210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-05-18
- 20:5 : IT Security News Hourly Summary 2025-05-18 21h : 2 posts
- 19:7 : Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
- 18:32 : BSidesLV24 – GroundFloor – Discover The Hidden Vulnerability Intelligence Within CISA’s KEV Catalog
- 18:12 : Russia-Linked SpyPress Malware Exploits Webmails to Spy on Ukraine
- 17:5 : FBI Warns of AI Voice Scams Impersonating US Govt Officials
- 14:35 : Google to Pay Texas $1.4 Billion For Collecting Personal Data
- 14:35 : Child Abuse Detection Efforts Face Setbacks Due to End-to-End Encryption
- 14:35 : India Faces Cyber Onslaught After Operation Sindoor Military Strikes
- 14:5 : IT Security News Hourly Summary 2025-05-18 15h : 1 posts
- 13:9 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45
- 12:33 : Fairfax County, Va., CISO Michael Dent on Leadership
- 12:4 : Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION
- 11:32 : How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
- 10:7 : Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide
- 8:5 : Week in review: Microsoft patches 5 actively exploited 0-days, recently fixed Chrome vulnerability exploited
- 8:5 : IT Security News Hourly Summary 2025-05-18 09h : 1 posts
- 6:32 : PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files
- 1:31 : This Free Tool Helps You Find Out if Your Personal Information Is Exposed Online
- 23:5 : IT Security News Hourly Summary 2025-05-18 00h : 3 posts
- 23:3 : Ensuring Satisfaction in Managing Non-Human Identities
- 23:3 : Are You Capable of Securing Your Digital Assets?
- 22:55 : IT Security News Daily Summary 2025-05-17
- 22:2 : Malware Defense 101 – Identifying and Removing Modern Threats
- 21:8 : OAuth 2.0 Overview
- 20:7 : AI Security Frameworks – Ensuring Trust in Machine Learning
- 20:5 : IT Security News Hourly Summary 2025-05-17 21h : 1 posts
- 19:4 : The Coinbase Data Breach: A Breakdown of What Went Wrong
- 17:31 : Preventing Phishing Attacks on Cryptocurrency Exchanges
- 17:6 : US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials
- 17:6 : Compromised npm Package ‘rand-user-agent’ Used to Spread Remote Access Trojan
- 17:5 : IT Security News Hourly Summary 2025-05-17 18h : 4 posts
- 16:2 : Boffins devise technique that lets users prove location without giving it away
- 16:2 : FBI Warns Consumers to Replace Outdated Routers Hijacked by TheMoon Malware
- 16:2 : LockBit Ransomware Platform Breached Again, Ops Data Leaked
- 15:31 : BSidesLV24 – GroundFloor – Adversaries Also Lift & Shift: Cloud Threats Through The Eyes Of An Adversary
- 15:4 : Adversarial Machine Learning – Securing AI Models
- 14:31 : Coinbase Data Breach: Customer Data Compromised Through Insider Threat
- 14:5 : IT Security News Hourly Summary 2025-05-17 15h : 3 posts
- 14:2 : Shields up US retailers. Scattered Spider threat actors can target them
- 14:2 : Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack
- 14:2 : 10 Best NGINX Monitoring Tools – 2025
- 12:31 : New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads
- 12:31 : Blockchain Security – Protecting Decentralized Systems
- 12:31 : Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication
- 12:2 : VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2
- 12:2 : Critical Intel CPU Vulnerabilities Uncovered: Memory Leaks and Spectre v2 Exploitation
- 11:32 : AI-Powered Cyber Threats – Building Resilient Defenses
- 11:31 : Guide to Cloud API Security – Preventing Token Abuse
- 11:31 : Printer Company Offered Malicious Drivers Infected With XRed Malware
- 11:5 : IT Security News Hourly Summary 2025-05-17 12h : 2 posts
- 11:2 : Coinbase Will Reimburse Customers Up to $400 Million After Data Breach
- 10:4 : New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials
- 9:31 : xorsearch.py: Python Functions, (Sat, May 17th)
- 9:2 : U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog
- 8:31 : Cloud Security Essentials – Protecting Multi-Cloud Environments
- 8:31 : Google Now Scans Screenshots to Identify Geographic Locations
- 8:2 : Beware! A threat actor could steal the titles of your private (and draft) WordPress posts!
- 7:6 : The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
- 6:4 : Securing Generative AI – Mitigating Data Leakage Risks
- 5:31 : Beyond the hype: The hidden security risks of AI agents and MCP
- 5:5 : IT Security News Hourly Summary 2025-05-17 06h : 2 posts
- 3:37 : APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads
- 3:37 : VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited – Pwn2Own Day 2
- 2:31 : Why Microsoft Says DeepSeek Is Too Dangerous to Use
- 2:5 : IT Security News Hourly Summary 2025-05-17 03h : 1 posts
- 0:31 : Security Theater REALized and Flying without REAL ID
- 0:4 : Fired US govt workers, Uncle Xi wants you! – to apply for this fake consulting gig
- 23:31 : Standing Up for LGBTQ+ Digital Safety this International Day Against Homophobia
- 23:6 : HubSpot vs Salesforce: Which CRM Fits Your Business?
