171 posts were published in the last hour
- 21:33 : Here are all the GPT-5 updates OpenAI has rolled out since launch
- 21:33 : Randall Munroe’s XKCD ‘Kite Incident’
- 21:33 : BSidesSF 2025: Netsec Is Dead(?): Modern Network Fingerprinting For Real-World Defense
- 20:32 : Carmaker Portal Flaw Could Let Hackers Unlock Cars, Steal Data
- 20:32 : Study warns of security risks as ‘OS agents’ gain control of computers and phones
- 20:32 : How you can still access GPT-4o, o3, and other older models in ChatGPT
- 20:5 : IT Security News Hourly Summary 2025-08-11 21h : 19 posts
- 20:4 : Finally, I found a portable charger that checks all of my boxes for traveling
- 20:4 : Why I recommend this $200 Android phone with a paper-like display over competing models
- 20:4 : The tablet that replaced my iPad and Kindle got a worthy successor – and I’m loving the upgrades
- 20:4 : I jump-started a bus from the 1930s with this power bank – here’s the verdict
- 20:4 : How Apple may revamp Siri to a voice assistant I’d actually use (and ditch Gemini for)
- 20:4 : US government seized $1M from Russian ransomware gang
- 19:33 : I did not expect this JBL soundbar to outperform pricier models by Sonos and Bose like this
- 19:33 : US government seized $1 million from Russian ransomware gang
- 19:33 : Russia’s RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks
- 19:33 : Malware analysis on AWS: Setting up a secure environment
- 19:4 : Hackers Exploit ClickFix Technique to Compromise Windows and Run PowerShell Commands
- 19:4 : Development of System Configuration Management: Introduction
- 19:4 : You can claim up to $7,500 from AT&T’s 177M data breach payouts – how to check your eligibility ASAP
- 19:4 : 8 settings I changed on my Google Pixel phone to extend the battery life by hours
- 19:4 : How Debian 13’s little improvements add up to the distro’s surprisingly big leap forward
- 19:4 : The Future of Continuous Access Control: OpenID CAEP
- 19:4 : How to Securely Access AWS from your EKS Cluster
- 18:33 : Changing these 6 settings on my Roku TV significantly improved the performance
- 18:33 : How I got another 15GB of Gmail storage at no cost (and without losing old files)
- 18:33 : Why xAI is giving you ‘limited’ free access to Grok 4
- 18:33 : How to use Nmap to scan ports: A complete tutorial
- 18:33 : SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents
- 18:5 : Win-DoS’ Zero-Click Exploit Could Weaponize Windows Infrastructure for DDoS Attacks
- 18:5 : Data Mesh Security: How to Protect Decentralized Data Architectures
- 18:5 : I captured 500 photos with the two best Android camera phones – and there’s a clear winner
- 18:5 : A default TV setting is ruining your viewing experience – here’s the quick fix that experts recommend
- 18:5 : The OnePlus 12 was already our favorite budget Android phone – now it’s $250 off
- 18:5 : Chrome sandbox escape nets security researcher $250,000 reward
- 18:5 : Cloudflare Accuses AI Startup Perplexity of Bypassing Web Blocking Measures
- 17:34 : Ghanaian Nationals Extradited to US Over $100M, BEC, Romance Scams
- 17:34 : Hackers Extradited to US Over $100 Million Romance Scams and Other Frauds
- 17:34 : I jump-started a bus from the 1930s with this power bank – here’s my buying advice
- 17:34 : US scrambles to recoup $1M+ nicked by NORKs
- 17:34 : Vulnerability Summary for the Week of August 4, 2025
- 17:34 : New TETRA Radio Encryption Flaws Expose Law Enforcement Communications
- 17:34 : Amazon EC2 defenses against L1TF Reloaded
- 17:5 : IT Security News Hourly Summary 2025-08-11 18h : 17 posts
- 17:4 : The best tablets for students in 2025: Expert recommended for back-to-school season
- 17:4 : Tiny gold “super atoms” could spark a quantum revolution
- 17:4 : NZTA Breach Results in Vehicle Theft, User Data Compromise
- 16:34 : 40,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in UiCore Elements WordPress Plugin
- 16:34 : Erlang/OTP SSH RCE Vulnerability Actively Exploited to Target OT Networks
- 16:34 : 3 charging mistakes that are killing your tablet – and the simple fix you need
- 16:34 : Save $150 on the OnePlus 13 right now and get a free gift – but hurry
- 16:34 : How ShinyHunters Hacking Group Stole Customer Data from Salesforce
- 16:33 : Electronic Arts blocks more than 300,000 attempts to cheat after launching Battlefield 6 beta
- 16:33 : Red teams are safe from robots for now, as AI makes better shield than spear
