210 posts were published in the last hour
- 21:35 : Microsoft Patch Tuesday, September 2025 Edition
- 21:35 : Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights
- 21:34 : Innovator Spotlight: Oleria
- 21:34 : Cisco Adds Bevy of AI Agents to Splunk Security Platform
- 21:4 : Here’s why the AirPods Pro 3 might make me ditch my Apple Watch for good
- 21:4 : Why I’m tempted to upgrade from iPhone 16 Pro to iPhone 17 Pro: 3 big reasons
- 21:4 : SAP September 2025 Patch Day fixed 4 critical flaws
- 21:4 : Innovator Spotlight: Straiker
- 20:45 : How to Enrich Alerts with Live Attack Data From 15K SOCs
- 20:45 : Innovator Spotlight: Xcape
- 20:45 : Popeyes, Tim Hortons, Burger King platforms have “catastrophic” vulnerabilities, say hackers
- 20:44 : New cybersecurity rules land for Defense Department contractors
- 20:44 : BSidesSF 2025: There And Back Again: Discovering OT Devices Across Protocol Gateways
- 20:5 : IT Security News Hourly Summary 2025-09-09 21h : 10 posts
- 19:37 : Microsoft Patch Tuesday for September 2025 – Snort rules and prominent vulnerabilities
- 19:37 : Top 10 Best Internal Network Penetration Testing Providers in 2025
- 19:37 : You can preorder Apple’s new devices this week: iPhone 17, Watch 11, AirPods Pro 3 and more
- 19:37 : Apple iPhone 17 Pro Max vs. Samsung Galaxy S25 Ultra: I compared both, and here’s the winner
- 19:37 : Is Apple Watch Series 11 worth the upgrade? Here’s how it compares to older models
- 19:37 : Apple Events live updates: iPhone 17, iPhone Air, AirPods Pro 3, and new wearables just unveiled
- 19:36 : Excited about Apple Watch 11’s hypertension feature? It’s coming to older models too
- 19:36 : Quantum Computing Threat Forces Crypto Revolution in 2025
- 19:36 : X’s New Encrypted Chat Has Major Security Flaws Experts Warn
- 19:36 : 700M VPN Users at Risk: Hidden Ownership Exposed
- 19:36 : Supply chain attack targets npm, +2 Billion weekly npm downloads exposed
- 19:36 : Microsoft Patches 86 Vulnerabilities
- 18:35 : Microsoft Patch Tuesday September 2025, (Tue, Sep 9th)
- 18:35 : Microsoft September 2025 Patch Tuesday – 81 Vulnerabilities and 2 Zero Days Fixed
- 18:35 : With Raspberry Pi and Wi-Fi, researchers built a wireless heart rate monitor – here’s how
- 18:35 : Billion-Download npm Packages Hijacked in Crypto-Stealing Attack
- 18:35 : GitHub Breach Exposed 700+ Companies in Months-Long Attack
- 18:35 : Microsoft September 2025 Patch Tuesday – 81 Vulnerabilities Fixed Including 22 RCE
- 18:35 : Defense Dept didn’t protect social media accounts, left stream keys out in public
- 18:35 : Adobe Patches Critical ColdFusion and Commerce Vulnerabilities
- 18:34 : Analysis evidence from SonarQube now available in JFrog AppTrust
- 18:34 : Hospital Notifies victims of a one-year old data breach, personal details stolen
- 17:35 : Blockchain-Based Authentication: The Future of Secure Identity Verification
- 17:35 : No gains, just pains as 1.6M fitness phone call recordings exposed online
- 17:34 : Burger King’s ‘Very Bad’ Bugs Leaked Your Data, Claim Gagged Hackers
- 17:5 : IT Security News Hourly Summary 2025-09-09 18h : 19 posts
- 16:40 : Apple Event live updates 2025: iPhone 17, AirPods 3, Apple Watch Series 11, and more news
- 16:40 : Rockwell Automation 1783-NATR
- 16:40 : Rockwell Automation CompactLogix® 5480
- 16:40 : Rockwell Automation Stratix IOS
- 16:40 : ABB Cylon Aspect BMS/BAS
- 16:40 : Rockwell Automation FactoryTalk Optix
- 16:40 : Innovator Spotlight: Corelight
- 16:40 : Plex tells users to change passwords due to data breach, pushes server owners to upgrade
- 16:40 : Mitsubishi Electric agrees to buy Nozomi Networks in deal valued at about $1B
- 16:8 : The Price of ‘Free’: How Nulled Plugins Are Used to Weaken Your Defense
- 16:8 : New Salty2FA Phishing Kit Bypasses MFA and Clones Login Pages
- 16:8 : FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands
- 16:8 : These subtle AirPods Pro 3 upgrades would make them an instant buy for me
- 16:8 : I use a lot of batteries, and this handy device is saving me money – here’s how
- 16:8 : Google’s AI Quests gamifies how to use AI in the real world
- 16:8 : What is a standard operating procedure (SOP)?
