210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-06-29
- 20:5 : IT Security News Hourly Summary 2025-06-29 21h : 3 posts
- 18:35 : Identity theft hits 1.1M reports — and authentication fatigue is only getting worse
- 18:35 : The Ahold Delhaize USA Breach: How a Single Click Can Cost Millions
- 18:8 : North Korean Hackers Target Crypto Professionals With Info-Stealing Malware
- 17:33 : Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION
- 17:33 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51
- 17:33 : LinuxFest Northwest: Lightning Talks
- 17:5 : IT Security News Hourly Summary 2025-06-29 18h : 2 posts
- 16:6 : Malicious Copycat Repositories Emerge in Large Numbers on GitHub
- 16:6 : Lazarus Group Suspected in $11M Crypto Heist Targeting Taiwan’s BitoPro Exchange
- 16:5 : U.S. Senators Propose New Task Force to Tackle AI-Based Financial Scams
- 15:5 : This month in security with Tony Anscombe – June 2025 edition
- 15:5 : NIST’s CURBy Uses Quantum to Verify Randomness of Numbers
- 14:38 : How Passkeys Work (Explained Simply)
- 8:7 : Week in review: Backdoor found in SOHO devices running Linux, high-risk WinRAR RCE flaw patched
- 5:5 : Is Investing in NHI Security Justified?
- 5:5 : Stay Ahead: Upgrading Your NHI Strategy for Cloud Security
- 5:5 : Smart Secrets Management: A Must for Modern Enterprises
- 23:5 : IT Security News Hourly Summary 2025-06-29 00h : 1 posts
- 23:3 : Threat Actors Transform GIFTEDCROOK Stealer into an Intelligence-Gathering Tool
- 22:55 : IT Security News Daily Summary 2025-06-28
- 20:32 : The FBI warns that Scattered Spider is now targeting the airline sector
- 16:35 : The Rise in IT Helpdesk Scams: What Can Users Do?
- 16:5 : LinuxFest Northwest: stillOS Launch Event
- 16:5 : WhatsApp Ads Delayed in EU as Meta Faces Privacy Concerns
- 16:5 : Krispy Kreme Confirms Cyberattack Affected Over 160,000 People
- 15:4 : LapDogs: China-nexus hackers Hijack 1,000+ SOHO devices for espionage
- 15:4 : Ex-NATO hacker: ‘In the cyber world, there’s no such thing as a ceasefire’
- 15:3 : ‘IntelBroker’ Hacker Arrested for Wave of High-Profile Data Breaches
- 14:5 : DanaBot Malware Enables Data Breaches and Russian Espionage
- 14:5 : IT Security News Hourly Summary 2025-06-28 15h : 4 posts
- 13:37 : FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector
- 13:4 : ESET Warns Cybercriminals Are Targeting NFC Data for Contactless Payments
- 12:10 : Qilin Ransomware Attack on NHS Causes Patient Death in the UK
- 12:9 : Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deploy Web Shells
- 12:9 : Best Application Security Testing Tools: Top 10 Tools in 2025
- 11:36 : FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering
- 11:5 : ICE Rolls Facial Recognition Tools Out to Officers’ Phones
- 11:5 : IT Security News Hourly Summary 2025-06-28 12h : 1 posts
- 10:9 : Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware
- 9:33 : How Betting Sites Keep Your Information Safe (Without You Even Noticing)
- 9:2 : Weaponized DeepSeek Installers Deploy Sainbox RAT and Hidden Rootkit
- 8:34 : Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos
- 8:34 : GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool
- 8:8 : Cybercriminals Exploit CapCut Popularity to Steal Apple ID Credentials and Credit Card Data
- 8:8 : Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
- 7:33 : Malicious Passlib Python Package Triggers Windows Shutdowns with Invalid Inputs
- 5:35 : UBS Acknowledges Employee Data Leak Following Third-Party Cyberattack
- 5:34 : Bridging the Gap: AI and Cybersecurity in the Enterprise
- 5:5 : IT Security News Hourly Summary 2025-06-28 06h : 1 posts
- 4:7 : Scattered Spider Hackers Actively Attacking Aviation and Transportation Firms
- 3:34 : Are You Satisfied with Your Current Secrets Security?
