210 posts were published in the last hour
- 22:55 : IT Security News Daily Summary 2025-11-23
- 18:6 : Iberia discloses security incident tied to supplier breach
- 17:5 : IT Security News Hourly Summary 2025-11-23 18h : 2 posts
- 17:4 : NDSS 2025 – GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization
- 16:34 : Governments sanction Russian “bulletproof” host for aiding ransomware networks
- 16:4 : Tycoon2FA Launches Nearly 1 Million Attacks Targeting Office 365 Accounts
- 15:36 : Samsung Zero-Day Exploit “Landfall” Targeted Galaxy Devices Before April Patch
- 14:36 : Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges
- 14:36 : Cybersecurity News Weekly Newsletter – Fortinet, Chrome 0-Day Flaws, Cloudflare Outage and Salesforce Gainsight Breach
- 14:36 : Knownsec Breach Exposes Chinese State Cyber Weapons and Global Target List
- 14:6 : Security Affairs newsletter Round 551 by Pierluigi Paganini – INTERNATIONAL EDITION
- 14:6 : SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 72
- 13:2 : Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update
- 13:2 : Mass Router Hijack Targets End-of-Life ASUS Devices
- 12:6 : SonicWall flags SSLVPN flaw allowing firewall crashes
- 11:8 : Wireshark 4.4.1 Released, (Sun, Nov 23rd)
- 11:8 : YARA-X 1.10.0 Release: Fix Warnings, (Sun, Nov 23rd)
- 11:8 : When AI Goes Rogue, Science Fiction Meets Reality
- 9:34 : Week in review: Stealth-patched FortiWeb vulnerability under active exploitation, Logitech data breach
- 8:5 : IT Security News Hourly Summary 2025-11-23 09h : 2 posts
- 7:31 : CodeStepByStep – 17,351 breached accounts
- 7:31 : Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features
- 4:4 : U.S., International Partners Target Bulletproof Hosting Services
- 3:4 : ADDA – 1,829,314 breached accounts
- 23:5 : IT Security News Hourly Summary 2025-11-23 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-11-22
- 18:2 : BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
- 18:2 : Salesforce: Some Customer Data Accessed via Gainsight Breach
- 17:5 : IT Security News Hourly Summary 2025-11-22 18h : 8 posts
- 17:2 : Quantum Computing Moves Closer to Real-World Use as Researchers Push Past Major Technical Limits
- 17:2 : China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
- 16:34 : CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters
- 16:34 : How to Block Ads Across Your Entire Home Network and Reduce Online Threats
- 16:9 : Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities
- 16:9 : CrowdStrike Fires Employee for Leaking Internal System Info to Hackers
- 16:9 : Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies
- 16:9 : CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw
- 15:32 : GlobalLogic Moves to Protect Workforce After Oracle-related Data Theft
- 15:3 : DanaBot Malware Resurfaces With New Variant After Operation Endgame Disruption
- 15:3 : GlobalLogic Moves to Protect Workforce After Oracle-Related Data Theft
- 14:7 : 65% of Top AI Companies Leak Secrets on GitHub
- 13:4 : The Security Landscape of Mobile Apps in Africa
- 12:9 : US Border Patrol Is Spying on Millions of American Drivers
- 12:9 : U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
- 11:6 : ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach
- 8:5 : IT Security News Hourly Summary 2025-11-22 09h : 2 posts
- 8:2 : CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
- 8:2 : Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
- 7:4 : Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination
- 7:4 : Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities
- 6:36 : MY TAKE: Carol Sturka declares ‘I have agency!’ — Big Tech’s AI models now testing that claim
- 6:4 : Understanding Cybersecurity Threats: Insights from Intelligence Experts
- 5:5 : IT Security News Hourly Summary 2025-11-22 06h : 5 posts
- 5:4 : CrowdStrike Fires Insider for Sharing Internal System Details with Hackers
- 5:4 : What makes NHIs support systems more secure
- 5:4 : How NHIs are tailored to handle specific enterprise needs
- 5:4 : How can I ensure secure interactions between Agentic AI systems?
