145 posts were published in the last hour
- 22:4 : Critical SonicOS SSLVPN Vulnerability Allows Remote Firewall Crashes
- 22:4 : CrowdStrike denies breach after insider sent internal screenshots to hackers
- 22:4 : Startup firm called Factory disrupts campaign designed to hijack development platform
- 21:38 : CISA Adds One Known Exploited Vulnerability to Catalog
- 21:38 : Phishing Breaks More Defenses Than Ever. Here’s the Fix
- 21:38 : Practical steps to minimize key exposure using AWS Security Services
- 21:4 : FCC Drops Telecom Cyber Rules Despite China Espionage Warnings
- 21:4 : NDSS 2025 – A Key-Driven Framework For Identity-Preserving Face Anonymization
- 21:4 : Randall Munroe’s XKCD ‘’Document Forgery”
- 21:4 : NDSS 2025 – THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
- 21:4 : SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
- 20:5 : IT Security News Hourly Summary 2025-11-21 21h : 6 posts
- 20:4 : WrtHug Attack Hijacks Tens of Thousands of ASUS Home Routers
- 19:31 : More on Rewiring Democracy
- 19:31 : Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers
- 19:31 : AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload
- 19:31 : AI teddy bear for kids responds with sexual content and advice about weapons
- 19:31 : ShinyHunters ‘does not like Salesforce at all,’ claims the crew accessed Gainsight 3 months ago
- 19:4 : Salesforce Confirms New Breach Linked to Gainsight Apps
- 19:4 : Amazon Issuing $2.5B in Refunds to Eligible Prime Customers to Settle FTC Suit
- 19:4 : News brief: U.S. cyberdefenses take aim at foreign threats
- 19:4 : CrowdStrike fires ‘suspicious insider’ who passed information to hackers
- 19:4 : Microsoft named a Leader in the Gartner® Magic Quadrant™ for Access Management for the ninth consecutive year
- 19:4 : Accelerate investigations with AWS Security Incident Response AI-powered capabilities
- 18:32 : Distributed Edge Inference Changes Everything
- 18:32 : Grafana SCIM Flaw Allows Admin Impersonation and Full Takeover
- 18:31 : Google says hackers stole data from 200 companies following Gainsight breach
- 18:2 : ENISA becomes CVE Program Root, strengthening Europe’s vulnerability management framework
- 18:2 : Workload And Agentic Identity at Scale: Insights From CyberArk’s Workload Identity Day Zero
- 17:34 : These ‘Gentlemen’ Aren’t Gentle: Rapidly Evolving Ransomware Threat
- 17:34 : Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message
- 17:5 : IT Security News Hourly Summary 2025-11-21 18h : 18 posts
- 17:4 : New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse
- 17:4 : How to use Netcat: Commands and use cases
- 16:31 : Wordfence Bug Bounty Program Monthly Report – October 2025
- 16:31 : Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products
- 16:31 : Inside the Industrialization of Cybercrime: What to Expect in 2026
- 16:9 : North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits
- 16:9 : Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education
- 16:9 : AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads
- 16:9 : Xillen Stealer: Advanced Features Bypass AI Detection and Steal Password Manager Data
- 16:9 : Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges
- 16:9 : Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads
- 16:9 : Fake calendar invites are spreading. Here’s how to remove them and prevent more
- 16:9 : Technical Debt vs Innovation Debt: Why Both Slow You Down, but Only One Threatens Your Future in the Age of AI
- 16:9 : Quantum Error Correction Moves From Theory to Practical Breakthroughs
- 16:9 : New Android Malware Steals Debit Card Data And PINs To Enable ATM Withdrawals
- 16:9 : Sam Altman’s Iris-Scanning Startup Reaches Only 2% of Its Goal
- 16:9 : Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
- 16:9 : Cybercriminals Exploit Browser Push Notifications to Deliver Malware
- 15:31 : How MSPs Can Cut Response Time by 60% — and Stop Losing Alerts (While Keeping Backups Safe)
- 15:31 : ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms
- 15:31 : In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
- 15:31 : The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems
- 15:2 : SolarWinds addressed three critical flaws in Serv-U
- 15:2 : Building the IoT CTF Challenge for the HoneyLab CyberQuest CTF
- 15:2 : What’s New in Cloud Monitor & Classroom Manager: Smarter Tools for K–12 Classrooms
- 15:2 : Salesforce Breach Hits Over 200 Victims
- 15:2 : Over 50000 Asus Routers Compromised
- 15:2 : SEC Ends SolarWinds Case After Years
- 15:2 : TV Piracy Service With 26M Visits Closed
- 15:2 : Crypto Mixer Founders Jailed for Laundering
- 14:32 : Heimdal 5.1.0 RC Dashboard: Smarter Automation, Stronger Compliance, and Smoother Control
- 14:32 : Four charged over alleged plot to smuggle Nvidia AI chips into China
- 14:31 : AI as Cyberattacker
- 14:31 : APT24 Uses BADAUDIO in Taiwan Spying
- 14:5 : IT Security News Hourly Summary 2025-11-21 15h : 12 posts
- 14:2 : Cyber Insurance Won’t Save You from Bad Hygiene
- 14:2 : Despite Chinese hacks, Trump’s FCC votes to scrap cybersecurity rules for phone and internet companies
- 14:2 : Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day
- 14:2 : APIs Are the Retail Engine: How to Secure Them This Black Friday
- 13:31 : Russia-linked crooks bought a bank for Christmas to launder cyber loot