- 16:8 : Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice
- 16:7 : FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands
- 16:7 : Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure
- 15:41 : Republic and Incentiv Partner to Simplify and Reward Web3 Participation
- 15:41 : Ivanti Endpoint Manager Vulnerabilities Allow Remote Code Execution by Attackers
- 15:41 : Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways
- 15:41 : Probably Secure: A Look at the Security Concerns of Deterministic vs Probabilistic Systems
- 15:41 : 5 Best Kaspersky Alternatives for Reliable Protection
- 15:41 : 5 Signs You’re Ready for a Career in Cybersecurity
- 15:41 : New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers
- 15:41 : Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams
- 15:41 : Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091
- 15:41 : Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025
- 15:41 : Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code
- 15:41 : Exploring Key Technology Trends for 2024
- 15:41 : BSidesSF 2025: Follow The Trace: How Traditional AppSec Tools Have Failed Us
- 15:6 : Zoom Security Update Fixes Vulnerabilities in Windows Client and Workplace Platform
- 15:6 : Meta Overhauls AI Chatbot Safeguards for Teenagers
- 15:6 : Clanker: The Viral AI Slur Fueling Backlash Against Robots and Chatbots
- 15:6 : AI Image Attacks: How Hidden Commands Threaten Chatbots and Data Security
- 15:5 : Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
- 15:5 : Threat Actor Accidentally Exposes AI-Powered Operations
- 14:48 : Secure Your Spring Boot Apps Using Keycloak and OIDC
- 14:48 : I tried smart glasses with a built-in display, and they beat my Meta Ray-Bans in key ways
- 14:47 : This 2FA phishing scam pwned a developer – and endangered billions of npm downloads
- 14:47 : Blink just raised its subscription price – but you get 2 new features in return
- 14:47 : Slow Roku TV? This 30-second routine will keep your device running like new
- 14:47 : Claude can create PDFs, slides, and spreadsheets for you now in chat
- 14:47 : Plex urges users to change passwords after data breach
- 14:47 : Top 10 Best External Penetration Testing Companies in 2025
- 14:47 : Jaguar Land Rover Extends Factory Shutdown Following Cyber Attack
- 14:47 : New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands
- 14:47 : How a Faulty Windows Driver Can Cause a System Crash and Blue Screen of Death
- 14:47 : What the Plex? Streaming service suffers yet another password spill
- 14:47 : SAP Patches Critical NetWeaver Vulnerabilities
- 14:47 : Exposed Docker APIs Likely Exploited to Build Botnet
- 14:47 : GPUGate Malware Shows Hardware-Specific Evasion Tactics: Arctic Wolf
- 14:47 : Smart Glasses Face Opposition as Gen Z Voices Privacy Concerns
- 14:47 : Hummingbird’s compliance and risk platform helps financial institutions manage risk
- 14:47 : Vanta embeds agentic AI into policy and evidence workflows
- 14:46 : Relyance AI Data Defense Engineer secures AI-driven data
- 14:5 : IT Security News Hourly Summary 2025-09-09 15h : 13 posts
- 13:36 : Microsoft to Add New AI-Powered Actions in File Explorer
- 13:36 : Phishing Alert: Kimusky Hackers Masquerade as Tax Authority with ‘September Tax Return Due Date’ Email
- 13:36 : Solar plus storage is just the start: How the most home-energy savvy slash their electric bills by 78%
- 13:36 : If Apple unveils the iPhone 17 Air with these features today, I’m ready to upgrade
- 13:36 : Apple Watch Series 11: The biggest new features we’re expecting to see today
- 13:36 : Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation
- 13:36 : Ransomware Losses Climb as AI Pushes Phishing to New Heights
- 13:36 : Cisco puts agentic AI at the core of Splunk Enterprise Security
- 13:36 : RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
- 13:36 : Salty2FA Phishing Kit Unveils New Level of Sophistication
- 13:36 : How AI and politics hampered the secure open-source software movement