- 16:33 : Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
- 16:4 : I tested this power bank by jump starting a bus from the 1930s – here’s what happened
- 16:4 : Microsoft Copilot 3D turns your 2D images into 3D models for free – how to try
- 16:4 : OpenAI’s GPT-5 Touts Medical Benchmarks and Mental Health Guidelines
- 16:4 : Wikimedia Foundation loses first court battle to swerve Online Safety Act regulation
- 16:4 : New WinRAR Zero-Day Exploited by RomCom Hackers
- 16:4 : Connex Credit Union Breach Exposes 172,000 Members’ Data
- 15:34 : UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed
- 15:34 : You can try Gemini Live in your favorite Google apps now, and it blew me away
- 15:34 : I tested Meta’s new Oakley smart glasses in the studio – my take as a content creator
- 15:34 : Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks
- 15:34 : Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware
- 15:34 : The Hidden Danger: Secrets Sprawl Beyond the Codebase
- 15:34 : “The worst thing” for online rights: An age-restricted grey web (Lock and Code S06E16)
- 15:34 : BERT Ransomware
- 15:34 : Millions Face Potential Harm After Experts Uncovered a Vast Network of 5,000+ Fake Pharmacy Sites
- 15:34 : New York Lawmaker Proposes Bill to Regulate Gait Recognition Surveillance
- 15:33 : What the Matter 1.4.2 update means for smart home security
- 14:34 : Microsoft to shut down Lens and push users to Copilot – but you have other options
- 14:34 : Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike
- 14:34 : Chrome Sandbox Escape Earns Researcher $250,000
- 14:5 : IT Security News Hourly Summary 2025-08-11 15h : 17 posts
- 14:4 : Visualize Security Success with the Security Summary Dashboard
- 14:4 : Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster
- 14:4 : New Data Reveals July’s Worst Ransomware Groups and Attack Surges
- 14:3 : What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware
- 14:3 : ClickFix Malware Attacks macOS Users to Steal Login Credentials
- 14:3 : AI Coding Assistant Creating a Perfect Blueprints for Attackers
- 13:34 : Hackers Leak 9GB of Data from Alleged North Korean Hacker’s Computer
- 13:34 : The best Amazon deals right now: Save on laptops, gadgets and more
- 13:34 : Train Your Team in AI-Powered Pen Testing for Just $19.99
- 13:34 : Manage Logins, Data Sharing, and Device Syncs from One Secure Vault
- 13:34 : From ClickFix to Command: A Full PowerShell Attack Chain
- 13:34 : Online portal exposed car and personal data, allowed anyone to remotely unlock cars
- 13:34 : Intel chief Lip-Bu Tan to visit White House after Trump calls for him to step down
- 13:34 : External Network Penetration Testing Checklist for 2025
- 13:34 : ⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More
- 13:4 : The Future of Automotive Cybersecurity Safeguarding the Next Generation of Mobility
- 13:4 : GPT-5 bombed my coding tests, but redeemed itself with code analysis
- 13:4 : Linux desktop frozen? My 5 go-to tricks to try – before forcing a hard reboot
- 13:4 : Deepfake detectors are slowly coming of age, at a time of dire need
- 13:4 : Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- 12:33 : Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks
- 12:33 : 5 free Windows PC apps I always install first (and how they improve your workflow)
- 12:33 : Debian 13 arrives with major updates for Linux users – what’s new in ‘Trixie’
- 12:33 : Disable Your SonicWall VPN: Threat Actors May Be Exploiting This Vulnerability
- 12:33 : Agent Fatigue Crisis Hits 89% of MSPs as Security Tools Backfire
- 12:5 : Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles
- 12:5 : Why I travel with 3 different portable power stations (and can’t get out of the habit)
- 12:5 : This iOS 26 update ruined the iPhone camera app for me – then Apple saved the day
- 12:5 : Samsung gives free $120 offer to Galaxy Z Fold and Flip 7 users – how to redeem it now
- 12:5 : Connex Credit Union Data Breach Impacts 172,000 People
- 12:5 : 6 Lessons Learned: Focusing Security Where Business Value Lives
- 12:5 : Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud Ring
- 11:34 : North Korean Group ScarCruft Expands From Spying to Ransomware Attacks
- 11:34 : Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
- 11:34 : CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack
- 11:34 : What Does Palantir Actually Do?