- 5:4 : Are AI security measures getting better annually
- 4:2 : Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Escalate Privileges
- 0:2 : What is identity and access management? Guide to IAM
- 23:5 : IT Security News Hourly Summary 2025-11-22 00h : 1 posts
- 22:55 : IT Security News Daily Summary 2025-11-21
- 22:4 : Critical SonicOS SSLVPN Vulnerability Allows Remote Firewall Crashes
- 22:4 : CrowdStrike denies breach after insider sent internal screenshots to hackers
- 22:4 : Startup firm called Factory disrupts campaign designed to hijack development platform
- 21:38 : CISA Adds One Known Exploited Vulnerability to Catalog
- 21:38 : Phishing Breaks More Defenses Than Ever. Here’s the Fix
- 21:38 : Practical steps to minimize key exposure using AWS Security Services
- 21:4 : FCC Drops Telecom Cyber Rules Despite China Espionage Warnings
- 21:4 : NDSS 2025 – A Key-Driven Framework For Identity-Preserving Face Anonymization
- 21:4 : Randall Munroe’s XKCD ‘’Document Forgery”
- 21:4 : NDSS 2025 – THEMIS: Regulating Textual Inversion For Personalized Concept Censorship
- 21:4 : SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
- 20:5 : IT Security News Hourly Summary 2025-11-21 21h : 6 posts
- 20:4 : WrtHug Attack Hijacks Tens of Thousands of ASUS Home Routers
- 19:31 : More on Rewiring Democracy
- 19:31 : Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers
- 19:31 : AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload
- 19:31 : AI teddy bear for kids responds with sexual content and advice about weapons
- 19:31 : ShinyHunters ‘does not like Salesforce at all,’ claims the crew accessed Gainsight 3 months ago
- 19:4 : Salesforce Confirms New Breach Linked to Gainsight Apps
- 19:4 : Amazon Issuing $2.5B in Refunds to Eligible Prime Customers to Settle FTC Suit
- 19:4 : News brief: U.S. cyberdefenses take aim at foreign threats
- 19:4 : CrowdStrike fires ‘suspicious insider’ who passed information to hackers
- 19:4 : Microsoft named a Leader in the Gartner® Magic Quadrant™ for Access Management for the ninth consecutive year
- 19:4 : Accelerate investigations with AWS Security Incident Response AI-powered capabilities
- 18:32 : Distributed Edge Inference Changes Everything
- 18:32 : Grafana SCIM Flaw Allows Admin Impersonation and Full Takeover
- 18:31 : Google says hackers stole data from 200 companies following Gainsight breach
- 18:2 : ENISA becomes CVE Program Root, strengthening Europe’s vulnerability management framework
- 18:2 : Workload And Agentic Identity at Scale: Insights From CyberArk’s Workload Identity Day Zero
- 17:34 : These ‘Gentlemen’ Aren’t Gentle: Rapidly Evolving Ransomware Threat
- 17:34 : Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message
- 17:5 : IT Security News Hourly Summary 2025-11-21 18h : 18 posts
- 17:4 : New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse
- 17:4 : How to use Netcat: Commands and use cases
- 16:31 : Wordfence Bug Bounty Program Monthly Report – October 2025
- 16:31 : Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-Loss Products
- 16:31 : Inside the Industrialization of Cybercrime: What to Expect in 2026
- 16:9 : North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits
- 16:9 : Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education
- 16:9 : AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads
- 16:9 : Xillen Stealer: Advanced Features Bypass AI Detection and Steal Password Manager Data
- 16:9 : Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges
- 16:9 : Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads
- 16:9 : Fake calendar invites are spreading. Here’s how to remove them and prevent more
- 16:9 : Technical Debt vs Innovation Debt: Why Both Slow You Down, but Only One Threatens Your Future in the Age of AI
