210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-22
- 20:34 : Scammers Use Inferno Drainer to Steal $43K from CoinMarketCap Users
- 20:34 : Cloud quantum computing: A trillion-dollar opportunity with dangerous hidden risks
- 20:34 : Scattered Spider Targets Aflac, Other Insurance Companies
- 17:5 : IT Security News Hourly Summary 2025-06-22 18h : 3 posts
- 16:34 : Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION
- 16:34 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50
- 16:34 : Cloudflare Explains Major Service Outage: Not a Security Breach, No Data Lost
- 16:34 : The True Cost of Legacy Software: A Comprehensive Look
- 16:4 : Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches
- 15:10 : Why Scale Matters in Today’s Cybersecurity Landscape Futureproofing for Better Outcomes
- 15:9 : Quantum breakthrough: ‘Magic states’ now easier, faster, and way less noisy
- 14:34 : Microsoft Entra ID Faces Surge in Coordinated Credential-Based Attacks
- 13:34 : Why Network Disaster Recovery Solutions Are a Non-negotiable for Modern Businesses
- 11:7 : 16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
- 11:5 : IT Security News Hourly Summary 2025-06-22 12h : 1 posts
- 9:37 : AWS Raises Expertise Bar for MSSP Partners
- 8:40 : 16 billion passwords leaked across Apple, Google, more: What to know and how to protect yourself
- 7:6 : Week in review: Keyloggers found on Outlook login pages, police shut down dark web drug market
- 3:4 : OpenVPN Driver Vulnerability Let Attackers Crash Windows Systems
- 2:6 : Israeli Social Media Users Targeted in Covert Iranian Influence Campaign
- 2:5 : IT Security News Hourly Summary 2025-06-22 03h : 5 posts
- 1:34 : Truth Social Crashes as Trump Live-Posts Iran Bombing
- 1:34 : Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS
- 1:5 : Mattermost Vulnerabilities Let Attackers Execute Remote Code Via Path Traversal
- 1:4 : Are Your Secrets Protected Against Data Breaches?
- 1:4 : How Secure Are Your Cloud-Based Non-Human Identities?
- 1:4 : Why Being Proactive with NHIs Can Save Your Business
- 0:6 : Aflac Cyber Attack – Hackers May Have Stolen Personal And Health Information
- 23:5 : IT Security News Hourly Summary 2025-06-22 00h : 2 posts
- 23:2 : CyberWarfare on the Rise With Surge in Hacktivist Activity Following Israel-Iran
- 22:55 : IT Security News Daily Summary 2025-06-21
- 22:2 : DuckDuckGo Browser’s Scam Blocker to Guard Against Phishing and Malware Sites
- 21:2 : Open Directories Exposes Publically Available tools Used by Hackers
- 20:5 : IT Security News Hourly Summary 2025-06-21 21h : 4 posts
- 20:2 : Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
- 19:2 : Microsoft Announces New Graph Powered Detection of Hybrid Attack Targeting Organizations
- 18:34 : 2025-06-21: Koi Loader/Koi Stealer infection
- 18:8 : Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
- 18:8 : LinuxFest Northwest: The First Black Software Engineer in America: Technology and Race
- 17:5 : IT Security News Hourly Summary 2025-06-21 18h : 2 posts
- 16:34 : T-Mobile Denies Involvement After Hackers Claim Massive Customer Data Breach
- 16:2 : 2025-06-20: Malware disguised as cracked version of popular software
- 15:34 : Critical OpenVPN Driver Vulnerability Allows Attackers to Crash Windows Systems
- 15:4 : Why CISOs Need an AI-Native Strategy