- 13:8 : RatOn Hijacks Bank Account to Launch Automated Money Transfers
- 13:8 : New APT37 Attacking Windows Machines With New Rust and Python Based Malware
- 13:8 : Magento and Adobe SessionReaper Vulnerability Exposes Thousands Of Online Stores to Attacks
- 13:8 : MostereRAT Attacking Windows Systems With AnyDesk/TightVNC to Enable Remote Access
- 13:8 : SAP Security Patch Day September 2025 – 21 Vulnerabilities and 4 Critical One’s Patched
- 13:8 : New Malware Attack Leveraging Exposed Docker APIs to Maintain Persistent SSH Root Access
- 13:8 : Software Supply Chain Attacks
- 13:8 : Google misled users about their privacy and now owes them $425m, says court
- 13:8 : Link11 Reports 225% more DDoS attacks in H1 2025 with new tactics against infrastructure
- 13:8 : NetApp StorageGRID 12.0 powers AI and data-intensive workloads
- 13:8 : Fake npm 2FA reset email led to compromise of popular code packages
- 12:44 : New Docker Malware Strain Spotted Blocking Rivals on Exposed APIs
- 12:44 : SessionReaper Vulnerability Puts Magento & Adobe Commerce Sites in Hacker Crosshairs
- 12:44 : How a Single Faulty Windows Driver Can Crash Your System and Cause Blue Screen of Death
- 12:44 : U.S. Cracks Down on Scam Networks in Southeast Asia Draining Billions
- 12:44 : Toward Explainable AI (Part 8): Bridging Theory and Practice—SHAP: Powerful, But Can We Trust It?
- 12:44 : Cloud Automation Excellence: Terraform, Ansible, and Nomad for Enterprise Architecture
- 12:44 : A New Platform Offers Privacy Tools to Millions of Public Servants
- 12:44 : New Cryptanalysis of the Fiat-Shamir Protocol
- 12:44 : 160,000 Impacted by Wayne Memorial Hospital Data Breach
- 12:43 : Report: Massive Number of Internet Exposed Assets Still Lack WAF Protection
- 12:43 : Download: Cyber defense guide for the financial sector
- 12:43 : Axios User Agent Helps Automate Phishing on “Unprecedented Scale”
- 12:43 : Open Source Community Thwarts Massive npm Supply Chain Attack
- 11:10 : Aembit Named to Fast Company’s Seventh-Annual List of the 100 Best Workplaces for Innovators
- 11:10 : SAP Security Patch Day Addresses 21 Vulnerabilities, 4 Classified as Critical
- 11:10 : The best all-in-one computers of 2025: Expert tested and reviewed
- 11:10 : Elastic Security Incident – Hackers Accessed Email Account Contains Valid Credentials
- 11:10 : Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
- 11:10 : Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
- 11:9 : [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
- 11:9 : TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
- 11:9 : From MostereRAT to ClickFix: New Malware Campaigns Highlight Rising AI and Phishing Risks
- 11:9 : Chinese Cyber Espionage Campaign Impersonates US Congressman
- 11:6 : IT Security News Hourly Summary 2025-09-09 12h : 9 posts
- 10:35 : Unmasking The Gentlemen Ransomware: Tactics, Techniques, and Procedures Revealed
- 10:35 : SpamGPT: New AI Email Attack Tool Fueling Massive Phishing Operations
- 10:35 : New Cyber Attack Exploits DeskSoft to Spread Malware via RDP Command Execution
- 10:35 : A New Platform Is Launching to Protect Public Servants From an Angry Mob
- 10:34 : Scientists build quantum computers that snap together like LEGO bricks
- 10:34 : Anthropic’s Claude Code runs code to test if it is safe – which might be a big mistake
- 10:34 : Nokia successor HMD spawns secure device biz with Euro-made smartphone
- 10:34 : Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion
- 10:34 : Silobreaker Requirements enables teams to improve threat intelligence
- 9:32 : How Leading CISOs are Getting Budget Approval
- 9:7 : New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access
- 9:7 : Finally, a Windows desktop I can confidently put away my iMac for
- 9:7 : New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability
- 9:7 : SpamGPT – AI-powered Attack Tool Used By Hackers For Massive Phishing Attack