- 16:9 : Quantum Error Correction Moves From Theory to Practical Breakthroughs
- 16:9 : New Android Malware Steals Debit Card Data And PINs To Enable ATM Withdrawals
- 16:9 : Sam Altman’s Iris-Scanning Startup Reaches Only 2% of Its Goal
- 16:9 : Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
- 16:9 : Cybercriminals Exploit Browser Push Notifications to Deliver Malware
- 15:31 : How MSPs Can Cut Response Time by 60% — and Stop Losing Alerts (While Keeping Backups Safe)
- 15:31 : ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms
- 15:31 : In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring
- 15:31 : The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems
- 15:2 : SolarWinds addressed three critical flaws in Serv-U
- 15:2 : Building the IoT CTF Challenge for the HoneyLab CyberQuest CTF
- 15:2 : What’s New in Cloud Monitor & Classroom Manager: Smarter Tools for K–12 Classrooms
- 15:2 : Salesforce Breach Hits Over 200 Victims
- 15:2 : Over 50000 Asus Routers Compromised
- 15:2 : SEC Ends SolarWinds Case After Years
- 15:2 : TV Piracy Service With 26M Visits Closed
- 15:2 : Crypto Mixer Founders Jailed for Laundering
- 14:32 : Heimdal 5.1.0 RC Dashboard: Smarter Automation, Stronger Compliance, and Smoother Control
- 14:32 : Four charged over alleged plot to smuggle Nvidia AI chips into China
- 14:31 : AI as Cyberattacker
- 14:31 : APT24 Uses BADAUDIO in Taiwan Spying
- 14:5 : IT Security News Hourly Summary 2025-11-21 15h : 12 posts
- 14:2 : Cyber Insurance Won’t Save You from Bad Hygiene
- 14:2 : Despite Chinese hacks, Trump’s FCC votes to scrap cybersecurity rules for phone and internet companies
- 14:2 : Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day
- 14:2 : APIs Are the Retail Engine: How to Secure Them This Black Friday
- 13:31 : Russia-linked crooks bought a bank for Christmas to launder cyber loot
- 13:31 : Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise
- 13:31 : Hyundai faces security incident with potential data exposure
- 13:31 : ClickFix: The Silent Cyber Threat Tricking Families Worldwide
- 13:31 : Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
- 13:6 : Hidden Comet Browser API Allowed Dangerous Local Command Execution
- 13:6 : Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack
- 13:6 : Scaling Cyber: meet the next cybersecurity global leaders
- 12:32 : Allies Sanction Russian Network Behind Major Cyberattacks
- 12:32 : Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges
- 12:32 : Critical Grafana Vulnerability Let Attackers Escalate Privilege
- 12:32 : Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
- 12:32 : China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users
- 12:32 : SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance
- 12:32 : Salesforce Gainsight compromise: Early findings and customer guidance
- 12:32 : APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
- 12:32 : Why IT Admins Choose Samsung for Mobile Security
- 12:6 : Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
- 11:32 : This Hacker Conference Installed a Literal Anti-Virus Monitoring System
- 11:32 : SquareX and Perplexity Quarrel Over Alleged Comet Browser Vulnerability
- 11:6 : Salesforce alerts users to potential data exposure via Gainsight OAuth apps
- 11:6 : Runlayer Emerges From Stealth Mode With $11 Million in Funding
- 11:5 : IT Security News Hourly Summary 2025-11-21 12h : 5 posts
- 10:31 : ToddyCat: your hidden email assistant. Part 1
- 10:31 : New Gainsight Supply Chain Hack Could Affect Salesforce Customers
- 10:6 : Use of CSS stuffing as an obfuscation technique?, (Fri, Nov 21st)
- 10:6 : Windows 11 to Hide BSOD Crash Errors on Public Displays
- 10:6 : Salesforce Instances Hacked via Gainsight Integrations
