18:34 : Microsoft Patch for WSUS Vulnerability has Broken Hotpatching on Windows Server 2025
 - 18:34 : Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
 - 18:33 : SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
 - 18:4 : New Dante Spyware Linked to Rebranded Hacking Team, Now Memento Labs
 - 18:4 : Is Your Tech Stack Killing Profitability? The Silent Bug Crippling MSP Growth
 - 18:4 : Cyber Insurance Statistics for 2025
 - 18:4 : Cybercrooks team up with organized crime to steal pricey cargo
 - 18:4 : NDSS 2025 – Statically Discover Cross-Entry Use-After-Free Vulnerabilities In The Linux Kernel
 - 18:4 : Bridging the Trust Gap with 1Password
 - 17:34 : 400,000 WordPress Sites Affected by Account Takeover Vulnerability in Post SMTP WordPress Plugin
 - 17:34 : Recent Vulnerabilities in Redis Server’s Lua Scripting Engine
 - 17:34 : Security leaders say AI can help with governance, threat detection, SOC automation
 - 17:6 : Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
 - 17:6 : CISA and NSA Outline Best Practices to Secure Exchange Servers
 - 17:6 : Cybercrime groups team with organized crime in massive cargo theft campaigns
 - 17:5 : IT Security News Hourly Summary 2025-11-03 18h : 12 posts
 - 16:34 : Tidal Cyber Launches NARC: The First Automated AI Engine to Extract Adversary Procedures for Threat-Led Defense
 - 16:34 : Tata Motors Fixes Security Flaws That Exposed Sensitive Customer and Dealer Data
 - 16:34 : Shadow AI Quietly Spreads Across Workplaces, Study Warns
 - 16:34 : Microsoft Warns Windows 10 Users: Hackers Target Outdated Systems
 - 16:34 : India Moves to Mandate Labels on AI-Generated Content Across Social Media
 - 16:10 : November is the Month of Searches: Explore, Learn, and Share with #MonthOfVTSearch
 - 16:9 : 6 Reasons Occupancy Monitoring Is Key for Energy Efficiency
 - 16:9 : Attack of the clones: Fake ChatGPT apps are everywhere
 - 16:9 : Nation-State Hackers Breach Major Telecom Provider Ribbon Communications
 - 16:9 : Would you sext ChatGPT? (Lock and Code S06E22)
 - 16:9 : How Software Development Teams Can Securely and Ethically Deploy AI Tools
 - 16:9 : New GDI Flaws Could Enable Remote Code Execution in Windows
 - 15:34 : Navigating the Cyber Frontier: AI and ML’s Role in Shaping Tomorrow’s Threat Defense
 - 15:34 : Airstalk Malware Turns MDM Tools into Covert Spy Channels
 - 15:34 : Chrome 142 Released: Two high-severity V8 flaws fixed, $100K in rewards paid
 - 15:7 : Aardvark: OpenAI’s Autonomous AI Agent Aims to Redefine Software Security
 - 15:7 : New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
 - 15:7 : Beware of New Phishing Attack that Abuses Cloudflare and ZenDesk Pages to Steal Logins
 - 15:7 : How to Align with the NIST CSF 2.0 | Accelerating Growth with CyberStrong
 - 15:7 : Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - 15:7 : Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
 - 15:7 : Hackers Help Organized Crime Groups in Cargo Freight Heists, Researchers Find
 - 14:34 : XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd)
 - 14:34 : AI Pulse: How Big Tech Impacts AI Bot Traffic
 - 14:34 : Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
 - 14:34 : Android Apps misusing NFC and HCE to steal payment data on the rise
 - 14:34 : Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
 - 14:34 : Conti Group Member Responsible for Deploying Ransomware Extradited to USA
 - 14:34 : Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases
 - 14:34 : Zenity delivers runtime protection for OpenAI’s AgentKit
 - 14:9 : LABScon25 Replay | LLM-Enabled Malware In the Wild
 - 14:9 : Hackers Actively Scanning TCP Ports 8530/8531 for WSUS CVE-2025-59287
 - 14:9 : Malwarebytes aces PCMag Readers’ Choice Awards and AVLab Cybersecurity Foundation tests
 - 14:5 : IT Security News Hourly Summary 2025-11-03 15h : 14 posts
 - 13:34 : Proton Brings Privacy-Focused AI to the Workplace with Lumo for Business
 - 13:34 : Claude AI APIs Can Be Abused for Data Exfiltration
 - 13:34 : Stop Using Public Wi-Fi: Critical Security Risks Explained
 - 13:34 : Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
 - 13:34 : Penn Hacker Claims Major Data Breach
 - 13:34 : BankBot YNRK And DeliveryRAT Exposed
 - 13:34 : Apple Pay VP Unveils Wallet Updates
 - 13:34 : China Linked Hackers Exploit Shortcut In
 - 13:34 : HTTPTroy Backdoor Poses As VPN Invoice
 - 13:7 : North Korean Hackers Caught on Video Using AI Filters in Fake Job Interviews
 - 13:7 : The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
 - 13:7 : ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