- 14:32 : Iran confirmed it shut down internet to protect the country against cyberattacks
- 14:32 : Predator Spyware Campaign Resurfaces With a New Infrastructure
- 14:32 : Fake DeepSeek AI Installers Deliver BrowserVenom Malware
- 14:5 : IT Security News Hourly Summary 2025-06-21 15h : 4 posts
- 14:4 : Report Warns of Sophisticated DDoS Campaigns Crippling Global Banks
- 13:31 : The Evolving Cloud Security Landscape: Empowering Startups in a Post-Acquisition World
- 13:4 : DuckDuckGo Rolls Out New Scam Blocker to Protect Users from Online Threats
- 13:4 : Your passwords are everywhere: What the massive 16 billion login leak means for you
- 12:41 : Violence-as-a-Service: Encrypted Apps Used in Recruiting Teens as Hitmen
- 12:5 : How Smart Timesheet Software Is Changing the Way of Work
- 10:32 : ADS & Python Tools, (Sat, Jun 21st)
- 10:32 : Israel Says Iran Is Hacking Security Cameras for Spying
- 10:31 : Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages
- 10:6 : Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data
- 8:5 : IT Security News Hourly Summary 2025-06-21 09h : 3 posts
- 7:4 : Scientists create ‘universal translator’ for quantum tech
- 7:4 : AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
- 6:40 : Godfather Android trojan uses virtualization to hijack banking and crypto apps
- 5:5 : IT Security News Hourly Summary 2025-06-21 06h : 1 posts
- 5:4 : U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers
- 4:4 : Microsoft Warns of OneDrive Bug that Causes Searches to Appear Blank
- 3:4 : Microsoft Announces New Security Defaults for Windows 365 Cloud PCs
- 2:5 : IT Security News Hourly Summary 2025-06-21 03h : 1 posts
- 1:5 : The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive
- 0:33 : PCI DSS 4.0.1: What Changed and How is this the Next Step for Universal MFA
- 23:34 : Hospital cyber attacks cost $600K/hour. Here’s how AI is changing the math
- 23:5 : IT Security News Hourly Summary 2025-06-21 00h : 10 posts
- 22:55 : IT Security News Daily Summary 2025-06-20
- 22:32 : The Next Wave of Cybersecurity
- 22:2 : Anubis Ransomware Lists Disneyland Paris as New Victim
- 22:2 : Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
- 22:2 : Aflac Discloses Cybersecurity Incident, Customer Data Potentially Exposed Amid Industry-Wide Attacks
- 22:2 : LinuxFest Northwest: The Geology of Open Source
- 21:32 : Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
- 21:32 : Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider
- 21:32 : Friday Squid Blogging: Gonate Squid Video
- 21:32 : Netflix, Apple, BofA websites hijacked with fake help-desk numbers
- 21:32 : Week in Review: ClickFake deepfake scam, Krispy Kreme breach, NIST ZTA guidance
- 21:4 : Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
- 20:34 : Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
- 20:34 : Heard about the 16 billion passwords leak? Here are the facts and how to protect yourself
- 20:5 : Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
- 20:5 : Anthropic study: Leading AI models show up to 96% blackmail rate against executives
- 20:5 : IT Security News Hourly Summary 2025-06-20 21h : 4 posts
- 20:4 : News brief: LOTL attacks, spoofed sites, malicious repositories
- 19:34 : Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number
- 19:34 : What is perfect forward secrecy (PFS)?