- 9:34 : ZTE Launches ZXCSec MAF security solution for large model
- 9:6 : Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware
- 9:6 : Clop Ransomware Claims Oracle Breach Using E-Business Suite 0-Day
- 9:6 : Salesforce Confirms Customer Data Was Exposed in Gainsight Breach
- 9:6 : Operation DreamJob Attacks on Manufacturing via WhatsApp Web
- 9:6 : Critical Grafana Flaw Lets Attackers Escalate Privileges
- 8:32 : New Onapsis platform updates enhance visibility and protection across SAP landscapes
- 8:32 : SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
- 8:32 : Sturnus captures encrypted chats, PowerSchool schools blamed, SEC security bill
- 8:5 : IT Security News Hourly Summary 2025-11-21 09h : 7 posts
- 8:4 : Apple Launches £220 ‘Sock’ Carrying Case For iPhone
- 7:34 : Salesforce Confirms that Customers’ Data Was Accessed Following the Gainsight Breach
- 7:34 : Authorities Sanctioned Russia-based Bulletproof Hosting Provider for Supporting Ransomware Operations
- 7:34 : OpenAI Releases GPT-5.1-Codex-Max that Performs Coding Tasks Independently
- 7:34 : SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely
- 7:34 : Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk
- 7:34 : Fortinet FortiWeb Authentication Bypass and Command Injection Vulnerability (CVE-2025-64446/CVE-2025-58034) Notice
- 7:2 : Research shows identity document checks are missing key signals
- 6:38 : How one quick AI check can leak your company’s secrets
- 6:38 : What insurers really look at in your identity controls
- 6:38 : Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
- 6:4 : Major CloudFlare Outages, Black Friday Phishing Surge, AI Privacy Breach at Ontario Hospital, and Salesforce Data Theft Investigation
- 5:31 : Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach
- 5:31 : New infosec products of the week: November 21, 2025
- 5:31 : Convenience culture is breaking personal security
- 5:5 : IT Security News Hourly Summary 2025-11-21 06h : 2 posts
- 4:6 : Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack
- 4:6 : Google links Android’s Quick Share to Apple’s AirDrop, without Cupertino’s help
- 3:4 : When weak passwords open the door: major breaches that began with simple logins
- 2:5 : IT Security News Hourly Summary 2025-11-21 03h : 1 posts
- 2:2 : ISC Stormcast For Friday, November 21st, 2025 https://isc.sans.edu/podcastdetail/9710, (Fri, Nov 21st)
- 1:4 : The OSINT playbook: Find your weak spots before attackers do
- 0:36 : Unified Compliance with AI: Optimizing Regulatory Demands with Internal Tools
- 0:4 : Researchers devised a new enumeration technique that exposed 3.5B WhatsApp profiles
- 0:4 : SEC drops civil fraud case against SolarWinds
- 23:34 : 4 People Indicted in Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China
- 23:34 : SEC drops SolarWinds lawsuit that painted a target on CISOs everywhere
- 23:34 : Can enterprises freely choose scalable Agentic AI solutions
- 23:34 : Can effective Secrets Security fit within a tight budget
- 23:34 : How do stable AI systems contribute to cloud security
- 23:33 : Why are experts optimistic about future AI security technology
- 23:5 : IT Security News Hourly Summary 2025-11-21 00h : 6 posts
- 23:4 : Four Indicted In Alleged Conspiracy to Smuggle Supercomputers and Nvidia Chips to China
- 23:4 : International Kiteboarding Organization – 340,349 breached accounts
- 23:4 : Introducing the Landing Zone Accelerator on AWS Universal Configuration and LZA Compliance Workbook
- 22:55 : IT Security News Daily Summary 2025-11-20
- 22:33 : Four Indicted In Alleged Conspiracy To Smuggle Supercomputers and Nvidia Chips to China
- 22:33 : Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island
- 22:2 : Sturnus: New Android banking trojan targets WhatsApp, Telegram, and Signal