- 2:5 : IT Security News Hourly Summary 2025-06-28 03h : 1 posts
- 0:6 : End of an Era: Microsoft Replaces Its Iconic Blue Screen of Death
- 23:37 : STRATEGIC REEL: APIs are the new perimeter — and business logic attacks are slipping through
- 23:37 : Fostering Independence with Effective Non-Human Identity Management
- 23:37 : Feel Relieved with State-of-the-Art Secrets Rotation
- 23:36 : Can Your NHI Management Handle Evolving Security Needs?
- 23:5 : Crims are posing as insurance companies to steal health records and payment info
- 23:5 : IT Security News Hourly Summary 2025-06-28 00h : 5 posts
- 22:55 : IT Security News Daily Summary 2025-06-27
- 22:2 : Why Trend Micro Continues to be Named a CNAPP Leader
- 22:2 : British Hacker ‘IntelBroker’ Charged in $25M Cybercrime Case, US Seeks Extradition
- 21:38 : Friday Squid Blogging: What to Do When You Find a Squid “Egg Mop”
- 21:5 : The Untold Costs of Automation: Are We Sacrificing Security for Speed?
- 21:4 : Week in Review: Qilin adds lawyers, Iranian spearphishing campaign, Microsoft Direct Send hack
- 20:35 : Threat Actors Use Clickfix Tactics to Deploy Malicious AppleScripts for Stealing Login Credentials
- 20:35 : Cloudflare blocks largest DDoS attack – here’s how to protect yourself
- 20:35 : Prolific cybercrime gang now targeting airlines and the transportation sector
- 20:34 : Taking over millions of developers exploiting an Open VSX Registry flaw
- 20:34 : Red Hat Advanced Cluster Security 4.8 simplifies management, enhances workflows and offers deeper external IP visibility
- 20:34 : Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
- 20:5 : IT Security News Hourly Summary 2025-06-27 21h : 4 posts
- 20:3 : How runtime attacks turn profitable AI into budget black holes
- 20:3 : ESET Threat Report H1 2025
- 20:3 : 25 Best Managed Security Service Providers (MSSP) in 2025
- 19:39 : Exploitation of Microsoft 365 Direct Send to Deliver Phishing Emails as Internal Users
- 19:39 : Threat Actors Leverage Windows Task Scheduler to Embed Malware and Maintain Persistence
- 19:39 : What is phishing? Understanding enterprise phishing threats
- 19:38 : Can AI run a physical shop? Anthropic’s Claude tried and the results were gloriously, hilariously bad
- 19:38 : AI-fueled fake IDs and identity theft: What you need to know
- 19:38 : Troubleshooting SCIM Provisioning Issues: Your Complete Debug Guide
- 18:34 : Anthropic has a plan to combat AI-triggered job losses predicted by its CEO
- 18:34 : From Packets to Protection: How Network Observability Powers Security and Forensics
- 18:7 : How Anthropic’s new initiative will prepare for AI’s looming economic impact
- 18:7 : The Early Stage Growth Trap: How Smart Startups Escape the Marketing Catch-22
- 17:34 : How to build a cybersecurity RFP
- 17:34 : How to turn on Android’s Private DNS mode – and why turning it off is a big mistake
- 17:34 : How to turn off ACR on your TV (and why it make such a big difference)
- 17:34 : Cisco punts network-security integration as key for agentic AI
- 17:5 : IT Security News Hourly Summary 2025-06-27 18h : 13 posts
- 17:2 : Aloha, you might’ve been pwned: Hawaiian Airlines discloses ‘cybersecurity event’
- 16:36 : New Stealthy Remcos Malware Campaigns Target Businesses and Schools
- 16:36 : SBOM formats explained: Guide for enterprises
- 16:35 : 12 DevSecOps tools to secure each step of the SDLC
- 16:35 : Beware of Trending TikTok Videos That Promotes Pirated Apps Deliver Stealer Malware
- 16:35 : Threat Actors Behind GIFTEDCROOK Stealer Coverted It To an Intelligence-Gathering Tool
- 16:35 : Threat Actors Exploiting Windows & Linux Servers Vulnerability to Deploy Web Shell
- 16:35 : ESET Warns of NFC Data for Contactless Payments Emerges as Cybercrime Target
- 16:35 : Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black
- 16:35 : Keylogger Injection Targets Microsoft Exchange Servers
- 16:35 : Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