- 23:6 : America’s consumer watchdog drops leash on proposed data broker crackdown
- 23:6 : Coinbase Hacked and Turns the Tables on the Cybercriminals!
- 23:5 : IT Security News Hourly Summary 2025-05-17 00h : 6 posts
- 22:55 : IT Security News Daily Summary 2025-05-16
- 22:31 : UK Supermarket Avoided Ransomware Because ‘They Yanked Their Own Plug,’ Hackers Say
- 22:4 : Endpoint Security Controls: Designing a Secure Endpoint Architecture, Part 2
- 22:4 : News brief: Patch critical SAP, Samsung and chat app flaws now
- 21:33 : Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
- 21:5 : Shrink exploit windows, slash MTTP: Why ring deployment is now a must for enterprise defense
- 21:5 : Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi
- 21:5 : House Moves Forward With Dangerous Proposal Targeting Nonprofits
- 20:32 : US man who hacked SEC’s X account to spike Bitcoin price sentenced to prison
- 20:5 : IT Security News Hourly Summary 2025-05-16 21h : 4 posts
- 20:2 : New botnet HTTPBot targets gaming and tech industries with surgical attacks
- 19:32 : Pwn2Own Berlin 2025: Windows 11, VMware, Firefox and Others Hacked
- 19:32 : Secure by Design: Modernizing Authentication With Centralized Access and Adaptive Signals
- 19:4 : AWS Boss Calls For UK To Increase Nuclear Power – Report
- 18:32 : Trump Has A “Little Problem” With Apple’s Tim Cook
- 18:31 : Hands-on Malware Analysis Training to Boost Up SOC & MSSP Teams
- 18:31 : Orca Security Acquires Opus to Gain AI Agent Orchestration Technology
- 17:32 : Threat Group Assessment: Muddled Libra (Updated May 16, 2025)
- 17:31 : Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
- 17:31 : Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
- 17:5 : IT Security News Hourly Summary 2025-05-16 18h : 9 posts
- 17:2 : Ivanti EPMM Hit by Two Actively Exploited 0day Vulnerabilities
- 17:2 : Chinese Agent Impersonate as Stanford Student For Intelligence Gathering
- 17:2 : Printer Company Distributes Malicious Drivers Infected with XRed Malware
- 17:2 : New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
- 17:2 : Details of 1.1 Million Job Applicants Leaked by a Major Recruitment Platform
- 16:32 : The best Bluetooth trackers of 2025: Expert tested
- 16:4 : Ransomware attacks on education sector go unreported for months
- 16:4 : Pro-Ukraine Group Targets Russian Developers with Python Backdoor
- 16:4 : Linux Kernel Patching and Preventing Exploits in 2025
- 16:4 : SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
- 15:32 : Defamation case against DEF CON terminated with prejudice
- 15:32 : Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout
- 15:32 : Ransomware Roundup – VanHelsing
- 15:32 : Coordinated Action Targets DDoS-for-Hire Empire with Arrests and Seizures
- 15:31 : Agentic AI Is Reshaping Cybersecurity Careers, Not Replacing Them
- 15:4 : FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign
- 15:4 : Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia
- 15:4 : Chinese Agent Impersonates as Stanford Student For Intelligence Gathering
- 15:4 : New Vulnerability Affects All Intel Processors From The Last 6 Years
- 15:4 : Google Warns UK Retailer Hackers Now Targeting US
- 14:31 : RSAC Conference 2025
- 14:31 : In Other News: Hackers Not Behind Blackout, CISO Docuseries, Dior Data Breach
- 14:5 : Amazon Axes Jobs At Devices, Services Group – Again
- 14:5 : Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
- 14:5 : Communications Backdoor in Chinese Power Inverters
- 14:5 : IT Security News Hourly Summary 2025-05-16 15h : 11 posts
- 14:4 : Hackers Actively Exploiting PowerShell to Evade Antivirus & EDR
- 14:4 : Hackers Attacking Industrial Automation Systems With 11,600+ Malware Families
- 14:4 : Windows 10 KB5058379 Update Boots PCs into Windows Recovery
- 14:4 : Windows Security Updates – How to Stay Ahead of Vulnerabilities
- 14:4 : Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution
- 14:4 : Broadcom employee data stolen by ransomware crooks following hit on payroll provider
- 13:31 : Smart Networks, Smarter Threats: Securing Telecoms in the Age of AI and Critical Infrastructure
- 13:4 : Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
- 13:4 : Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
- 13:4 : Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
- 12:32 : Operation RoundPress
- 12:31 : Sednit abuses XSS flaws to hit gov’t entities, defense companies
- 12:31 : Is it Illegal to Listen to a Podcast or Watch a Movie Online?