 - 13:7 : Metropolitan Police hails facial recognition tech after record year for arrests
 - 13:7 : Cybersecurity M&A Roundup: 45 Deals Announced in October 2025
 - 12:34 : Critical UniFi OS Flaw Enables Remote Code Execution
 - 12:34 : Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident
 - 12:34 : Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
 - 12:34 : Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets
 - 12:34 : Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - 12:5 : Ground zero: 5 things to do after discovering a cyberattack
 - 12:5 : In memoriam: David Harley
 - 12:5 : Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data
 - 11:34 : DHS to collect biometric info from every non-citizen on the way in and out of the USA
 - 11:34 : YouTube ‘Ghost Network’ Spreads Infostealer via 3,000 Fake Videos
 - 11:34 : New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic
 - 11:34 : Password manager KeePass 2.60 is now available: here is what is new
 - 11:7 : An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’
 - 11:7 : The race to shore up Europe’s power grids against cyberattacks and sabotage
 - 11:7 : The New Frontier of Cyber Threats: Unpacking Prompt Injection, Model Poisoning and Adversarial Attacks in AI Security
 - 11:6 : Standing to Sue – The Elephant in the Room
 - 11:6 : New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
 - 11:5 : IT Security News Hourly Summary 2025-11-03 12h : 8 posts
 - 10:34 : From Gap to Growth: How Enterprises Are Rethinking Talent in the Age of AI
 - 10:34 : From Gap to Growth: Head-to-Head: Cassandra MacDonald
 - 10:34 : New BOF Tool Bypasses Microsoft Teams Cookie Encryption to Steal User Chats
 - 10:34 : Hack Exposes Kansas City’s Secret Police Misconduct List
 - 10:33 : Chinese APT Uses ‘Airstalk’ Malware in Supply Chain Attacks
 - 10:33 : Conti Suspect in Court After Extradition From Ireland
 - 10:6 : Delaware Touts Legal Guardrails After OpenAI Restructure
 - 10:6 : Leak Site Ransomware Victims Spike 13% in a Year
 - 9:34 : Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
 - 9:33 : Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities
 - 9:6 : Pony.ai Obtains First Permit To Operate Robotaxis Across Shenzhen
 - 8:37 : Chinese Scam Victims Seek Restitution After UK’s £5bn Crypto Seizure
 - 8:37 : Progress Fixes High-Severity MOVEit Transfer Vulnerability
 - 8:37 : Conduent January 2025 breach impacts 10M+ people
 - 8:37 : New BOF Tool Exploits Microsoft Teams’ Cookie Encryption Allowing Attackers to Access User Chats
 - 8:37 : A week in security (October 27 – November 2)
 - 8:37 : Australia BadCandy warning, Cisco firewall attack, Aardvark eats bugs
 - 8:6 : Nexperia Cuts Off Wafer Supplies To Chinese Unit
 - 8:6 : Windows 11 24H2/25H2 Flaw Keeps Task Manager Running After You Close It
 - 8:6 : Conti Ransomware Operator Extradited to the United States
 - 8:6 : AzureHound Tool Weaponized to Map Azure and Entra ID Environments
 - 8:5 : IT Security News Hourly Summary 2025-11-03 09h : 2 posts
 - 7:34 : BO7 boosting: Cross-platform, Game Pass & cloud logistics
 - 7:6 : A new way to think about zero trust for workloads
 - 6:34 : Heisenberg: Open-source software supply chain health check tool
 - 6:4 : EDR-Redir V2 Evades Detection on Windows 11 by Faking Program Files
 - 6:4 : OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
 - 6:4 : Employees keep finding new ways around company access controls
 - 6:4 : Securing real-time payments without slowing them down
 - 6:4 : Alarm Bells in Ivy League School
 - 5:34 : OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5
 - 5:34 : Europe’s phone networks are drowning in fake calls
 - 5:5 : IT Security News Hourly Summary 2025-11-03 06h : 1 posts
 - 5:4 : Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web
 - 3:6 : ISC Stormcast For Monday, November 3rd, 2025 https://isc.sans.edu/podcastdetail/9682, (Mon, Nov 3rd)
 - 3:6 : TDL 008 | Defending the Frontline: Ransomware, AI, and Real-World Lessons
 - 2:33 : Lightweight Open Source Identity Management Solutions for Home Labs
 - 2:5 : IT Security News Hourly Summary 2025-11-03 03h : 3 posts
 - 1:6 : Apple Removes Controversial Dating Apps After Data Leak and Privacy Violations
 - 1:6 : The Threats of Agentic AI Data Trails
 - 1:6 : ChatGPT Atlas Surfaces Privacy Debate: How OpenAI’s New Browser Handles Your Data
 - 0:6 : 8 Top Application Security Tools (2026 Edition)
 - 0:6 : Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
 - 23:5 : IT Security News Hourly Summary 2025-11-03 00h : 2 posts
 - 22:58 : IT Security News Weekly Summary 44
 - 22:55 : IT Security News Daily Summary 2025-11-02