- 16:2 : DeepSeek Faces App Store Ban In Germany, After Data Transfer Criticism
- 16:2 : US Supreme Court Upholds Texas Porn ID Law
- 16:2 : Fake DocuSign email hides tricky phishing attempt
- 15:38 : Fortinet Training Institute Wins Industry Accolades
- 15:38 : So you CAN turn an entire car into a video game controller
- 15:6 : Is classic Outlook crashing when you open or start an email? There’s now a fix for that
- 15:6 : Defining Cyber Resilience: Industry Leaders Meet in London as AI Threats Accelerate
- 15:6 : Microsoft Teams to Set Employee’s Work Locations Based on Organization’s Wi-Fi Network
- 15:6 : Weaponized DeepSeek Installers Delivers Sainbox RAT and Hidden Rootkit
- 15:6 : In Other News: Norway Dam Hacked, $177M Data Breach Settlement, UNFI Attack Update
- 15:5 : When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides SATX 2025
- 15:5 : Unwanted Emails Are Annoying But Unsubscribing Can Be Riskier
- 15:5 : Meta.ai Privacy Lapse Exposes User Chats in Public Feed
- 14:6 : Microsoft To Replace ‘Blue Screen Of Death’ With Refreshed Restart Screen
- 14:6 : Data spill in aisle 5: Grocery giant Ahold Delhaize says 2.2M affected after cyberattack
- 14:6 : PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
- 14:5 : IT Security News Hourly Summary 2025-06-27 15h : 7 posts
- 13:34 : Microsoft Sued By Authors In Latest AI Copyright Lawsuit
- 13:34 : World SMB Day: Eight Network Tech Essentials Every Small Business Needs
- 13:34 : OneClik APT campaign targets energy sector with stealthy backdoors
- 13:33 : CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php
- 13:33 : KC Man Hacked Computers to Pitch For Cybersecurity Services Pleaded Guilty
- 13:33 : Let’s Encrypt to Issue Certificate for IP Address With 6-Day Validity
- 13:33 : Cybercriminals Leveraging CapCut Popularity to Harvest Apple ID Credentials & Credit Card Data
- 12:34 : Let’s Encrypt Launches 6-Day Certificates for IP-Based SSL Encryption
- 12:34 : Leeds United And Reflectiz Partner To Share Insights On Proactive Web Security After Cyber Attack
- 12:34 : Microsoft Teams to Auto-Detect Work Location Using Company Wi-Fi
- 12:34 : SparkKitty Spyware Targets iOS and Android Through Fake Apps and Crypto Scams
- 12:33 : Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage
- 12:33 : Hawaiian Airlines Hit by Cybersecurity Incident
- 12:5 : Hawaiian Airlines Targeted in Cyberattack, Systems Compromised
- 11:38 : Hunt Electronic DVR Vulnerability Leaves Admin Credentials Unprotected
- 11:38 : How to Protect Your Drupal Site From Cyberattacks
- 11:38 : The Age of Integrity
- 11:38 : Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit
- 11:38 : Business Case for Agentic AI SOC Analysts
- 11:8 : Researchers Warn Free VPNs Could Leak US Data to China
- 11:8 : Threat Actors Employ Clickfix Tactics to Deliver Malicious AppleScripts That Steal Login Credentials
- 11:8 : MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition
- 11:5 : IT Security News Hourly Summary 2025-06-27 12h : 3 posts
- 10:32 : RevEng.ai Raises $4.15 Million to Secure Software Supply Chain
- 10:8 : ClickFix Attacks Soar by 500%: Hackers Intensify Use of This Manipulative Technique to Deceive Users
- 10:8 : Windows 11 Retires Blue Screen of Death Error Replaces With Black Screen
- 10:8 : Threat Actors Embed Malware on Windows System’s Task Scheduler to Maintain Persistence
- 10:7 : Chinese Hackers Target Chinese Users With RAT, Rootkit
- 9:42 : APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems
- 9:42 : Evidence Suggests Exploitation of CitrixBleed 2 Vulnerability
- 9:41 : CitrixBleed 2 Vulnerability Exploited, Recalling Earlier CitrixBleed Fallout
- 9:3 : Your Android phone is getting a big security upgrade for free – here’s what’s new
- 8:38 : APT42 impersonates cyber professionals to phish Israeli academics and journalists
- 8:38 : Vulnerability Exposed All Open VSX Repositories to Takeover