- 19:4 : Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
- 18:36 : Threat Actors Exploit Vercel Hosting Platform to Distribute Remote Access Malware
- 18:36 : CVE-2025-49763 – Remote DoS via Memory Exhaustion in Apache Traffic Server via ESI Plugin
- 18:36 : US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
- 18:4 : TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
- 18:4 : A Token of Appreciation for Sustaining Donors 💞
- 18:4 : Protect Yourself From Meta’s Latest Attack on Privacy
- 18:4 : Qilin ransomware top dogs treat their minions to on-call lawyers for fierier negotiations
- 18:4 : Looks like Aflac is the latest insurance giant snagged in Scattered Spider’s web
- 17:32 : PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
- 17:32 : Your Kubernetes Survival Kit: Master Observability, Security, and Automation
- 17:32 : Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency
- 17:32 : A Token of Appreciation for Sustaining Donors 💞
- 17:32 : Top 7 Ambient Listening AI Tools Revolutionizing Healthcare in 2025
- 17:32 : Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
- 17:7 : New Detection Method Uses Hackers’ Own Jitter Patterns Against Them
- 17:7 : 16 billion passwords leaked from Apple, Google, more: Here are the facts and how to protect yourself
- 17:7 : Iran’s government says it shut down internet to protect against cyberattacks
- 17:6 : A Token of Appreciation for Sustaining Donors 💞
- 17:6 : Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds
- 17:5 : IT Security News Hourly Summary 2025-06-20 18h : 8 posts
- 16:32 : Norway Plans Temporary Ban On New Crypto Mining Data Centres
- 16:32 : Hackers Use Social Engineering to Target Expert on Russian Operations
- 16:32 : 16 Billion Credentials Leaked, Though Some Critics Question the Data
- 16:32 : Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT
- 16:32 : A Token of Appreciation for Sustaining Donors 💞
- 16:32 : Fake Resumes Become Weapon of Choice for FIN6 Threat Group
- 16:32 : Smartwatches: New Air-Gapped System Assault Vehicle
- 16:32 : Trend Micro Patches Critical Remote Code Execution and Authentication Bypass Flaws in Apex Central and PolicyServer
- 16:4 : I found the easiest way to delete myself from the internet (and you shouldn’t wait to use it, too)
- 16:4 : A Token of Appreciation for Sustaining Donors 💞
- 15:36 : A Token of Appreciation for Sustaining Donors 💞
- 15:7 : BBC Warns Perplexity Of Legal Action Over Content Use
- 15:7 : Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
- 15:7 : Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds
- 15:7 : A Token of Appreciation for Sustaining Donors 💞
- 15:7 : The Digital Pandemic: Inside 2024’s Most Devastating Cyber Breaches
- 14:35 : What is risk assessment?
- 14:34 : Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number
- 14:34 : A Token of Appreciation for Sustaining Donors 💞
- 14:5 : IT Security News Hourly Summary 2025-06-20 15h : 14 posts
- 14:3 : In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
- 13:32 : Massive DDoS Attack Hits 7.3 Tbps Delivering 37.4 Terabytes in 45 Seconds
- 13:32 : Third-Party Access: The Cyber Risk Manufacturers Can’t Afford to Ignore
- 13:32 : World Economic Forum Meeting on Rethinking Cyber Resilience: A Fortinet Q&A
- 13:32 : Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware
- 13:31 : A Token of Appreciation for Sustaining Donors 💞
- 13:31 : M&S and Co-op Hacks Classified as Single Cyber Event
- 13:5 : The Rising Deepfake Risk for Businesses: A Step-By-Step Defense Strategy Built Around the Basics of Security
- 13:4 : Azure Misconfiguration Lets Attackers Take Over Cloud Infrastructure
- 13:4 : How to turn off ACR on your TV (and what your TV stops tracking when you do)
- 13:4 : A Token of Appreciation for Sustaining Donors 💞
- 13:4 : Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
- 13:4 : Personal Data of Oxford City Council Officers Exposed
- 12:32 : New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack
- 12:32 : Threat Actors Leverage Hosting Platform Vercel to Deliver Remote Access Malware
- 12:32 : Insomnia API Client Vulnerability Arbitrary Code Execution via Template Injection
- 12:31 : A Token of Appreciation for Sustaining Donors 💞