- 12:7 : Cybersecurity for Mergers and Acquisitions – A CISO’s Guide
- 12:7 : Meta sent cease and desist letter over AI training
- 12:6 : Data broker protection rule quietly withdrawn by CFPB
- 12:6 : New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
- 12:6 : US Officials Impersonated Via SMS and Voice Deepfakes
- 11:32 : APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
- 11:32 : Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
- 11:31 : FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
- 11:31 : Good luck to Atos’ 7th CEO and its latest biz transformation
- 11:7 : Hackers Now Targeting US Retailers After UK Attacks, Google
- 11:7 : Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
- 11:7 : SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
- 11:7 : Meta plans to train AI on EU user data from May 27 without consent
- 11:7 : From 60 to 4,000: NATO’s Locked Shields Reflects Cyber Defense Growth
- 11:7 : Cranium introduces AI red teaming platform
- 11:6 : CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- 11:6 : Top 10 Best Practices for Effective Data Protection
- 11:6 : UK Cyber Vacancies Growing 12% Per Year
- 11:5 : IT Security News Hourly Summary 2025-05-16 12h : 12 posts
- 10:32 : Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
- 10:32 : Salt Security Partners With Wiz, Combines Cloud and API Security
- 10:32 : Mitigating macOS Zero-Day Risks – Tools and Techniques
- 10:31 : Russian APT Exploiting Mail Servers Against Government, Defense Organizations
- 10:31 : Russian Espionage Operation Targets Organizations Linked to Ukraine War
- 10:4 : FBI Warns of Deepfake Messages Impersonating Senior Officials
- 9:31 : I tested a TCL smart lock, and its palm vein recognition feature blew me away
- 9:31 : Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
- 9:31 : Healthcare Cyber-Attacks Intensify, Sector Now Prime Target
- 9:8 : Video Test
- 9:7 : Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants
- 9:7 : SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access
- 9:7 : Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked
- 9:7 : From hype to harm: 78% of CISOs see AI attacks already
- 9:7 : AI in the Cloud: The Rising Tide of Security and Privacy Risks
- 9:6 : IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience
- 9:6 : Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
- 8:31 : Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
- 8:5 : IT Security News Hourly Summary 2025-05-16 09h : 9 posts
- 8:2 : Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware
- 8:2 : Google fixed a Chrome vulnerability that could lead to full account takeover
- 8:2 : Commit Stomping – An Offensive Technique Let Hackers Manipulate Timestamps in Git to Alter File Metadata
- 8:2 : Jenkins Security Update Released With the Fixes for the Vulnerabilities that Exploit CI/CD Pipelines
- 8:2 : Securing Linux Containers – A Guide for Cloud-Native Environments
- 7:33 : Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance
- 7:32 : Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025
- 7:32 : Securing ICAM in spacecraft-based missions
- 7:32 : Are You Using the Right SSPM Software? | Grip Security
- 7:31 : [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
- 7:31 : Coinbase hackers bribe staff, Windows 11 hacked at Pwn2Own, Telegram purges black market group
- 7:2 : Dior likely hit by ransomware attack
- 7:2 : Tor Oniux Tool Offers Anonymous Linux App Traffic
- 7:2 : Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
- 7:2 : Printer company provided infected software downloads for half a year
- 7:2 : Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down
- 6:32 : SonicWall SMA1000 Vulnerability Let Attackers to Exploit Encoded URLs To Gain Internal Systems Access Remotely
- 6:32 : Windows Defender Best Practices – Optimizing Endpoint Protection
- 6:32 : Researchers Emulated VanHelsing Ransomware Advanced Tactics & Tools Used
- 6:32 : Deepfake attacks could cost you more than money
- 6:2 : DoorDash scam used fake drivers, phantom deliveries to bilk $2.59M
- 6:2 : Scammers are deepfaking voices of senior US government officials, warns FBI
- 5:32 : Proofpoint To Acquire Microsoft 365 Security Provider Hornetsecurity For $1 Billion
- 5:32 : Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked – Pwn2Own Day 1
- 5:32 : Google to Release Android 16 with Advanced Device-level Security Setting Protection for 3 Billion Devices
- 5:31 : Polymorphic phishing attacks flood inboxes
- 5:6 : The U.S. Copyright Office’s Draft Report on AI Training Errs on Fair Use
- 5:6 : How working in a stressful environment affects cybersecurity
- 5:6 : Cybersecurity Skills Framework connects the dots between IT job roles and the practical skills needed
- 5:5 : IT Security News Hourly Summary 2025-05-16 06h : 1 posts
- 4:31 : CISA Warns of Google Chromium 0-Day Vulnerability Actively Exploited in the Wild – Patch Now!
- 4:25 : O que é um ataque cibernético? Tipos e prevenção
- 4:25 : New infosec products of the week: May 16, 2025
- 3:12 : AI Governance Is Your Competitive Edge If You Treat It That Way
- 2:2 : ISC Stormcast For Friday, May 16th, 2025 https://isc.sans.edu/podcastdetail/9454, (Fri, May 16th)
- 23:6 : Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List
- 23:5 : IT Security News Hourly Summary 2025-05-16 00h : 6 posts
- 22:55 : IT Security News Daily Summary 2025-05-15
- 22:32 : Is Your Cloud Truly Safe from Invisible Threats?