- 11:33 : UK retail giant M&S restores Click & Collect months after cyber attack, some services still down
- 11:33 : Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft
- 11:5 : IT Security News Hourly Summary 2025-08-11 12h : 9 posts
- 11:3 : Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
- 11:3 : Embargo Ransomware Gang Amasses $34.2m in Attack Proceeds
- 10:34 : Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
- 10:34 : SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks
- 10:34 : Dia’s Paid Plan Marks New Phase in AI-Powered Web Browsing
- 10:34 : Anthropic’s Claude Code Arms Developers With Always-On AI Security Reviews
- 10:34 : Inside the Multimillion-Dollar Gray Market for Video Game Cheats
- 10:34 : SSHamble – New Open Source Tool to Exploit Vulnerabilities in SSH Protocol
- 10:34 : Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks
- 10:34 : APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials
- 10:4 : Smart Buses flaws expose vehicles to tracking, control, and spying
- 10:4 : Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada
- 10:4 : Ingram Micro Faces Alleged Breach by SafePay with Ransom Threat
- 10:4 : WinRAR zero day exploited by RomCom hackers in targeted attacks
- 9:33 : Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
- 9:33 : Malware Campaign Masquerades as Tesla in Poisoned Google Ads
- 9:33 : 5 bloatware apps you should delete from your Samsung phone ASAP
- 9:33 : Your CV is not fit for the 21st century – time to get it up to scratch
- 9:33 : Eight Countries Face EU Action Over NIS2 Deadline Failings
- 9:3 : Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
- 9:3 : How to use GPT-5 in VS Code with GitHub Copilot
- 9:3 : From Data Overload to Action: Why Modern Vulnerability Management Must Be Workflow-Driven
- 9:3 : UK Red Teamers “Deeply Skeptical” of AI
- 8:32 : Windows RPC Protocol Exploited to Launch Server Spoofing Attacks
- 8:32 : BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats
- 8:3 : INE Named to Training Industry’s 2025 Top 20 Online Learning Library List
- 8:3 : AI Coding Assistant: Creating the Perfect Blueprint for Attackers
- 8:3 : Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights
- 7:34 : SSHamble: New Open-Source Tool Targets SSH Protocol Flaws
- 7:34 : MedusaLocker ransomware group is looking for pentesters
- 7:34 : A week in security (August 4 – August 10)
- 7:34 : DARPA code prize, ScarCruft adds ransomware, Columbia breach tally
- 7:3 : Efimer Trojan Targets Crypto Wallets Using Phony Legal Notices and Booby-Trapped Torrents
- 7:3 : WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately
- 6:33 : Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution
- 6:33 : 7-Zip Arbitrary File Write Vulnerability Allows Attackers to Execute Code
- 6:33 : GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks
- 6:33 : Ghanaian fraudsters arrested for BEC/Sakawa
- 6:33 : How Brandolini’s law informs our everyday infosec reality
- 5:33 : 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
- 5:33 : GPT-5 Compromised Using Echo Chamber and Storytelling Exploits
- 5:33 : Review: From Day Zero to Zero Day
- 5:32 : From legacy to SaaS: Why complexity is the enemy of enterprise security
- 5:5 : IT Security News Hourly Summary 2025-08-11 06h : 1 posts
- 5:3 : Pentesting is now central to CISO strategy
- 4:32 : Breaches are up, budgets are too, so why isn’t healthcare safer?
- 4:2 : I tested GPT-5’s coding skills, and it was so bad that I’m sticking with GPT-4o (for now)
- 2:4 : ISC Stormcast For Monday, August 11th, 2025 https://isc.sans.edu/podcastdetail/9564, (Mon, Aug 11th)
- 2:4 : Security flaws in a carmaker’s web portal let one hacker remotely unlock cars from anywhere
- 2:4 : Securing Machine Identities: Best Practices
- 2:4 : Ensuring Compliance Through Enhanced NHI Security
- 23:32 : New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Server/Endpoint, Domain Controllers Into DDoS Botnet
- 23:32 : Trend Micro offers weak workaround for already-exploited critical vuln in management console
- 23:5 : IT Security News Hourly Summary 2025-08-11 00h : 2 posts
- 22:58 : IT Security News Weekly Summary 32
- 22:55 : IT Security News Daily Summary 2025-08-10