- 12:31 : Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
- 12:5 : Waymo Applies For New York Testing Permit
- 12:5 : AntiDot 3-in-1 Android Botnet Malware Grants Attackers Full Control Over Victim Devices
- 12:5 : A Token of Appreciation for Sustaining Donors 💞
- 12:5 : Godfather Android Trojan Creates Sandbox on Infected Devices
- 12:4 : Microsoft boosts default security of Windows 365 Cloud PCs
- 12:4 : Meta To Introduce Full Passkey Support for Facebook on Mobiles
- 11:32 : Oxford City Council Hit by Cyberattack Exposing Employee Personal Data
- 11:31 : A Token of Appreciation for Sustaining Donors 💞
- 11:31 : Motors Theme Vulnerability Exploited to Hack WordPress Websites
- 11:6 : Resurgence of the Prometei Botnet
- 11:6 : GodFather Android Malware Uses On-Device Virtualization to Hijack Legitimate Banking Apps
- 11:6 : Versa Director Flaws Let Attackers Execute Arbitrary Commands
- 11:5 : 184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach
- 11:5 : Your Android phone is getting a big security upgrade for free – these Pixel models included
- 11:5 : Linux flaws chain allows Root access across major distributions
- 11:5 : Surveillance in the US
- 11:5 : ClamAV 1.4.3 and 1.0.9 Released With Fix for Vulnerabilities that Enable Remote Code Execution
- 11:5 : New TxTag Phishing Attack Leverages .gov Domain to Trick Employees
- 11:5 : A Token of Appreciation for Sustaining Donors 💞
- 11:5 : IT Security News Hourly Summary 2025-06-20 12h : 12 posts
- 11:5 : Attack on Oxford City Council exposes 21 years of election worker data
- 11:4 : FreeType Zero-Day Found by Meta Exploited in Paragon Spyware Attacks
- 11:4 : Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
- 11:4 : 6 Steps to 24/7 In-House SOC Success
- 10:4 : Microsoft Introduces Enhanced Security Defaults for Windows 365 Cloud PCs
- 10:4 : Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
- 10:4 : A Token of Appreciation for Sustaining Donors 💞
- 9:35 : Dover Fueling Solutions Flaw Lets Attackers Control Fueling Operations
- 9:34 : 200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
- 9:34 : PowerShell Loaders With In-Memory Execution Techniques To Evade Disk-Based Detection
- 9:34 : Hackers Exploit Atlassian’s Model Context Protocol by Submitting a Malicious Support Ticket
- 9:34 : Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack
- 9:34 : A Token of Appreciation for Sustaining Donors 💞
- 9:34 : Cloudflare Tunnels Abused in New Malware Campaign
- 9:34 : DuckDuckGo’s Scam Blocker now blocks more types of scams
- 9:34 : UK Gov Cybersecurity Jobs Average Salary is Under £45,000, Study Finds
- 8:54 : Securing Embedded IoT Devices Through Hardware-backed Root of Trust
- 8:34 : A ransomware attack pushed the German napkin firm Fasana into insolvency
- 8:34 : What’s OpenID Connect (OIDC) and Why Should You Care?
- 8:34 : Is Your CISO Ready to Flee?
- 8:34 : 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
- 8:7 : Apache SeaTunnel Flaw Lets Unauthorized Users Launch Deserialization Attacks
- 8:7 : IBM QRadar SIEM Bug Lets Attackers Run Arbitrary Commands
- 8:7 : 16 Billion Passwords Stolen From 320 Million+ Computers Leaked Online
- 8:7 : AntiDot – 3-in-1 Android Malware Let Attackers Full Control of Compromised Devices
- 8:7 : Massive 16 Billion Passwords From Apple, Facebook, Google and More Leaked From 320 Million Computers
- 8:6 : A Token of Appreciation for Sustaining Donors 💞
- 8:6 : 161,000 People Impacted by Krispy Kreme Data Breach
- 8:6 : Amazon Linux 2023 achieves FIPS 140-3 validation
- 8:6 : Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
- 8:5 : IT Security News Hourly Summary 2025-06-20 09h : 8 posts
- 7:32 : What can I do with a VPN?
- 7:32 : A Token of Appreciation for Sustaining Donors 💞
- 7:31 : Cisco, Atlassian fixes, Ryuk member arrested, Viasat Typhoon attack
- 7:6 : IBM QRadar SIEM Vulnerabilities Allows Attackers to Execute Arbitrary Commands
- 7:6 : A Token of Appreciation for Sustaining Donors 💞
- 7:6 : Hackers Access Legacy Systems in Oxford City Council Cyberattack
- 6:32 : A Token of Appreciation for Sustaining Donors 💞
- 6:32 : Is Cold Email Still Effective in 2025? Best Practices for Outreach and Security