162 posts were published in the last hour
- 22:36 : Clop Ransomware group claims the breach of The Washington Post
- 21:36 : Reversing at Scale: AI-Powered Malware Detection for Apple’s Binaries
- 21:36 : Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery
- 21:36 : AI Browsers Bypass Content PayWall Mimicking as a Human-User
- 21:4 : Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management
- 20:36 : JFrog Uncovers Severe React Vulnerability Threat to Software Supply Chains
- 20:6 : Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
- 20:6 : Hackers commit highway robbery, stealing cargo and goods
- 20:5 : IT Security News Hourly Summary 2025-11-06 21h : 6 posts
- 19:38 : Cisco became aware of a new attack variant against Secure Firewall ASA and FTD devices
- 19:6 : Remember, remember the fifth of November
- 19:6 : List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
- 19:6 : Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
- 19:6 : Cisco warns of ‘new attack variant’ battering firewalls under exploit for 6 months
- 19:6 : Cognitive Threat Analytics: How Seceon Enables Next-Gen SOC Defence
- 18:34 : Google sounds alarm on self-modifying AI malware
- 18:33 : New IDC research highlights a major cloud security shift
- 18:8 : Italian political consultant says he was targeted with Paragon spyware
- 17:36 : Ubia Ubox
- 17:36 : Advantech DeviceOn/iEdge
- 17:36 : ABB FLXeon Controllers
- 17:36 : CISA Releases Four Industrial Control Systems Advisories
- 17:36 : New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections
- 17:36 : Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users
- 17:36 : Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
- 17:36 : Android malware steals your card details and PIN to make instant ATM withdrawals
- 17:36 : Conduent Healthcare Data Breach Exposes 10.5 Million Patient Records in Massive 2025 Cyber Incident
- 17:36 : iOS 26 Update Erases Key Forensic Log, Hindering Spyware Detection on iPhones
- 17:36 : Why Ransomware Attacks Keep Rising and What Makes Them Unstoppable
- 17:36 : Google Probes Weeks-Long Security Breach Linked to Contractor Access
- 17:36 : Attackers Exploit Critical Windows Server Update Services Flaw After Microsoft’s Patch Fails
- 17:9 : Take control of your privacy with updates on Malwarebytes for Windows
- 17:9 : Why Identity Intelligence Is the Front Line of Cyber Defense
- 17:8 : NDSS 2025 – – The (Un)usual Suspects – Studying Reasons For Lacking Updates In WordPress
- 17:8 : In financial sector, vendors lag behind customers on cybersecurity
- 17:5 : IT Security News Hourly Summary 2025-11-06 18h : 9 posts
- 16:34 : Wordfence Intelligence Weekly WordPress Vulnerability Report (October 27, 2025 to November 2, 2025)
- 16:34 : New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory
- 16:34 : Have I Been Pwned adds a billion new passwords to its database
- 16:34 : SonicWall says state-linked actor behind attacks against cloud backup service
- 16:34 : Financial sector’s vendors lag behind it on cybersecurity
- 16:6 : Researchers Hack ChatGPT Memories and Web Search Features
- 16:6 : Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362
- 16:6 : Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
- 16:6 : “I Paid Twice” Phishing Campaign Targets Booking.com
- 15:34 : Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
- 15:33 : Cisco fixes critical UCCX flaws, patch ASAP! (CVE-2025-20358, CVE-2025-20354)
- 15:7 : WhatsApp Rolls Out Passkey-Secured Backups On Android, iOS
- 15:7 : HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks
- 15:7 : Critical RCE Vulnerabilities in Claude Desktop Let Attackers Execute Malicious Code
- 15:6 : SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach
- 15:6 : Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload
- 15:6 : Multi-Turn Attacks Expose Weaknesses in Open-Weight LLM Models
- 15:6 : Russia Group Exploits Windows HyperV
- 15:6 : Hackers Steal Data From Swiss Bank
- 14:39 : AI Explainer: What Is Model Context Protocol?
- 14:39 : AI Browsers That Beat Paywalls by Imitating Humans
- 14:39 : Rigged Poker Games
- 14:39 : Ping Identity offers protection against adversarial AI threats
- 14:39 : Singapore Law Imposes Caning For Scams
- 14:7 : Critical Bug in Midnight Ransomware Tool Unlocks File Recovery
- 14:7 : We See Threats Before They Hit: How AI and Human Intelligence Are Rewriting Cyber Defense
- 14:6 : You’ll never guess what the most common passwords are. Oh, wait, yes you will
- 14:6 : Truffle Security Raises $25 Million for Secret Scanning Engine
- 14:6 : Team Cymru RADAR investigates external infrastructure in real time
- 14:6 : SkyCloak Backdoor Targets Defense Firms
- 14:6 : Sandworm Wipers Hit Ukraines Grain Hub
- 14:6 : Belgian Telecoms Hit By Cyberattack
- 14:6 : Nine Arrested In Crypto Laundering
- 14:6 : Ex Cyber Employees Extort US Firms
- 14:5 : IT Security News Hourly Summary 2025-11-06 15h : 11 posts
- 13:34 : Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor
- 13:34 : Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability
- 13:34 : Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts
- 13:34 : SonicWall cloud backup hack was the work of a state actor
- 13:11 : Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
- 13:11 : Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code
- 13:11 : Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes
- 13:11 : Follow Pragmatic Interventions to Keep Agentic AI in Check
- 13:11 : Collins Aerospace Deals with Mounting Aftermath of Hack
- 13:11 : ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
- 13:11 : From Tabletop to Turnkey: Building Cyber Resilience in Financial Services
- 12:38 : Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