- 9:7 : Elastic Salesloft Drift Security Incident – Hackers Accessed Email Account Contains Valid Credentials
- 9:7 : Plex Urges Password Resets Following Data Breach
- 9:7 : Differences Between Privileged Access Management and Enterprise Password Management
- 9:7 : Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign
- 8:34 : Dell Cuts Staff In China Amidst Tensions
- 8:34 : Robot Maker Unitree Seeks $7bn Valuation In Upcoming IPO
- 8:34 : US Proposes Annual Licences For Samsung, SK Hynix Plants
- 8:34 : Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
- 8:34 : MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
- 8:34 : SentinelOne to Acquire Observo AI in $225 Million Deal
- 8:5 : IT Security News Hourly Summary 2025-09-09 09h : 5 posts
- 8:5 : Dynatrace Data Breach Exposes Customer Information Stored in Salesforce
- 8:5 : New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
- 8:5 : I was wrong about this $15 cordless screwdriver – here’s how it fared in my workshop
- 8:5 : I replaced my Samsung S25 Ultra with the Pixel 10 Pro XL for weeks – and don’t regret it
- 8:5 : You can still download iOS 26 beta onto your iPhone – here are the supported models
- 8:4 : Signal adds secure backup option for chat history
- 7:39 : Windows Defender Vulnerability Lets Hackers Hijack and Disable Services Using Symbolic Links
- 7:39 : 12+ laptop accessories that I recommend to both students and professionals
- 7:39 : Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads
- 7:39 : Dynatrace Confirms Data Breach: Hackers Accessed Customer Data From Salesforce
- 7:39 : Using PAM for Passwordless Authentication without Local Users
- 7:39 : Nearly 500 researchers urge EU to rethink controversial CSAM scanning proposal
- 7:39 : 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
- 7:39 : GhostAction campaign, scam centers grow, GPUGate hits IT
- 7:8 : Microsoft Cloud Services Affected After Red Sea Cables Cut
- 7:7 : APT37 Deploys New Rust and Python Malware Targeting Windows Systems
- 7:7 : This Fedora spin is perfect for one particular kind of new Linux user
- 7:7 : UK toughens Online Safety Act with ban on self-harm content
- 7:7 : Ongoing malvertising campaign targets European IT workers with fake GitHub Desktop installers
- 6:7 : Hackers Hijack 18 Popular npm Packages Downloaded Over 2 Billion Times Weekly
- 6:7 : Chinese Hackers Salt Typhoon and UNC4841 Team Up to Breach Critical Infrastructure
- 6:7 : LunaLock Ransomware threatens victims by feeding stolen data to AI models
- 6:7 : Attackers test the limits of railway cybersecurity
- 6:7 : Connected cars are racing ahead, but security is stuck in neutral
- 5:34 : Maduro Hails Huawei Mate X6 Gift From China as ‘Unhackable’ by U.S.
- 5:6 : IT Security News Hourly Summary 2025-09-09 06h : 3 posts
- 5:6 : Qualys Confirms Cyberattack Campaign Targeting Salesforce via Salesloft and Drift
- 5:6 : Are we headed for an AI culture war?
- 5:6 : Employees keep feeding AI tools secrets they can’t take back
- 4:3 : Forget disappearing messages – now Signal will store 100MB of them for you for free
- 4:3 : Cybersecurity jobs available right now: September 9, 2025
- 3:35 : Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World
- 2:37 : ISC Stormcast For Tuesday, September 9th, 2025 https://isc.sans.edu/podcastdetail/9604, (Tue, Sep 9th)
- 2:37 : Traveling soon? 5 simple ways I thwart phone thieves – and you can too
- 2:37 : How to undo OneDrive Backup and restore your personal files to your Windows 11 PC
- 2:37 : Understanding the EU Corporate Sustainability Due Diligence Directive (CSDDD): Why It Matters and How to Prepare
- 2:37 : UK Schools Trust Hit by Knock-On Effects of Intradev Cyber Breach
- 1:35 : Apple is playing a dangerous game with the iPhone 17 – and it might just pay off
- 1:35 : 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage
- 0:6 : Signal lets you back up your chats for free now – plus its first-ever paid feature
- 0:6 : The 9 coolest gadgets I saw at IFA Berlin 2025 (including picks you can actually buy)