- 8:38 : MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
- 8:7 : Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems
- 8:7 : Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen
- 8:7 : Microsoft 365 Direct Send Abused for Phishing
- 8:7 : Abstract Security Adds Data Lake to Reduce Storage Costs
- 8:7 : MOVEit Transfer Systems Face Fresh Attack Risk Following Scanning Activity Surge
- 8:5 : IT Security News Hourly Summary 2025-06-27 09h : 1 posts
- 7:37 : ClickFix Attack Emerges by Over 500% – Hackers Actively Using This Technique to Trick Users
- 7:37 : OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
- 7:37 : Iranian-backed spearphishing campaign, Microsoft Outlook fix, Glasgow suffers cyberattack
- 7:37 : Max Severity Flaws, Massive Exploits, and AI Security: A Cybersecurity Briefing
- 7:10 : University Student Charged for Alleged Hacking and Data Theft
- 7:10 : Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
- 7:10 : APT-C-36 Hackers Attacking Government Institutions, Financial Organizations, and Critical Infrastructure
- 7:10 : Money mule networks evolve into hierarchical, business-like criminal enterprises
- 6:5 : Managing through chaos to secure networks
- 5:37 : 2025-06-26: Lumma Stealer infection with follow-up malware
- 5:37 : Critical Vulnerability in VSCode Marketplace Forks Exposed: Millions of Developers at Risk
- 5:8 : Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services
- 5:8 : Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks
- 5:7 : Best SAST Solutions: How to Choose Between the Top 11 Tools in 2025
- 5:7 : After a hack many firms still say nothing, and that’s a problem
- 5:5 : IT Security News Hourly Summary 2025-06-27 06h : 2 posts
- 4:35 : We know GenAI is risky, so why aren’t we fixing its flaws?
- 4:4 : Infosec products of the month: June 2025
- 3:34 : Mitsubishi Electric AC Systems Vulnerability Allows Remote Control Without User Interaction
- 2:5 : IT Security News Hourly Summary 2025-06-27 03h : 2 posts
- 2:4 : ISC Stormcast For Friday, June 27th, 2025 https://isc.sans.edu/podcastdetail/9508, (Fri, Jun 27th)
- 1:4 : AI vs. AI: How Deepfake Attacks Are Changing Authentication Forever
- 0:34 : AI Bug Hunter Sets Milestone By Claiming Top Spot on HackerOne’s Leaderboard
- 0:2 : How an Email, Crypto Wallet and YouTube Activity Led the FBI to IntelBroker
- 23:5 : IT Security News Hourly Summary 2025-06-27 00h : 4 posts
- 22:55 : IT Security News Daily Summary 2025-06-26
- 22:2 : Program Execution, follow-up pt II
- 21:5 : Threat Brief: Escalation of Cyber Risk Related to Iran (Updated June 26)
- 21:5 : AI Doing 30-50 Percent Of Work At Salesforce, Says Marc Benioff
- 21:4 : LinuxFest Northwest: CentOS Mythbusters
- 20:5 : Microsoft Offers Update Lifeline For Windows 10 Users
- 20:5 : 12 smart contract vulnerabilities and how to mitigate them
- 20:5 : IT Security News Hourly Summary 2025-06-26 21h : 6 posts
- 20:5 : Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages
- 20:4 : FBI used bitcoin wallet records to peg notorious IntelBroker as UK national
- 19:7 : IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution
- 19:7 : Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
- 19:7 : What is cyber resilience?
- 19:7 : Global Reach — The New Scale of Chinese Cyberthreats
- 19:7 : New DDoS Attack Record – The MSP Cyber News Snapshot – June 26th
- 19:6 : What if Microsoft just turned you off? Security pro counts the cost of dependency
- 18:32 : nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications
- 18:32 : Randall Munroe’s XKCD ‘Interoperability’
- 18:32 : Who is Hero?
- 18:32 : Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
- 18:5 : Getting a career in cybersecurity isn’t easy, but this can help
- 18:5 : Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack
- 17:37 : Tesla European Sales Slump Extends To Five Months
- 17:37 : Cisco fixes two critical make-me-root bugs on Identity Services Engine components