- 13:31 : Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise
- 13:31 : Hyundai faces security incident with potential data exposure
- 13:31 : ClickFix: The Silent Cyber Threat Tricking Families Worldwide
- 13:31 : Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
- 13:6 : Hidden Comet Browser API Allowed Dangerous Local Command Execution
- 13:6 : Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack
- 13:6 : Scaling Cyber: meet the next cybersecurity global leaders
- 12:32 : Allies Sanction Russian Network Behind Major Cyberattacks
- 12:32 : Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges
- 12:32 : Critical Grafana Vulnerability Let Attackers Escalate Privilege
- 12:32 : Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
- 12:32 : China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users
- 12:32 : SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance
- 12:32 : Salesforce Gainsight compromise: Early findings and customer guidance
- 12:32 : APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
- 12:32 : Why IT Admins Choose Samsung for Mobile Security
- 12:6 : Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
- 11:32 : This Hacker Conference Installed a Literal Anti-Virus Monitoring System
- 11:32 : SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability
- 11:6 : Salesforce alerts users to potential data exposure via Gainsight OAuth apps
- 11:6 : Runlayer Emerges From Stealth Mode With $11 Million in Funding
- 11:5 : IT Security News Hourly Summary 2025-11-21 12h : 5 posts
- 10:31 : ToddyCat: your hidden email assistant. Part 1
- 10:31 : New Gainsight Supply Chain Hack Could Affect Salesforce Customers
- 10:6 : Use of CSS stuffing as an obfuscation technique?, (Fri, Nov 21st)
- 10:6 : Windows 11 to Hide BSOD Crash Errors on Public Displays
- 10:6 : Salesforce Instances Hacked via Gainsight Integrations
- 9:34 : ZTE Launches ZXCSec MAF security solution for large model
- 9:6 : Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware
- 9:6 : Clop Ransomware Claims Oracle Breach Using E-Business Suite 0-Day
- 9:6 : Salesforce Confirms Customer Data Was Exposed in Gainsight Breach
- 9:6 : Operation DreamJob Attacks on Manufacturing via WhatsApp Web
- 9:6 : Critical Grafana Flaw Lets Attackers Escalate Privileges
- 8:32 : New Onapsis platform updates enhance visibility and protection across SAP landscapes
- 8:32 : SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
- 8:32 : Sturnus captures encrypted chats, PowerSchool schools blamed, SEC security bill
- 8:5 : IT Security News Hourly Summary 2025-11-21 09h : 7 posts
- 8:4 : Apple Launches £220 ‘Sock’ Carrying Case For iPhone
- 7:34 : Salesforce Confirms that Customers’ Data Was Accessed Following the Gainsight Breach
- 7:34 : Authorities Sanctioned Russia-based Bulletproof Hosting Provider for Supporting Ransomware Operations
- 7:34 : OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently
- 7:34 : SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely
- 7:34 : Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk
- 7:34 : Fortinet FortiWeb Authentication Bypass and Command Injection Vulnerability (CVE-2025-64446/CVE-2025-58034) Notice
- 7:2 : Research shows identity document checks are missing key signals
- 6:38 : How one quick AI check can leak your company’s secrets
- 6:38 : What insurers really look at in your identity controls
- 6:38 : Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
- 6:4 : Major CloudFlare Outages, Black Friday Phishing Surge, AI Privacy Breach at Ontario Hospital, and Salesforce Data Theft Investigation
- 5:31 : Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach
- 5:31 : New infosec products of the week: November 21, 2025
- 5:31 : Convenience culture is breaking personal security
- 5:5 : IT Security News Hourly Summary 2025-11-21 06h : 2 posts
- 4:6 : Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
- 4:6 : Google links Android’s Quick Share to Apple’s AirDrop, without Cupertino’s help
- 3:4 : When weak passwords open the door: major breaches that began with simple logins
- 2:5 : IT Security News Hourly Summary 2025-11-21 03h : 1 posts
- 2:2 : ISC Stormcast For Friday, November 21st, 2025 https://isc.sans.edu/podcastdetail/9710, (Fri, Nov 21st)
- 1:4 : The OSINT playbook: Find your weak spots before attackers do
- 0:36 : Unified Compliance with AI: Optimizing Regulatory Demands with Internal Tools
- 0:4 : Researchers devised a new enumeration technique that exposed 3.5B WhatsApp profiles
- 0:4 : SEC drops civil fraud case against SolarWinds
- 23:34 : 4 People Indicted in Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China
- 23:34 : SEC drops SolarWinds lawsuit that painted a target on CISOs everywhere
- 23:34 : Can enterprises freely choose scalable Agentic AI solutions
- 23:34 : Can effective Secrets Security fit within a tight budget
- 23:34 : How do stable AI systems contribute to cloud security
- 23:33 : Why are experts optimistic about future AI security technology
- 23:5 : IT Security News Hourly Summary 2025-11-21 00h : 6 posts
- 23:4 : Four Indicted In Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China
- 23:4 : International Kiteboarding Organization – 340,349 breached accounts
- 23:4 : Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
- 22:55 : IT Security News Daily Summary 2025-11-20