- 12:38 : Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
- 12:38 : Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
- 12:38 : SonicWall fingers state-backed cyber crew for September firewall breach
- 12:38 : DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist
- 12:38 : Prowler embeds AI directly into security workflows
- 12:4 : Top 7 Companies Specializing in Product Discovery Phase in 2025
- 12:4 : Scam Ads Are Flooding Social Media. These Former Meta Staffers Have a Plan
- 12:4 : Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
- 12:4 : Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
- 12:4 : Hacktivist-Driven DDoS Dominates Attacks on Public Sector
- 11:36 : Automotive IT Firm Hyundai AutoEver Discloses Data Breach
- 11:7 : Do robots dream of secure networking? Teaching cybersecurity to AI systems
- 11:7 : Keeper Security launches Forcefield to defend against memory-based attacks on Windows devices
- 11:6 : Three Infamous Cybercriminal Groups Form a New Alliance Dubbed ‘Scattered LAPSUS$ Hunters’
- 11:6 : Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild
- 11:6 : Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild
- 11:6 : Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders
- 11:6 : Multiple Django Vulnerabilities Enable SQL injection and DoS Attack
- 11:6 : Cyberattacks on UK water systems reveal rising risks to critical infrastructure
- 11:6 : Malware-pwned laptop gifts cybercriminals Nikkei’s Slack
- 11:5 : IT Security News Hourly Summary 2025-11-06 12h : 9 posts
- 10:36 : Upgrade to Microsoft Windows 11 Home for Just $10
- 10:36 : Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs
- 10:36 : Cisco Patches Critical Vulnerabilities in Contact Center Appliance
- 10:36 : Your AI-driven threat hunting is only as good as your data platform and pipeline
- 10:9 : Apple Said To Be Deploying Google AI For Siri Features
- 10:9 : Red Teaming LLMs 2025 – Offensive Security Meets Generative AI
- 10:8 : State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
- 10:8 : Russia-linked hackers intensify attacks as global APT activity shifts
- 10:8 : AI-Enabled Malware Now Actively Deployed, Says Google
- 9:34 : Amazon Sues Perplexity Over AI Shopping Agent
- 9:34 : Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks
- 9:34 : 1touch.io Kontxtual provides LLM-driven control over sensitive data
- 9:5 : France Bans Shein Over Sex Dolls Scandal
- 9:5 : US Ends Review Of Google’s $32bn Wiz Buy
- 9:5 : Fairphone To Enter US Market With Repairable Headphones
- 9:5 : ValleyRAT Campaign Targets Windows via WeChat and DingTalk
- 9:5 : Why UK businesses are paying ICO millions for password mistakes you’re probably making right now
- 9:5 : How to Unlock the Full Potential of SSE with an Outcomes-Based Approach
- 9:5 : Swiss Cheese Security: How Detection Tuning Creates Vulnerabilities
- 9:5 : MajorKey IDProof+ combats AI-driven fraud
- 9:4 : Aptori Code-Q delivers verified, explainable fixes that integrate into development workflows
- 9:4 : Google Forecasts Rise of Cyber-Physical Attacks Targeting Europe in 2026
- 8:38 : Hypori Secure Workspace Ecosystem helps IT teams protect enterprise data
- 8:38 : Google uncovers PROMPFLUX, CISA warns of CentOS Web Panel bug, Threat group targets academics
- 8:6 : Phishing Campaigns “I Paid Twice” Targeting Booking.com Hotels and Customers
- 8:6 : Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users
- 8:6 : EndClient RAT Leverages Compromised Code-Signing to Slip Past Antivirus
- 8:6 : Binarly Transparency Platform 3.5 now supports Java archives and JVM bytecode
- 8:6 : Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
- 8:5 : IT Security News Hourly Summary 2025-11-06 09h : 1 posts
- 7:38 : OpenGuardrails: A new open-source model aims to make AI safer for real-world use
- 7:4 : Google Warns of PROMPTFLUX Malware That Uses Gemini API for Self-Rewriting Attacks
- 7:4 : Why API Security Will Drive AppSec in 2026 and Beyond
- 7:4 : Prismatic gives AI agents the guardrails and structure they need to operate reliably in production
- 7:4 : Bitdefender GravityZone Security Data Lake unifies telemetry from multiple tools
- 6:34 : Google Issues Emergency Chrome Update to Fix Critical RCE Flaw
- 6:34 : Hyundai AutoEver Confirms Data Breach Exposing Personal Data, Including SSNs and License Info
- 6:34 : Using FinOps to Detect AI-Created Security Risks
- 6:34 : Humans built the problem, AI just scaled it
- 6:34 : Enterprises are losing track of the devices inside their networks
- 6:6 : HackedGPT: New Vulnerabilities in GPT Models Allow Attackers to Launch 0-Click Attacks
- 6:6 : Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads
- 6:6 : APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data
- 6:6 : What shadow AI means for your company’s security
- 6:6 : SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
- 5:36 : Synthient Credential Stuffing Threat Data – 1,957,476,021 breached accounts
- 5:6 : Retailers are learning to say no to ransom demands
- 5:5 : IT Security News Hourly Summary 2025-11-06 06h : 1 posts
- 4:36 : Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution
- 2:38 : Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
- 2:38 : Cloudflare Scrubs Aisuru Botnet from Top Domains List
- 2:5 : IT Security News Hourly Summary 2025-11-06 03h : 2 posts
- 2:4 : ISC Stormcast For Thursday, November 6th, 2025 https://isc.sans.edu/podcastdetail/9688, (Thu, Nov 6th)
- 1:8 : Introducing the Overview of the AWS European Sovereign Cloud whitepaper
- 23:36 : Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach
- 23:6 : Survey: Organizations Are Too Confident in Their Cyber Resiliency
- 23:5 : IT Security News Hourly Summary 2025-11-06 00h : 2 posts
- 22:55 : IT Security News Daily Summary 2025-11-05